Account Lifecycle Management
Account lifecycle management encompasses the complete journey of support user accounts within the TALON system. This process ensures proper onboarding, maintains security through status management, and handles secure deactivation when users leave the organization.
Access Requirements
Tier 1+ Access Required: Account lifecycle management requires Operational Support (Tier 1) or higher access levels. These operations affect user security and system access, requiring appropriate administrative privileges.
Important Distinction
This guide covers support user accounts for staff who access the TALON Support Dashboard. Member account management follows different processes and is covered in separate documentation.
Account Lifecycle Stages
User Onboarding Process
Pre-Invitation Requirements
Before creating a user account, gather the following information:
- Personal Information: Full name, email address
- Role Definition: Job title, department, reporting manager
- Access Requirements: Support tier level needed for their responsibilities
- Scope Limitations: Specific employer groups they will support
- Authorization: Manager approval for system access
Tier Limitations
Remember that you can only invite users to tier levels below your own. Tier 1 users can invite Tier 0 users, Tier 2 can invite Tier 0-1 users, and so forth.
Access the "Manage Users" section from the main dashboard.
Select the invitation option to begin the user creation process.
Enter name, email, and contact details for the new user.
Choose the support level for their role based on their responsibilities.
Send the invitation email to complete the initial setup.
Verify they received the invitation email and check spam folders if needed.
Offer assistance for initial password setup and account activation.
Set up employer group access restrictions based on their role.
Arrange onboarding training sessions to familiarize them with the system.
Record the user creation in your administrative records.
Account Status Management
User accounts can have different status levels that determine their access and capabilities within the system:
Account Status Types
User has full access to assigned functions and can perform all support activities within their tier level.
Available Actions: Modify access, change tier (if authorized), add/remove employer groups
Invitation sent but user hasn't completed initial setup. Account exists but login is not possible.
Available Actions: Resend invitation, cancel invitation, modify invitation details
Status Change Procedures
When changing account status, follow these procedures:
- Document the Reason: Record why the status change is being made
- Notify Stakeholders: Inform managers and team members of status changes
- Update Access Immediately: Ensure status changes take effect promptly
- Maintain Audit Trail: Keep records of who made changes and when
Access Control & Restrictions
Employer Group Restrictions
You can restrict users to specific employer groups for security and operational efficiency:
- Select the user from the user management list
- Click one or more employer groups to assign
- This restricts their access to only those groups
- Users can only see members and data from assigned groups
Use Cases for Restrictions
- Dedicated support teams for specific clients
- External contractors with limited scope
- Training environments with restricted access
- Compliance requirements for data segregation
Account Deactivation Process
When to Deactivate Accounts
- Employment Termination: Employee leaves the organization
- Role Changes: User no longer needs system access
- Security Violations: Policy breaches requiring access removal
- Extended Leave: Long-term absence (convert to suspended first)
- System Consolidation: Organizational changes affecting access needs
Data Retention
Always preserve user activity logs and support documentation for compliance and audit purposes. Follow your organization's data retention policies when archiving deactivated accounts.
Documentation Requirements
Proper documentation is critical throughout the account lifecycle. Different stages require specific documentation to maintain compliance and operational records:
Best Practices
Security Best Practices
- Principle of Least Privilege: Grant minimum access required for job functions
- Regular Access Reviews: Quarterly audits of user permissions and activity
- Immediate Deactivation: Remove access promptly when no longer needed
- Strong Documentation: Maintain detailed records of all account actions
Operational Best Practices
- Standardized Onboarding: Use consistent processes for all new users
- Clear Role Definitions: Ensure users understand their responsibilities
- Regular Training: Keep users updated on system changes and policies
- Proactive Monitoring: Watch for inactive accounts and unusual activity