Admin Dashboard user guide
Introduction
Overview
IAM Admin Dashboard is an essential tool for company admins who need to maintain security, control access, and manage employees effectively. With its user-friendly interface and comprehensive features, this software ensures that administrators can perform critical tasks with ease and confidence.
Purpose
IAM Admin Dashboard is an intuitive, powerful software platform designed to give company administrators complete control over employee accounts, device usage, and access management. This tool streamlines administrative tasks and enhances security by offering comprehensive monitoring and management features.
Key features
Employee Monitoring and Device Management:
Block/Unblock Devices: Admins can remotely block or unblock devices that are linked to the company's network or employee accounts, ensuring security and compliance.
Unlink Devices: Admins have the ability to unlink devices from specific accounts, offering flexibility and control over company assets.
Employee Onboarding:
Admins can easily onboard new employees by creating and configuring accounts in a few simple steps, providing a seamless entry experience for new team members.
Geo-location Access Management:
The platform enables admins to monitor and manage geo-location access for employees. They can restrict or grant access based on the employee’s location, ensuring that sensitive company data is only accessible in authorized regions.
Network Access Management:
Admins can control network access, defining which employees or devices can connect to the company's network and ensuring that only authorized users are granted access to critical systems and data.
Benefits:
Enhanced Security: Monitor and manage devices and accounts for security and compliance.
Operational Efficiency: Simplify administrative tasks such as onboarding and access control.
Flexibility & Control: Easily adjust access settings based on employee location and device usage.
Centralized Management: Consolidate employee and device management under a single platform, streamlining workflows.
Getting Started
When a new system is set up, the very first account created will automatically be assigned the role of Super Admin. This feature ensures that the initial user has full access to all administrative controls from the moment they start using the system.
How It Works:
First Account Creation: The very first user account created within the system is automatically granted Super Admin privileges.
Super Admin Privileges: The Super Admin has unrestricted access to all system features and settings, including managing user roles, configuring security protocols, and controlling system-wide settings.
System Initialization: This role is intended to help with initial setup tasks, including onboarding new users, configuring the platform, and ensuring that the system is secure from the start.
Navigating the interface
- IAM Admin Dashboard login
is the entry point for administrators to securely access the system and manage their organization’s settings, users, devices, and resources. With a user-friendly design and robust security measures, this login page ensures that only authorized administrators can gain access to sensitive system functionalities
Dashboard
The dashboard is your command center, offering a clear, visual snapshot of your system’s key metrics at a glance. Designed for effortless navigation, it empowers administrators to efficiently track user and device license consumption, optimize resources, and uncover valuable insights—all in real time. Stay informed, stay in control.
User Management The user management page puts administrators in full control, making it easy to view, onboard, manage, and block users effortlessly. With a comprehensive overview of all registered users, this powerful tool streamlines account management and access control. Whether welcoming new employees or restricting unauthorized users, admins can efficiently maintain security and compliance with just a few clicks.
Device Management The device manage page provides administrators with full control over the devices registered in the system, allowing them to view, monitor, and manage device access with ease. Admins can see which devices are linked to specific users, and take action to block or unblock devices as needed, ensuring better security and resource management.
Event Logs The logs page is your system’s digital ledger, capturing every action and event with precision. Each log entry is securely hashed for integrity and pushed to a blockchain, ensuring tamper-proof, immutable storage. With this robust tracking system, you gain complete transparency, accountability, and security across all system interactions—keeping your data protected and auditable at all times.
Policies (Geofencing and Network Origin)
Geofencing Policy
The geofencing policy page enhances security with location-based access control, allowing administrators to define specific geographic regions where employees can or cannot access the system. By integrating geolocation data with access policies, this feature ensures that sensitive data and resources remain protected, accessible only from authorized locations. Prevent unauthorized access based on physical location and strengthen your security strategy with precise, location-aware controls.
The network policy page empowers administrators to enforce secure access by controlling system entry based on users’ network origins. By setting precise rules to allow or deny access from specific networks or IP addresses, organizations can add a robust layer of protection. Ideal for corporate environments, remote work scenarios, and high-security operations, this feature ensures that only trusted networks can connect—keeping your system secure from unauthorized access.
License The license page allows administrators to efficiently manage and monitor the software licenses provided to their organization. It provides an interface to add new licenses, view the status of active and inactive licenses, and offers a comprehensive visualization of license consumption through interactive pie charts. This feature ensures that administrators can easily keep track of license usage, avoid overutilization, and make data-driven decisions to optimize resource allocation.
Features and Functions
This section provides a comprehensive overview of the system's features, detailing their functionality and offering step-by-step instructions on how to effectively use each feature. It serves as a guide to help users navigate the system, understand its capabilities, and maximize their experience with it.
Dashboard
Central hub that provides a graphical and easy-to-understand view of your system's key metrics. It allows administrators to quickly monitor and manage user and device license consumption, as well as gain insights into other critical data points.
User Management
Allows administrators to view, manage, onboard, and block users within the system. This feature provides a comprehensive overview of all registered users, streamlining the process of managing user accounts and access. Whether you're onboarding new employees or blocking access to unauthorized users, this feature gives admins full control over user management.
Key Features:
View All Registered, Onboarding and Blocked Users:
User Directory: Admins can see a complete list of all users currently registered, onboarding and blocked in the system, with detailed information such as names, email addresses, roles, linked devices and account statuses.
Search & Filters: Easily search for specific users by name, email, or role. Admins can also apply filters to view users based on their information or role (admin, view access, no access).
User Overview
provides a streamlined and concise view of essential user information, helping administrators or users themselves quickly access and manage key account details. It displays critical data about the user's account, including unique identifiers, registration details, status, and activity timestamps.
Profile
provides a comprehensive and easily accessible summary of the user's personal information. It allows the admin to view and update the account details efficiently, offering a user-friendly interface to ensure smooth interaction.
Devices
Provides users with an overview of all devices currently linked to their account. This feature allows users to view and manage their connected devices, ensuring better control and security over where and how their account is being accessed.
Events
Allows users to view a comprehensive history of all events related to the selected user. This feature provides an organized, easy-to-read timeline of past activities, events, and interactions associated with the selected user, offering valuable insights into their engagement, behavior, and account usage.
Access Control
Feature enables administrators to manage user access at multiple levels, ensuring the right users have the appropriate permissions to interact with the system. This feature includes functionalities for device management, user blocking/unblocking, and role management. Together, these capabilities give admins a comprehensive way to control access, enhance security, and ensure that users are granted appropriate privileges within the platform.
Dashboard Role
Admins can assign or change user roles, allowing for easy management of access levels within the system. By default, new accounts have No Access role
Access Management
Provides admins with the ability to control and manage user access to the system by allowing them to block or unblock users.
Device Registration
Admins can allow the onboarding user to proceed with registration by creating the wallet secure code.
Device Management
Provides administrators with full control over the devices registered in the system, allowing them to view, monitor, and manage device access with ease. Admins can see which devices are linked to specific users, and take action to block or unblock devices as needed, ensuring better security and resource management.
Key Features:
Device list
Provides an intuitive interface for managing and viewing all devices registered and associated with a particular user.
Device details
Provides a comprehensive view of individual devices, offering all relevant information and insights about each device, including its association with the user.
Block Device
Allows administrators to restrict access to the system by disabling a specific device. When a device is blocked, the user associated with that device will be unable to log in or access any system resources through that device, ensuring security and control over unauthorized or compromised devices.
Event Logs
Feature records all actions and events that occur within the system, ensuring that every activity is securely tracked and auditable. After logging these events, the system hashes each log entry for integrity and pushes it to a blockchain for immutability and tamper-proof storage. This ensures transparency, accountability, and security across all system interactions.
Key Features:
Logs list
Provides a comprehensive view of system logs, allowing administrators to monitor and track activities within the system. It offers detailed records of actions performed by users, devices, and the system itself. This feature helps in auditing, troubleshooting, and ensuring the security and efficiency of system operations.
Logs level
Categorizes system logs based on their severity and importance, ranging from Info to Audit and down to Errors. This classification helps administrators easily prioritize and address different types of events, ensuring efficient monitoring and issue resolution.
Policies
Geofencing Policy
Enables administrators to define specific geographic regions where employees are allowed or denied access to the system. By integrating geolocation data with access control policies, administrators can enhance security by ensuring that sensitive data or resources are only accessible from authorized locations. This feature helps to prevent unauthorized access based on physical location, providing a powerful tool for managing access controls.
Key Features:
Geofencing Policy list
Allows administrators to view and manage all geofencing policies that have been added to the system. This feature offers an organized view of geofencing rules, locations, and configurations, helping administrators easily track and adjust geofencing policies for enhanced location-based control.
Add Policy
Allows administrators to create customized location-based access rules using a world map for easy visualization. This feature enables admins to define specific regions with a set radius, where they can either allow or deny access to the system based on users or devices entering or leaving that region.
Edit Policy
Enables administrators to modify existing geofencing policies, allowing for updates to the geographic boundaries, access rules, and other configurations.
Delete Policy
Allows administrators to remove outdated or unnecessary geofencing policies from the system, ensuring that the geofencing rules remain relevant and organized.
Network Origin Policy
Allows administrators to control access to the system based on the network from which users are connecting. By defining rules to allow or deny access based on network origin, administrators can add an extra layer of security, ensuring that only authorized networks or IP addresses can access the system. This feature is particularly useful for organizations with strict security needs, such as those requiring access control for corporate networks, remote work, or preventing access from untrusted networks.
Key Features:
Network Origin Policy list
Provides administrators with a comprehensive view of all network policies that have been created and applied within the system. This feature helps manage and track access control rules based on IP addresses and subnet masks, allowing for efficient policy monitoring and updates.
Add Network Origin policy
Allows administrators to create customized access rules based on a user's IP address and subnet mask, enabling granular control over network access. This feature ensures that users and devices can only access the system from specific, trusted IP addresses or network segments
Edit Network Origin policy
Allows administrators to modify existing network policies, enabling them to update access rules based on IP addresses, subnet masks, and other policy details.
Delete Network Origin policy
Allows administrators to remove unnecessary or outdated network access policies from the system, ensuring that only relevant and current policies are enforced.
License
Feature allows administrators to efficiently manage and monitor the software licenses provided to their organization. It provides an interface to add new licenses, view the status of active and inactive licenses, and offers a comprehensive visualization of license consumption through interactive pie charts. This feature ensures that administrators can easily keep track of license usage, avoid overutilization, and make data-driven decisions to optimize resource allocation.
Key Features:
License List
Provides a comprehensive view of all the licenses associated with the system, displaying both active and expired licenses. It also offers visual insights into the utilization of user and device slots.
Add license
Allows administrators to seamlessly add multiple licenses to the system, offering flexibility and ease in license management. It supports both manual input and QR code scanning for faster and more accurate license registration.
Supports Multiple Licenses at Once Administrators can add multiple licenses simultaneously, streamlining the process and saving time.
Manual License Input The feature allows for the manual entry of license details
QR Code Scanning for License Input For added convenience and speed, the system supports scanning of QR codes to input license information automatically. This feature eliminates the need for manual data entry, reducing errors and improving the efficiency of license registration, especially when licenses come with QR codes for quick activation.
Delete License
Allows administrators to efficiently remove expired licenses from the system, keeping the license list organized and up to date.
Support and Contact Information
Issues and Reports
You can initially reach out by sending email to support@digicorplabs.com. Please include the following details so that we can assist your more effectively:
Your Full Name
Your Account Number (if applicable)
A Brief Description of the Issue or Inquiry
Any Error Messages or Screenshots (if relevant)
Steps to Reproduce the Issue (if applicable)
Response Time
Our customer support team will respond to your email within 2 - 3 business days. If the issue requires more time to resolve, we will keep you updated on the progress
Last updated