See below for registering users with the Cryptographic Security Platform built-in identity provider.

Management Console users are not to be confused with operating system users with permissions on the operations described in Command reference.

To create a user

  1. Open the following URL in a Web browser. 

    https://<machine>:8443/management-console

    Where <machine> is the IP address or domain name of the machine hosting Cryptographic Security Platform. 

    This release changes the URL port to 8443. Update your bookmarks accordingly.

  2. Log in to the Management Console as a user with a role granting user management permissions – for example, the initial admin administrator user. 
  3. Select Management Console > Identity Provider in the sidebar.
  4. Click Users in the sidebar of the user management console. 
  5. Click Add user.
  6. Fill in the values of the following forms.  

General

The user's general settings.

Field

Value

​Email verified

On if the user's email​ has been verified, Off otherwise

Username

The user's login name

Email

The user's email

First name

The user's first name

Last name

The user's last name

Groups

The groups the user belongs to. Click Join Groups to add the user to user groups

Click Create to continue with user creation. 

Details

The user's main details.

Field

Value

ID

The user's internal identifier generated by Cryptographic Security Platform 

Created at

The user's creation date

Email verified

On if the user's email​ has been verified, Off otherwise

Username

The user's login name

Email

The user's email

First name

The user's first name

Last name

The user's last name

Temporary locked

On if the user has been locked after multiple failed login attempts; Off otherwise .

Credentials

The user's login credentials.

  • Click Set password to set the user login password
  • Click Credential Reset to force a password change.
  • Click the three horizontal dots for Password and select Delete to remove the password.
  • Click the three horizontal dots for Password-history and select Delete to remove the password history.

See Authentication for details on the password policy requirements.

Role mapping 

The list of Roles the user belongs to.

  • Uncheck Hide inherited roles to display the roles inherited by the roles currently assigned to the user.
  • Click Assign Role to grant a role to the user.
  • Select a role and click Unassign to unassign.

Organizations

The organizations the user belongs to. 

Consents

The consents granted by client applications, if any.

The third-party identity providers allowing the user to authenticate in the administration console.