User and Role Management
Overview
IAM User Management in DeepTraq allows administrators to create and manage users with secure access controls and enterprise-grade security policies.
By configuring roles, authentication requirements, and access restrictions, organizations can ensure that only authorized users can access security resources within the platform.
This guide explains how to create IAM users and configure secure access settings in DeepTraq.
Prerequisites
Before creating IAM users, ensure the following:
- Active DeepTraq administrator account
- Permission to manage users and access controls
- Defined roles and access policies within the organization
- Valid email addresses for new users
Accessing IAM User Management
To manage IAM users:
- Click the Profile icon in the top navigation menu.
- Select Account Settings.
- Navigate to IAM Users.
- Open the IAM User Dashboard to view and manage users.
From this dashboard, administrators can create new users, manage permissions, and configure access policies.
Creating a New IAM User
To add a new IAM user and grant controlled access:
- Navigate to IAM Users.
- Click Add New User.
- Enter the required user details.
Required Information
- User Email Address
Enter the official email address of the user to create their IAM account and enable secure access.
Enabling Multi-Factor Authentication (MFA)
Multi-Factor Authentication adds an extra layer of protection during login by requiring a second authentication factor.
Steps
- Enable Multi-Factor Authentication (MFA).
- Specify the number of days allowed for MFA setup.
- Save the configuration.
⚠️ Note:
The MFA setup duration field becomes mandatory when MFA enforcement is enabled.
Configuring Account Lock Protection
Account lock protection helps prevent unauthorized access by restricting login attempts.
Steps
- Enable Account Lock Protection.
- Define the conditions for locking the account after multiple failed login attempts.
- Save the configuration.
This feature automatically restricts access when suspicious login activity is detected.
Restricting Login Access by IP Address
Administrators can strengthen security by restricting user login access to approved IP addresses.
Steps
- Enable IP Address Restrictions.
- Enter an allowed IP address.
- Click Add to include the IP in the allowed list.
Only users accessing the platform from approved IP addresses will be able to log in.
Assigning User Roles
Roles determine what actions a user can perform and which resources they can access.
Steps
- Navigate to the Roles and Permissions section.
- Select an appropriate user role.
- Assign the role to the user.
Roles control access to features such as:
- Security scans
- Vulnerability reports
- Account settings
- Administrative controls
Choose the role that aligns with the user's responsibilities within your organization.
Finalizing User Creation
After completing all configurations:
- Review user details
- Verify security settings
- Click Create User
The new IAM user will receive access based on the configured roles and security policies.
Best Practices
To maintain secure user access:
- Enforce Multi-Factor Authentication (MFA) for all users
- Assign least-privilege roles based on user responsibilities
- Restrict login access using IP allowlists
- Enable account lock protection to prevent brute-force attacks
- Regularly review and update user permissions