Skip to main content

Users

The Users page lets administrators manage who can access Stratora and what they can do. Users can be created locally or provisioned automatically from LDAP or OIDC identity providers.


Roles

Every user is assigned one of three roles. Roles determine what actions the user can perform across the platform. For the full permissions breakdown by feature area, see User Roles & Permissions.

Admin

Full access to everything in Stratora. Admins can manage users, configure identity providers, modify system settings, and perform all operational tasks.

Operator

Day-to-day operational access. Operators can create and manage nodes, deploy agents and collectors, run discovery scans, manage dashboards, alerts, and maintenance windows, but cannot access user management, system settings, or delete nodes.

Viewer

Read-only access. Viewers can see dashboards, nodes, alerts, and maps, but cannot make changes.


Permissions Breakdown

SectionAreaAdminOperatorViewer
MonitoringDashboardsView, create, edit, delete, shareView, create, edit, delete, shareView only
MonitoringRack diagramsView, create, edit, deleteView, create, edit, deleteView only
MonitoringReportsView, manageView, manageView only
MonitoringTopology mapsView, create, edit, deleteView, create, edit, deleteView only
InfrastructureIPAMView, manageView, manageView only
InfrastructureNode groupsView, manageView, manageView only
InfrastructureNodesView, create, edit, deleteView, create, editView only
InfrastructureSitesView, manageView, manageView only
CollectionAgentsDeploy, download, generate tokensDeploy, download
CollectionCollectorsView, manage, deployView, deployView only
CollectionCredentialsView, create, edit, delete, revealView (masked), attach/detachView (masked)
CollectionDiscoveryView, run, manageView, run, manageView only
CollectionEnrollment tokensView, create, reveal, deleteView, select existing
AlertingAlert configurationsView, editView, editView only
AlertingAlertsView, acknowledge, muteView, acknowledge, muteView only
AlertingContactsView, manageView, manageView only
AlertingEscalation teamsView, manageView, manageView only
AlertingMaintenanceView, manageView, manageView only
AdministrationLicenseView, manageView only
AdministrationSettingsView, modifyView only
AdministrationUsersView, manage
info

Credential access deserves special attention: Operators can see which credentials exist and attach them to nodes for monitoring, but they cannot view the actual secret values, create new credentials, or delete existing ones. Only Admins can reveal plaintext secrets. Viewers see credential names and types only — all secret fields are masked.


Managing Users

Creating a Local User

Navigate to Administration → Users and click Add User.

FieldRequiredDescription
UsernameYesUnique login name
EmailNoEmail address
Display NameNoFriendly name shown in the UI
PasswordYesMinimum 8 characters
RoleYesAdmin, Operator, or Viewer

Editing a User

Click on a user to edit their profile. You can change:

  • Email address
  • Display name
  • Role assignment
  • Active status
warning

Admins cannot change their own role or deactivate their own account. This prevents accidental lockout.

Resetting a Password

Admins can reset another user's password from the user detail view. When a password is reset:

  • All of the user's existing sessions are immediately invalidated
  • The user must log in with the new password

Password reset is only available for local accounts. Users who authenticate via LDAP or OIDC manage their passwords through their identity provider.

Disabling a User

Deactivating a user prevents them from logging in without deleting their account. All active sessions are terminated immediately. The account can be reactivated later.

The built-in admin account cannot be deactivated — this ensures there is always at least one way to access the system.

Deleting a User

Permanent deletion removes the user from the database entirely. The user's actions in the audit log are preserved (the username is stored independently of the user record).


Provisioned Users

Users who authenticate via LDAP or OIDC are created automatically on their first login. These provisioned users appear in the user list with their authentication source indicated.

BehaviorLocal UsersLDAP UsersOIDC Users
Password managed byStratoraActive DirectoryIdentity provider
Password change in StratoraYesNoNo
Role assignmentManualFrom AD group mappingsFrom IdP group mappings
Role refreshManualOn every loginOn every login
Profile sync (email, name)ManualOn every loginOn every login
tip

For provisioned users, role changes should be made in the identity provider (by adjusting group memberships), not in Stratora. The role is refreshed from the directory on every login, so manual role changes in Stratora would be overwritten.


Sessions

User sessions have the following characteristics:

  • Duration: 24 hours from login
  • Storage: Session tokens are SHA-256 hashed before storage — plaintext tokens are never persisted
  • Cleanup: Expired sessions are automatically purged every hour
  • Invalidation: All sessions are terminated when a password is reset or an account is deactivated
  • Multi-device: Users can have active sessions on multiple devices simultaneously

Default Admin Account

Every Stratora installation includes a default admin account:

  • Username: admin
  • A password change is required on first login
  • This account cannot be deactivated or deleted
  • It provides emergency access if identity provider integrations become unavailable