User Administration
Learn how to invite new users, configure access levels, and maintain security through proper user administration within the TALON Support Dashboard.
Security Responsibility
User administration comes with significant security responsibilities. Only grant access to individuals who require it for their job functions, and regularly review user accounts to ensure they remain appropriate for each user's role.
Understanding Users vs Members
In the TALON Support Dashboard, it's important to distinguish between different types of individuals in the system:
- Users: Support personnel with administrative access to the dashboard
- Members: Employees and dependents who use the healthcare shopping platform
- Employer Champions: Designated employees with special dashboard access for engagement purposes
- Care Navigators: Specialized support users who provide enhanced member assistance
As a support user, you have access to the Manage Users page, which allows you to view, manage, and invite other support personnel to the system.
Support Tier Structure
The TALON Support Dashboard uses a hierarchical tier system that controls access levels and capabilities:
Support Tier Levels
Front-line member assistance with basic support functions and limited administrative access.
Capabilities: View member activity and profiles, member impersonation for troubleshooting, update member profile information, access collateral materials, password resets and enrollment support, document support interactions.
All Tier 0 functionality plus employer group management and configuration capabilities.
Additional Capabilities: Configure employer groups, manage widgets and announcements, QPA calculator access, assign employer champions, grant Tier 0 access to new users.
All lower tier functionality plus advanced platform configuration and widget management.
Additional Capabilities: Define allowed widget sets, advanced platform configuration, grant Tier 0 and 1 access, software integration management.
Complete system access including OAuth2 interactions and development support functions.
Additional Capabilities: OAuth2 interaction viewing, system architecture access, development support coordination, grant access to all lower tiers, deep technical troubleshooting.
Tier Security Model
The tier system implements hierarchical security where:
- Higher tiers inherit all lower tier capabilities
- Users can only grant access to lower tier levels
- Each tier has specific additional permissions
- Escalation paths are clearly defined for efficient problem resolution
User Management Interface
The Manage Users interface provides a comprehensive view of your support team and administrative tools with a user list showing current team members and their assigned tier levels.
How to Invite New Users
As a Tier 1 user, you can invite new Tier 0 (Member Support) users to the system. Follow this step-by-step process:
Best Practice
After sending an invitation, follow up with the new user to ensure they received the email and can access the system. Consider scheduling an orientation session to help them get started with the platform.
Granular Access Control
You can further control user access by restricting users to specific employer groups, providing precise control over data access:
Restricting Users to Employer Groups
- Select the User: Choose the user from the list on the left side of the Manage Users page
- Assign Groups: Click one or more employer groups to assign to the user
- Confirm Restrictions: Verify that the user now has access only to the assigned groups
This feature is particularly useful in scenarios such as:
- Dedicated Support Teams: When you have specialized teams for specific clients
- External Stakeholders: When working with external partners who should only see their own data
- Compliance Requirements: When regulatory requirements mandate restricted data access
- Client Confidentiality: When maintaining strict separation between different client data
Principle of Least Privilege
Always follow the principle of least privilege: assign users access only to the employer groups they need for their specific job responsibilities. This minimizes security risks and ensures compliance with data protection requirements.
User Management Best Practices
Security Guidelines
- Regular Access Reviews: Periodically review user accounts and permissions
- Timely Deprovisioning: Promptly remove access for users who no longer require it
- Role-Based Access: Assign permissions based on job functions, not individual preferences
- Documentation: Maintain records of who has access to what and why
Operational Efficiency
- Standardized Onboarding: Develop consistent processes for new user setup
- Training Coordination: Ensure new users receive appropriate training
- Support Workflows: Establish clear escalation paths and communication channels
- Performance Monitoring: Track user activity to ensure effective system utilization