Skip to main content

ThreatKey provides capabilities to manage your organization's users and their access to the platform. Key features include:

  • Adding and removing users
  • Organizing users into groups
  • Configuring user roles and permissions
  • Deactivating inactive users

Adding users

New ThreatKey users can be added by administrators via Settings > Users.

Required information includes:

  • Email address (used for accessing your ThreatKey account)
  • First and last name
  • User role assignment

An email invite is sent to new users prompting them to sign in.

Organizing users

Users can be organized into groups based on team, location, or other criteria. Groups allow collective management of users.

User details like name, email, and group can be edited from the user list. User roles and permissions can also be updated here.

Removing users

Deleting a user will immediately revoke their access. Any shared content will be transferred to the deleting admin.

Disabled users are deactivated but retained in the system with metadata intact. Their access is revoked. Disabled users can be reactivated at any time.