Inviting New Users
The user invitation process allows you to onboard new support team members with appropriate access controls and security measures.
Security & Access Control
As a Tier 1 support user, you can only invite and manage Tier 0 users (Member Support). The system enforces strict security controls - you cannot assign access levels higher than your own tier. This hierarchical security model ensures appropriate access management throughout the organization.
Prerequisites
Before inviting a new user, ensure you have gathered all necessary information and approvals:
Required Information Checklist
- Name Information: First name and last name
- Business Email: Valid company email address for system communications
- Role Definition: Clear understanding of their support responsibilities
- Access Scope: Which employer groups they need access to (if any restrictions apply)
- Manager Approval: Appropriate authorization for the new team member
- Training Plan: Identified onboarding and training requirements
Step-by-Step Invitation Process
Access the user management interface from the main dashboard navigation. From the main dashboard, click on "Manage Users" in the top navigation menu. This will display the current list of system users and management options.
Locate and click the invitation button to open the user creation form. At the top of the Manage Users page, click the "+Invite User" button. This will open the user invitation form where you'll enter the new user's information.
Fill in all required fields with accurate information for the new user: First Name, Last Name, and Email Address. Use the individual's business email address for all system communications.
Choose the correct access tier for the new user's role and responsibilities. As a Tier 1 user, you can only assign Tier 0 permissions. Higher tiers must be assigned by users with appropriate access levels.
Review all information and send the invitation to the new user. After completing all required fields and selecting the appropriate tier, click "Send Invitation". The system will automatically send an email to the new user with login instructions and a secure link to set up their password.
Understanding the Tier System
The TALON Support Dashboard uses a hierarchical tier system to control access and functionality:
Employer Group Access Restrictions
After creating a new user, you can further control their access by restricting them to specific employer groups:
Granular Access Control
Restricting users to specific employer groups ensures they only see data relevant to their responsibilities. This is particularly useful for dedicated support teams or when working with external stakeholders who should only access their own client data.
How to Configure Group Access
- Select the User: From the Manage Users page, click on the user's name in the list
- Access Configuration: Locate the "Employer Group Access" section
- Assign Groups: Click on one or more employer groups to assign access
- Apply Principle of Least Privilege: Only grant access to groups necessary for their role
- Save Changes: Confirm the access restrictions are properly applied
Best Practice: Timing of Access Configuration
Configure employer group restrictions after the user completes their initial login and password setup. This ensures they can successfully access the system before any restrictions are applied.
Post-Invitation Process
Your responsibilities continue after sending the invitation. Follow these steps to ensure successful user onboarding:
Common Issues & Troubleshooting
Invitation Email Not Received
- Check spam/junk folders
- Verify email address spelling
- Confirm corporate email security settings allow external emails
- Resend invitation if necessary
Cannot Assign Higher Tier Level
- Remember: You can only assign tiers lower than your own
- Contact a Tier 2 or Tier 3 administrator for higher-level access
- Document the request for proper approval workflow
User Cannot Access Specific Functions
- Verify employer group restrictions are properly configured
- Confirm tier level matches job requirements
- Check if additional permissions are needed