Skip to main content

User and Role Management

Overview

IAM User Management in DeepTraq allows administrators to create and manage users with secure access controls and enterprise-grade security policies.

By configuring roles, authentication requirements, and access restrictions, organizations can ensure that only authorized users can access security resources within the platform.

This guide explains how to create IAM users and configure secure access settings in DeepTraq.


Prerequisites

Before creating IAM users, ensure the following:

  • Active DeepTraq administrator account
  • Permission to manage users and access controls
  • Defined roles and access policies within the organization
  • Valid email addresses for new users

Accessing IAM User Management

To manage IAM users:

  1. Click the Profile icon in the top navigation menu.
  2. Select Account Settings.
  3. Navigate to IAM Users.
  4. Open the IAM User Dashboard to view and manage users.

From this dashboard, administrators can create new users, manage permissions, and configure access policies.


Creating a New IAM User

To add a new IAM user and grant controlled access:

  1. Navigate to IAM Users.
  2. Click Add New User.
  3. Enter the required user details.

Required Information

  • User Email Address
    Enter the official email address of the user to create their IAM account and enable secure access.

Enabling Multi-Factor Authentication (MFA)

Multi-Factor Authentication adds an extra layer of protection during login by requiring a second authentication factor.

Steps

  1. Enable Multi-Factor Authentication (MFA).
  2. Specify the number of days allowed for MFA setup.
  3. Save the configuration.

⚠️ Note:
The MFA setup duration field becomes mandatory when MFA enforcement is enabled.


Configuring Account Lock Protection

Account lock protection helps prevent unauthorized access by restricting login attempts.

Steps

  1. Enable Account Lock Protection.
  2. Define the conditions for locking the account after multiple failed login attempts.
  3. Save the configuration.

This feature automatically restricts access when suspicious login activity is detected.


Restricting Login Access by IP Address

Administrators can strengthen security by restricting user login access to approved IP addresses.

Steps

  1. Enable IP Address Restrictions.
  2. Enter an allowed IP address.
  3. Click Add to include the IP in the allowed list.

Only users accessing the platform from approved IP addresses will be able to log in.


Assigning User Roles

Roles determine what actions a user can perform and which resources they can access.

Steps

  1. Navigate to the Roles and Permissions section.
  2. Select an appropriate user role.
  3. Assign the role to the user.

Roles control access to features such as:

  • Security scans
  • Vulnerability reports
  • Account settings
  • Administrative controls

Choose the role that aligns with the user's responsibilities within your organization.


Finalizing User Creation

After completing all configurations:

  1. Review user details
  2. Verify security settings
  3. Click Create User

The new IAM user will receive access based on the configured roles and security policies.


Best Practices

To maintain secure user access:

  • Enforce Multi-Factor Authentication (MFA) for all users
  • Assign least-privilege roles based on user responsibilities
  • Restrict login access using IP allowlists
  • Enable account lock protection to prevent brute-force attacks
  • Regularly review and update user permissions