Skip to main content

User Management

Manage user accounts, roles, and permissions across your SquawkVoice platform. Control access, assign responsibilities, and ensure secure collaboration among team members.

Overview

User management enables you to control who can access your SquawkVoice platform and what they can do. Create user accounts, assign appropriate roles, and manage permissions to ensure secure and efficient platform usage.

User Management Benefits

  • Secure Access Control: Manage who can access your platform and data
  • Role-Based Permissions: Assign appropriate access levels based on responsibilities
  • Team Collaboration: Enable multiple users to work together efficiently
  • Audit Trail: Track user activities and changes for compliance
  • Scalable Administration: Manage users as your organization grows

User Roles and Permissions

Understanding User Roles

SquawkVoice provides predefined roles with specific permissions and access levels:

Administrator

Full access to all platform features, settings, and user management. Can create, modify, and delete any resource.

Manager

Can manage AI agents, view analytics, and configure platform settings. Cannot manage other users or billing.

Agent Builder

Can create and configure AI agents, manage knowledge bases, and view call history. Limited access to analytics.

Analyst

Can view analytics, reports, and call history. Read-only access to agent configurations and platform data.

Permission Categories

Permissions are organized into logical categories for easy management:
  • Create and configure AI voice agents
  • Manage agent settings and behaviors
  • Deploy and activate agents
  • Delete and archive agents
  • Upload and manage documents
  • Create and configure knowledge bases
  • Organize and categorize content
  • Delete and update knowledge base items
  • View analytics dashboards
  • Access call history and transcripts
  • Generate reports and exports
  • Monitor performance metrics
  • Create and manage user accounts
  • Assign roles and permissions
  • Monitor user activity
  • Manage team access
  • Configure platform-wide settings
  • Manage integrations and APIs
  • Control billing and subscriptions
  • Set security and compliance policies

Creating and Managing Users

Adding New Users

  1. Navigate to Manage > Users in the SquawkVoice Studio
  2. Click Add User to create a new user account
  3. Fill in the required information:
Full Name
string
required
Enter the user’s complete name for identification and display purposes.
Email Address
email
required
Primary email address for account access and notifications.
Role
select
required
Select the appropriate role based on the user’s responsibilities and access needs.
Account Access
multi-select
Specify which accounts the user can access (for multi-account setups).
Workspace Access
multi-select
Define which workspaces the user can access within their assigned accounts.

User Invitation Process

  1. Send Invitation: User receives an email invitation to join the platform
  2. Account Setup: User creates password and completes profile setup
  3. Access Verification: User can access assigned features and resources
  4. Onboarding: User receives welcome materials and training resources
Users must accept the invitation within 7 days. After that, you’ll need to resend the invitation.

User Profile Management

Profile Information

Manage comprehensive user profile information:
Profile Picture
image
Upload a profile picture for easy identification.
Job Title
string
User’s job title or role within the organization.
Department
string
User’s department or team assignment.
Contact Information
object
Additional contact details including phone number and location.

Account Settings

Configure user-specific account settings:

Notification Preferences

  • Email notification settings
  • SMS alert preferences
  • In-app notification controls
  • Alert frequency and timing

Security Settings

  • Password requirements and policies
  • Multi-factor authentication setup
  • Session timeout preferences
  • Login history and monitoring

Language and Region

  • Interface language preferences
  • Time zone and date format settings
  • Regional compliance settings
  • Localization preferences

Access Preferences

  • Default dashboard views
  • Favorite and pinned items
  • Custom workspace layouts
  • Personalization settings

Role Management

Custom Roles

Create custom roles for specific business needs:
Role Name
string
required
Choose a descriptive name for the custom role (e.g., “Support Manager”, “Sales Analyst”).
Role Description
string
Provide a clear description of the role’s purpose and responsibilities.
Permissions
multi-select
required
Select specific permissions that this role should have access to.
Account Scope
multi-select
Define which accounts this role can access and manage.

Permission Granularity

Fine-tune permissions for precise access control:
  • View agents and configurations
  • Access analytics and reports
  • Read call history and transcripts
  • View user profiles and settings
  • Create and modify agents
  • Update knowledge base content
  • Configure platform settings
  • Manage user accounts
  • Remove agents and configurations
  • Delete knowledge base items
  • Archive call history
  • Deactivate user accounts
  • Manage billing and subscriptions
  • Configure security settings
  • Access system logs and audits
  • Override other user permissions

User Activity Monitoring

Activity Tracking

Monitor user activities and platform usage:
Login History
log
Track user login times, locations, and device information.
Action Logs
log
Record all user actions and changes made to the platform.
Session Analytics
metric
Monitor session duration, activity patterns, and feature usage.
Performance Metrics
metric
Track user productivity and platform utilization.

Security Monitoring

Ensure platform security through comprehensive monitoring:

Access Monitoring

  • Track login attempts and failures
  • Monitor unusual access patterns
  • Detect potential security threats
  • Alert on suspicious activities

Data Access Logs

  • Record all data access and downloads
  • Track file and document access
  • Monitor API usage and calls
  • Log configuration changes

Permission Changes

  • Track role and permission modifications
  • Monitor user account changes
  • Log administrative actions
  • Audit trail for compliance

System Events

  • Monitor system health and performance
  • Track integration and API events
  • Log error and warning messages
  • Alert on critical system issues

Team Collaboration

Team Organization

Organize users into teams for better collaboration:
Team Name
string
required
Create descriptive team names (e.g., “Customer Support”, “Sales Team”, “Technical Support”).
Team Members
multi-select
Add users to teams for shared access and collaboration.
Team Permissions
object
Configure permissions that apply to all team members.
Team Resources
multi-select
Assign shared resources and workspaces to teams.

Collaboration Features

Enable team collaboration and communication:

Shared Workspaces

  • Collaborative agent development
  • Shared knowledge base management
  • Team analytics and reporting
  • Common resource access

Communication Tools

  • Team chat and messaging
  • Notification and alert sharing
  • Comment and feedback systems
  • Collaborative documentation

Workflow Management

  • Task assignment and tracking
  • Approval workflows and processes
  • Status updates and progress tracking
  • Deadline management

Knowledge Sharing

  • Best practices documentation
  • Training materials and guides
  • Experience and insights sharing
  • Team learning and development

Security and Compliance

Access Control

Implement robust access control measures:

Authentication

  • Multi-factor authentication (MFA)
  • Single sign-on (SSO) integration
  • Password policies and complexity
  • Session management and timeout

Authorization

  • Role-based access control (RBAC)
  • Permission inheritance and delegation
  • Resource-level access control
  • Dynamic permission assignment

Audit and Monitoring

  • Comprehensive audit logging
  • Real-time activity monitoring
  • Security event detection
  • Compliance reporting

Data Protection

  • Data encryption and security
  • Privacy and confidentiality controls
  • Data retention and deletion policies
  • Regulatory compliance measures

Compliance Features

Meet regulatory and industry requirements:
  • Data protection and privacy controls
  • Right to erasure and data portability
  • Consent management and transparency
  • Data processing agreements
  • Security, availability, and confidentiality
  • Regular security assessments and audits
  • Incident response and monitoring
  • Risk management and mitigation
  • ISO 27001 for information security
  • PCI DSS for payment processing
  • HIPAA for healthcare data
  • Industry-specific certifications
  • Company-specific security policies
  • Data handling and privacy guidelines
  • User conduct and acceptable use
  • Incident reporting and response

User Lifecycle Management

Onboarding Process

Streamline new user onboarding:

Account Setup

  • Automated account creation
  • Role assignment and permissions
  • Initial configuration and settings
  • Welcome materials and training

Training and Support

  • Platform orientation and training
  • Role-specific skill development
  • Best practices and guidelines
  • Ongoing support and assistance

Access Provisioning

  • Resource and workspace access
  • Integration and API access
  • Tool and system permissions
  • Collaboration and team access

Performance Monitoring

  • Usage tracking and analytics
  • Performance assessment and feedback
  • Skill development and improvement
  • Success metrics and goals

Offboarding Process

Ensure secure and complete user offboarding:
Access Revocation
process
Remove all platform access and permissions immediately upon departure.
Data Transfer
process
Transfer user’s work and responsibilities to appropriate team members.
Account Cleanup
process
Archive or delete user account and associated data according to policies.
Compliance Verification
process
Ensure all compliance requirements are met during offboarding.

Best Practices

User Management

  1. Clear Role Definitions: Define roles with specific responsibilities and permissions
  2. Principle of Least Privilege: Grant only necessary access to users
  3. Regular Reviews: Periodically review user access and permissions
  4. Documentation: Maintain clear documentation of roles and responsibilities

Security

  1. Strong Authentication: Implement multi-factor authentication for all users
  2. Access Monitoring: Regularly monitor user activities and access patterns
  3. Security Training: Provide regular security awareness training
  4. Incident Response: Have clear procedures for security incidents

Collaboration

  1. Team Organization: Organize users into logical teams and groups
  2. Communication: Establish clear communication channels and protocols
  3. Knowledge Sharing: Encourage sharing of best practices and insights
  4. Continuous Improvement: Regularly assess and improve team effectiveness

Troubleshooting

  • Verify user account status and permissions
  • Check role assignments and access levels
  • Review account settings and configurations
  • Contact support for access assistance
  • Review role definitions and permissions
  • Check account and workspace access
  • Verify inheritance and delegation settings
  • Update permissions as needed
  • Check login credentials and password status
  • Verify multi-factor authentication setup
  • Review session timeout and security settings
  • Contact support for authentication assistance
  • Verify team membership and access
  • Check shared resource permissions
  • Review communication and notification settings
  • Ensure proper team organization and structure

Next Steps

Now that you understand user management, explore these related topics: