Skip to main content

User Management

User Management in simpleBillBook allows you to create and manage user accounts, assign roles and permissions, and control who has access to your organization's data. Proper user management ensures security, accountability, and efficient collaboration across your team.

Overview of User Management

User Management helps you:

  • Create User Accounts: Add team members to the system
  • Assign Roles: Control what each user can access and do
  • Manage Access: Grant or revoke system access as needed
  • Track Activity: Know who performed specific actions
  • Maintain Security: Ensure only authorized personnel have access

Viewing Users

To view all users:

  1. Navigate to Manage Users → Users from the main sidebar
  2. You'll see a table listing all user accounts in your organization

Users List Figure 1: Users list showing all user accounts

Users Table Columns:

User Information:

  • Name: Full name of the user
  • Email: User's email address (used for login)
  • Role: Assigned role(s) determining permissions

Interface Elements:

  • Type to search: Search functionality for finding specific users
  • All dropdown: Filter users by role, status, or other criteria
  • Empty State: "No results" message when no users exist
  • Create +: Button to create new users (inferred from previous patterns)

Creating a New User

Step 1: Access User Creation

From the users page, click Create + or similar button to add a new user.

Step 2: Fill User Details

Create User Form Figure 2: Form for creating new users

Required Information:

  • Name*: Full name of the user (required)
  • Email*: Email address for login and notifications (required)
  • Role*: Select role from dropdown to assign permissions (required)

Optional Information:

  • Phone: Contact phone number
  • Department: Department or team
  • Employee ID: Internal employee identifier
  • Joining Date: Date user started
  • Reports To: Manager or supervisor
  • Location: Physical location or branch

Account Settings:

  • Username: May be auto-generated from email or custom
  • Password: Set initial password or send invitation email
  • Status: Active/Inactive (defaults to Active)
  • Two-Factor Authentication: Optional security setting

Step 3: Save User

  • Click Save to create the user account
  • User receives notification/credentials based on settings
  • User appears in the users list and can log in

User Roles and Permissions

Role Assignment:

  • Each user must be assigned at least one role
  • Roles determine what the user can view, create, edit, and delete
  • Users may have multiple roles (permissions combine)

Common User Roles:

RoleTypical Responsibilities
AdminFull system access, user management, configuration
ManagerOversee operations, approvals, reporting
Sales RepresentativeCustomer management, quotations, sales orders
Purchase OfficerVendor management, purchase orders, stock
AccountantFinancial transactions, expense tracking, reports
Warehouse StaffInventory management, stock adjustments
ViewerRead-only access for auditors or executives

User Status Management

Active Users:

  • Can log in to the system
  • Have full access based on assigned roles
  • Appear in selection lists and reports
  • Can perform permitted actions

Inactive Users:

  • Cannot log in to the system
  • Preserve historical data (created by, modified by)
  • Do not appear in active user selections
  • Can be reactivated if needed

Status Change Reasons:

  • Employee Resignation: Set to inactive
  • Role Change: Update role or create new account
  • Leave of Absence: Temporarily deactivate
  • Contract End: Deactivate contractor accounts
  • Security Concerns: Immediate deactivation

Best Practices for User Management

1. Principle of Least Privilege

  • Grant minimum permissions needed for job function
  • Start with restrictive roles, add as needed
  • Regularly review and revoke unnecessary access

2. Timely User Updates

  • Create accounts promptly for new hires
  • Deactivate immediately when employees leave
  • Update roles when responsibilities change
  • Remove temporary access when no longer needed

3. Consistent Naming Conventions

  • Use full legal names for clarity
  • Company email addresses as primary identifier
  • Avoid duplicate or similar usernames

4. Secure Authentication

  • Enforce strong password policies
  • Implement two-factor authentication for sensitive roles
  • Regular password rotation requirements
  • Single Sign-On (SSO) integration if available

5. Documentation

  • Maintain user-role matrix documentation
  • Document approval process for new accounts
  • Keep records of access reviews

6. Regular Audits

  • Quarterly review of all active users
  • Verify appropriate role assignments
  • Remove orphaned or unused accounts
  • Document audit findings and actions

User Lifecycle Management

Onboarding Process:

  1. Request: Manager requests new user account
  2. Approval: Authorized approver validates request
  3. Creation: Administrator creates user account
  4. Role Assignment: Appropriate roles assigned
  5. Credential Delivery: User receives login information
  6. Training: User learns system functionality
  7. Verification: Confirm user can access required features

Role Change Process:

  1. Notification: HR or manager communicates role change
  2. Review: Evaluate new permission requirements
  3. Update: Modify role assignments
  4. Verify: Confirm appropriate access levels
  5. Document: Record change for audit trail

Offboarding Process:

  1. Notification: HR or manager initiates offboarding
  2. Immediate Deactivation: Disable user access
  3. Data Handover: Transfer ownership of active records
  4. Access Removal: Remove from all systems
  5. Final Verification: Confirm account is inactive
  6. Documentation: Record offboarding date and reason

Integration with Other Modules

Roles and Permissions:

  • Role Assignment: Users inherit permissions from roles
  • Custom Roles: Create roles for specific user groups
  • Permission Boundaries: Define what users can access

Activity Logs:

  • User Tracking: Every action is logged with user information
  • Audit Trail: Know who created, modified, or deleted records
  • Compliance: Meet regulatory requirements for accountability

Reports:

  • User Activity Reports: Track user login and activity
  • Permission Reports: Document user access levels
  • Productivity Metrics: User performance analysis

Notifications:

  • Email Alerts: Users receive system notifications
  • Task Assignments: Work items assigned to specific users
  • Approval Requests: Notifications for pending approvals

Common Scenarios and Solutions

Scenario 1: New Employee Joining

Solution:

  1. Create user account before start date
  2. Assign role matching job responsibilities
  3. Send welcome email with login instructions
  4. Schedule training session

Scenario 2: Employee Resignation

Solution:

  1. Deactivate account on last working day
  2. Transfer open tasks to another user
  3. Document account closure
  4. Preserve user records for historical data integrity

Scenario 3: Forgotten Password

Solution:

  1. Use "Forgot Password" self-service if enabled
  2. Administrator can trigger password reset
  3. Temporary password with forced change on login

Scenario 4: Multiple Users Share Account

Solution:

  1. Create individual accounts for each person
  2. Assign appropriate roles individually
  3. Train on proper account usage
  4. Audit shared account usage and eliminate practice

Scenario 5: Contractor Access

Solution:

  1. Create account with clear expiration date
  2. Assign limited, role-appropriate permissions
  3. Set calendar reminder for access review
  4. Deactivate promptly at contract end

Scenario 6: User Needs Temporary Higher Access

Solution:

  1. Create temporary role with additional permissions
  2. Assign temporarily with expiration date
  3. Document justification and approval
  4. Auto-revoke at specified date

Reports and Analytics

Available User Reports:

  1. Active Users Report: All currently active user accounts
  2. User-Role Matrix: Mapping of users to assigned roles
  3. Inactive Users: Users deactivated within a period
  4. User Activity Summary: Login frequency and activity levels
  5. New Users: Users created within date range
  6. Permission Coverage: Access levels across organization

Key Metrics to Monitor:

  • Total Active Users: Number of users currently accessing system
  • Users by Role: Distribution across different roles
  • User Growth: Rate of new user creation
  • Inactive Rate: Percentage of users deactivated
  • Role Density: Average roles per user