Process Mining
2021.10
false
Banner background image
Process Mining
Last updated Apr 2, 2024

End user administration

Introduction

If this is the first release that has been activated, the next step should be to create users and configure their access rights. Normally, this can be done by a user administrator, but, initially, this must be done by a Superadmin user, because the default end user account has no password set for security reasons.

A Superadmin user can configure end user access rights by impersonating an end user administrator.

Follow these steps to impersonate an administrator.

Step

Action

1

Go to the Superadmin Releases tab.

2

Click on the menu icon in the top-left and select Open end-user administration….

3

Click on OPEN.

The Users tab is displayed. See illustration below.



Adding end user accounts

The user administrator has the possibility of creating a new end user account. A login name, email address and name can be set.

Note: You can only create end users accounts on active environments, so environments which have a release active on them.

Follow these steps to add a new end user.

1

Click on NEW USER.

2

Enter a login user name in the Login Name field.

3

Enter a new user name in the Email address field.

4

Enter a new user name in the Name field.

5

Click on NEW USER.



The new user has now been added to the list of end users, and a random password will be generated. The password will be shown to the administrator in a popup. The administrator can send the password by e-mail to the user.

Send invitation by e-mail

If there is an SMTP server configured in the Server settings, a Send invitation e-mail check box will be present in the New user dialog. If this check box is left checked, you can confirm to send an e-mail by clicking on INVITE USER. An email with the password will automatically be sent to the user’s email. See illustration below.



Note: The generated password is only valid for 48 hours. This implies that the end user must change this password within 48 hours.

External authentication

In UiPath Process Mining it is possible to use external authentication to enable end users to log in using their Microsoft AD credentials. See: Adding End-user AD Groups.

Deleting end user accounts

Existing end user accounts can be deleted. Deleted users will no longer be able to log in.

Follow these steps to remove a new end user.

Step

Action

1

Click on the Delete button in the column of the user you want to delete.

2

Click on YES.

The deleted user is no longer in the list.

Changing end user passwords

The password for an individual user can be changed.

A password must:

  • Be at least 8 characters long.
  • Contain both an uppercase and a lowercase letter and a number or special character.

Follow these steps to change a password.

Step

Action

1

Click on the Change button in the column of the user you want to change the

password of.

2

Enter a new password in the New password field.

3

Enter the same password in the Confirm password field.

4

Click on CHANGE PASSWORD.

The password of the end user is now changed to the new password. To improve security, when logging in using this password, the end user is forced to enter a new password.

Note: Once you have changed the end user’s password, the new password is only valid for 48 hours. This implies that the end user must change this password within 48 hours.

Automatic password reset

If there is an SMTP server is configured in the Server settings, an end user's password can be reset automatically. When the user clicks on the Forgot your password? link in the Login dialog the user can enter an e-mail address to which an e-mail can be sent that contains a link to reset the password. See illustration below.



Managing end user account activation

End user accounts can be enabled and disabled. When an end user is disabled, the user will no longer be able to login.

Follow this step to enable an account.

Step

Action

1

Click on the check box in the Active column of the user.

This is a toggle check box. This means the user can login if the check box is checked or is restricted from logging in if it is unchecked.

Managing end user admin rights

End user accounts can be assigned admin rights. Doing so gives them access to the user administration page.

Follow these steps to assign admin rights.

Step

Action

1

Click on the check box in the Admin column of the user.

This is a toggle check box. This means the user has admin rights if the check box is checked, or is no longer an admin, if it is unchecked.

Managing end user App access

End user accounts can be limited from accessing certain apps. Only the apps to which users have access can be viewed by users. It is possible to assign an end user rights to view a specific app.

Follow these steps to assign end user rights to a specific app.

Step

Action

1

Go to the Applications tab in End-user administration.

2

Click on the check box in the App name column of the user.

This is a toggle check box. This means the user can view this specific app if the check box is checked, or that access is revoked if the check box is no longer checked.

Related information

See: Modules.

Was this page helpful?

Get The Help You Need
Learning RPA - Automation Courses
UiPath Community Forum
Uipath Logo White
Trust and Security
© 2005-2024 UiPath. All rights reserved.