Users, Roles & Permissions
Create and manage user accounts, assign module-level roles, configure two-factor authentication, and audit user activity.
User Accounts
Each person who accesses BlueRockTEL has a user account with:
- A unique email address (used for login and notifications)
- A display name
- One or more roles
- A status:
Active,Invited(not yet logged in), orSuspended
Manage users at Settings → Users.
Roles
A role is a named set of permissions. BlueRockTEL ships with five built-in roles:
| Role | Access |
|---|---|
| Administrator | Full access to all modules, settings, and user management |
| Sales | CRM, Deployments (read-only) |
| Operations | Deployments, Helpdesk |
| Billing | Billing, Debt Recovery |
| Support | Helpdesk, Customer Satisfaction |
Custom Roles
Administrators can create custom roles with fine-grained permissions:
- Navigate to Settings → Roles
- Click New Role
- Name the role and select which modules it can access
- For each module, set the access level:
None,View,Edit, orManage - Save and assign to users
Assigning Multiple Roles
A user can have multiple roles. Their effective permissions are the union of all assigned roles' permissions. For example, a user with both Sales and Support roles can access CRM, Deployments, Helpdesk, and Customer Satisfaction.
Inviting a New User
- Navigate to Settings → Users
- Click Invite User
- Enter the user's email address
- Assign one or more roles
- Click Send Invitation
The user receives an email with a link to set their password. The link is valid for 72 hours. If it expires, you can resend from the user's detail page.
Two-Factor Authentication (2FA)
2FA can be enforced at the organisation level for all users, or left as optional for individuals.
To enforce 2FA:
- Navigate to Settings → Security
- Enable Require 2FA for all users
- Users are prompted to configure 2FA on their next login
Supported 2FA methods:
- TOTP (Google Authenticator, Authy, etc.)
- Email OTP (one-time code sent to the user's email)
Audit Log
Every significant action in BlueRockTEL is recorded in the Audit Log (Settings → Audit Log):
- User logins and logouts
- Data creation, edits, and deletions
- Billing runs and invoice generation
- Permission and role changes
The audit log is immutable and retained for a minimum of 12 months. It can be exported as CSV for compliance or investigation purposes.
Suspending a User
If a team member leaves:
- Navigate to Settings → Users
- Open the user's profile
- Click Suspend
Suspended users cannot log in. Their data (tickets, deals, activities) is retained and remains visible. You can reactivate a suspended user at any time.
On this page