User Access
Control who has access to Tether and what they can do. User access management ensures the right people have the right permissions.User access management requires Admin permissions.
Understanding User Roles
Tether has two primary roles:| Role | Description |
|---|---|
| Admin | Full access to all features |
| Sales Rep | Limited access based on assignments |
Admin Capabilities
Admins have full access:- All SKUs and collections
- All channels and warehouses
- All transactions
- All settings and configuration
- User management
- Integrations
Sales Rep Capabilities
Sales Reps have restricted access:- View assigned channels only
- View forecasts for assigned scope
- Limited or no transaction management
- No settings access
- No user management
Managing Users
Accessing User Management
User List
| Column | Description |
|---|---|
| Name | User’s display name |
| User’s email address | |
| Role | Admin or Sales Rep |
| Status | Active or Inactive |
| Last Active | Recent activity date |
Inviting Users
Adding a New User
Invitation Process
- User receives email invitation
- User clicks link to accept
- User creates password
- User can access Tether
Configuring Permissions
Channel-Based Access
Control which channels users can see:Hierarchy-Based Access
Assign access at hierarchy levels:| Level | Access Granted |
|---|---|
| All Channels | Everything |
| Channel Type | All channels of that type |
| Region | All channels in region |
| Individual | Specific channels only |
Editing Users
Changing User Role
Updating Channel Access
Deactivating Users
When to Deactivate
- Employee leaves company
- Role change doesn’t require access
- Temporary suspension
Deactivation Process
Effects of deactivation:
- User cannot log in
- User retains in system for records
- Can be reactivated later
Reactivating Users
- Find deactivated user
- Click Reactivate
- Confirm reactivation
Access Control Best Practices
Principle of Least Privilege
Principle of Least Privilege
Grant minimum necessary access:
- Only needed channels
- Only needed features
- Review regularly
Regular Access Reviews
Regular Access Reviews
Periodically review users:
- Check active users still need access
- Verify role assignments
- Update channel access
Prompt Deactivation
Prompt Deactivation
When employees leave:
- Deactivate immediately
- Don’t wait for cleanup
- Document the change
Document Access Decisions
Document Access Decisions
Keep records of:
- Why access was granted
- Who approved
- When reviewed
Security Considerations
Password Requirements
Users must create secure passwords:- Minimum length requirements
- Complexity requirements
- No password reuse
Session Security
| Feature | Description |
|---|---|
| Session Timeout | Auto logout after inactivity |
| Single Session | One active session per user |
| Secure Connection | HTTPS required |
Audit Trail
User actions are logged:- Login/logout events
- Data changes
- Settings modifications
Troubleshooting
User Can’t Log In
Possible causes:- Incorrect password
- Account deactivated
- Invitation not accepted
- Verify account is active
- Check invitation was accepted
- Reset password if needed
User Missing Data
Possible causes:- Channel not assigned
- Filters applied
- Role restrictions
- Review channel assignments
- Check user’s filters
- Verify role permissions
Invitation Not Received
Possible causes:- Email in spam
- Incorrect email address
- Email delivery issues
- Check spam folder
- Verify email address
- Resend invitation