User Administration

Complete guide to managing support users, roles, permissions, and team structure. Learn how to invite new users, configure access levels, and maintain security through proper user administration within the TALON Support Dashboard.

Learn how to invite new users, configure access levels, and maintain security through proper user administration within the TALON Support Dashboard.

Security Responsibility

User administration comes with significant security responsibilities. Only grant access to individuals who require it for their job functions, and regularly review user accounts to ensure they remain appropriate for each user's role.

Understanding Users vs Members

In the TALON Support Dashboard, it's important to distinguish between different types of individuals in the system:

  • Users: Support personnel with administrative access to the dashboard
  • Members: Employees and dependents who use the healthcare shopping platform
  • Employer Champions: Designated employees with special dashboard access for engagement purposes
  • Care Navigators: Specialized support users who provide enhanced member assistance

As a support user, you have access to the Manage Users page, which allows you to view, manage, and invite other support personnel to the system.

Support Tier Structure

The TALON Support Dashboard uses a hierarchical tier system that controls access levels and capabilities:

Support Tier Levels

Tier 0: Member Support

Front-line member assistance with basic support functions and limited administrative access.

Example:

Capabilities: View member activity and profiles, member impersonation for troubleshooting, update member profile information, access collateral materials, password resets and enrollment support, document support interactions.

Tier 1: Operational Support

All Tier 0 functionality plus employer group management and configuration capabilities.

Example:

Additional Capabilities: Configure employer groups, manage widgets and announcements, QPA calculator access, assign employer champions, grant Tier 0 access to new users.

Tier 2: Software Partner

All lower tier functionality plus advanced platform configuration and widget management.

Example:

Additional Capabilities: Define allowed widget sets, advanced platform configuration, grant Tier 0 and 1 access, software integration management.

Tier 3: Engineering Support

Complete system access including OAuth2 interactions and development support functions.

Example:

Additional Capabilities: OAuth2 interaction viewing, system architecture access, development support coordination, grant access to all lower tiers, deep technical troubleshooting.

Tier Security Model

The tier system implements hierarchical security where:

  • Higher tiers inherit all lower tier capabilities
  • Users can only grant access to lower tier levels
  • Each tier has specific additional permissions
  • Escalation paths are clearly defined for efficient problem resolution

User Management Interface

The Manage Users interface provides a comprehensive view of your support team and administrative tools with a user list showing current team members and their assigned tier levels.

How to Invite New Users

As a Tier 1 user, you can invite new Tier 0 (Member Support) users to the system. Follow this step-by-step process:

User Invitation Process
1
Access Invite Function
Click the +Invite User button at the top of the Manage Users page to open the invitation form.
2
Complete Profile Information
Fill in the new user's name, email address, and contact details. This information will be used for system communication and identification.
3
Select Appropriate Tier
Choose Tier 0 (Member Support) for the new user. As a Tier 1 user, you can only assign Tier 0 permissions to maintain security boundaries.
4
Submit Invitation
Review the information and submit the invitation. The system will send an email to the new user with account setup instructions.
5
Follow Up
Confirm that the new user received their invitation email and successfully created their account and password.

Best Practice

After sending an invitation, follow up with the new user to ensure they received the email and can access the system. Consider scheduling an orientation session to help them get started with the platform.

Granular Access Control

You can further control user access by restricting users to specific employer groups, providing precise control over data access:

Restricting Users to Employer Groups

  1. Select the User: Choose the user from the list on the left side of the Manage Users page
  2. Assign Groups: Click one or more employer groups to assign to the user
  3. Confirm Restrictions: Verify that the user now has access only to the assigned groups

This feature is particularly useful in scenarios such as:

  • Dedicated Support Teams: When you have specialized teams for specific clients
  • External Stakeholders: When working with external partners who should only see their own data
  • Compliance Requirements: When regulatory requirements mandate restricted data access
  • Client Confidentiality: When maintaining strict separation between different client data

Principle of Least Privilege

Always follow the principle of least privilege: assign users access only to the employer groups they need for their specific job responsibilities. This minimizes security risks and ensures compliance with data protection requirements.

User Management Best Practices

Security Guidelines

  • Regular Access Reviews: Periodically review user accounts and permissions
  • Timely Deprovisioning: Promptly remove access for users who no longer require it
  • Role-Based Access: Assign permissions based on job functions, not individual preferences
  • Documentation: Maintain records of who has access to what and why

Operational Efficiency

  • Standardized Onboarding: Develop consistent processes for new user setup
  • Training Coordination: Ensure new users receive appropriate training
  • Support Workflows: Establish clear escalation paths and communication channels
  • Performance Monitoring: Track user activity to ensure effective system utilization