Overview
This guide gives an overview of how to manage users and user permissions in your Persona organization. This guide is written for people who are considered "administrators" of the Persona organization.
Background
- Read Roles and permissions overview. We'll refer to these concepts below.
Prerequisites
- In order to manage users and their permissions, you must be assigned the permissions to edit users and roles in your organization.
Create and manage users
As people join or leave your organization, you will need to invite new users and deactivate users who should no longer be able to access the Persona dashboard. These guides explain how:
Create and manage roles
To grant permissions to users, you assign them one or more roles that have the permissions you want to grant. See these guides for detailed instructions:
Manage user sign in
Persona offers Single Sign On (SSO) and two-factor authentication (2FA).
Single Sign On (SSO)
SSO can help you more easily manage many users. SSO is available on Growth and Enterprise plans. See our Pricing page for details.
To enable SSO, navigate to the Organization Security page, and click Set up. For additional instructions, see:
- Persona dashboard: SAML-based single sign-on (SSO) with Okta
- Persona Dashboard: Setting up Google SSO
Two-factor authentication (2FA)
2FA adds an extra layer of security to user sign ins. For more details, see Persona Dashboard: two-factor authentication (2FA).
Available 2FA methods
Persona supports email, SMS, and applications that produce a one-time code (e.g. Authy, 1Password). As an admin, you can choose which of these methods to allow.
User preferences
Each individual user can opt into 2FA by visiting the Security section of their Profile.
Require 2FA
As an admin, you have the option to enforce 2FA for all users for their organization.
Note that once enforced, any user who does not have a 2FA method configured will be locked out of their account.
Help a user regain access
A user may lose access to their Persona account, if they did not have a 2FA method configured before you required 2FA, or if they lose access to their 2FA method (e.g. their phone or email).
To help them regain access, you can issue a user a one time recovery code. See: Help user sign in after they lose 2FA method