Quick Reference: HelloID tenant and user management configuration
This Quick Reference guide helps you quickly locate key tenant and user management configuration details in HelloID. Use this guide and the Quick Reference guides for the modules that your organization uses to get familiar with your HelloID environment.
It is recommended to also use it as a checklist - for example, quarterly - to regularly verify and update settings as your organization’s needs change.
All of these settings are found on the Admin dashboard.
To learn how to switch between dashboards in HelloID, see Navigate the HelloID Interface.
Setting | On the Admin dashboard, go to | See |
|---|---|---|
Which HelloID modules does the organization have? | Licensing widget | |
Are any Agents installed? If so, is the setup redundant - i.e. installed on multiple servers within the same agent pool to ensure high availability, or is it installed on a single server? This is especially important if the HelloID Directory agent service is used for authentication. | Agents | |
What are the company settings? (E.g. mail domain, custom domain, standard ‘from’ address) | Settings > Company | |
Are incident notifications sent to a valid email address? | Settings > Company > Incidents | |
What are the portal access rules? | Security > Portal access rules | |
What is the source of the users and groups in HelloID? Is there a Directory sync, e.g. with Active Directory (with agent), Google Workspace (previously: G Suite), or Entra ID (previously: Azure AD)? Or is HelloID (Access Management) a target system of Provisioning? | Directory > AD/Google/Azure AD Automation > Tasks, Task history
| |
Do you have a "local" backup admin user available in case the Identity Provider is not available? | Directory > Users | |
Which service is configured as Identity Provider with HelloID: Active Directory agent, AD IDP (IIS Service), Gsuite, EntraID or any other SAML provider? | Security > Authentication > Identity providers | |
Which authentication methods are used? If using OATH tokens, which users are assigned to them? What are the sign-on policies? | Security > Password, 2FA Security > Password, OAUTH Security > Policies > Sign on policies | |
Which roles are there? Per role, which users/groups are assigned to it? Are all those who need to have access to Audit logs - e.g., a compliance officer - member of the group(s) who are able to view/create Elastic reports? | Security > Roles Security > Roles > ElasticRead/ElasticWrite > Groups |
