Overview
The Users page is your central hub for managing everyone who interacts with your incident management system. Whether they’re responders who need full access or stakeholders who only need to receive notifications, you can configure exactly how each person participates in your incident workflow.Full Users
Team members who can log in, respond to incidents, and manage the platform
Contacts
Stakeholders who receive notifications but don’t need login access
Understanding User Types
EasyContact supports two distinct user types to give you flexibility in how you structure your incident response team.- Full Users
- Contacts
Full users are active team members who need to interact with the platform directly.Capabilities:
- Log in to the platform
- Acknowledge and resolve incidents
- Create and manage incidents
- Access dashboards and analytics
- Configure personal notification preferences
- Participate in on-call schedules
- Enable two-factor authentication
Adding Users
1
Navigate to Users
Go to Settings → Users in the main navigation
2
Click Add User
Click the Add User button in the top right corner
3
Choose User Type
Select whether you’re adding a Full User or a Contact Only
4
Enter User Details
Fill in the required information:
- Email address (required)
- First name and Last name
- Phone number (required for SMS and voice notifications)
5
Configure Contact Methods
Select how this user can be reached:
- Email — Always available
- SMS — Requires phone number
- Voice — Requires phone number
6
Assign Roles
For full users, assign one or more roles that define their permissions
7
Send Invitation
Click Send Invitation to complete the process
Full users will receive an email invitation with a link to set up their account. The invitation expires after 7 days.
Managing Invitations
The Invitations tab shows all pending, accepted, and expired invitations.Invitation Statuses
| Status | Description |
|---|---|
| Pending | Invitation sent, waiting for user to accept |
| Accepted | User has created their account |
| Expired | 7-day window has passed without acceptance |
| Cancelled | Invitation was manually revoked |
Resending Invitations
If a user hasn’t received their invitation or it has expired:- Find the invitation in the Invitations tab
- Click the three-dot menu (⋮) on the right
- Select Resend Invitation
Editing User Details
To modify an existing user’s information:1
Find the User
Use the search bar or scroll through the user list
2
Open Edit Dialog
Click the three-dot menu (⋮) and select Edit
3
Update Information
Modify any of the following:
- Personal details (name, phone)
- Contact methods
- Notification preferences
- Role assignments
- Timezone and language
4
Save Changes
Click Save to apply your changes
Notification Preferences
Each user can have customized notification rules based on incident urgency.Urgency Levels
High Urgency
Critical incidents that require immediate attention. Typically configured with no delay and multiple notification channels.
Low Urgency
Informational alerts or non-critical issues. Can be configured with delays and fewer channels.
Notification Channels
| Channel | Description | Requirements |
|---|---|---|
| Push | Mobile app notifications | EasyContact mobile app installed |
| Email alerts | Valid email address | |
| SMS | Text messages | Phone number configured |
| Voice | Phone calls | Phone number configured |
Configuring Notification Rules
For each urgency level, you can set:- Delay — Wait time before sending (0-60 minutes)
- Channels — Which notification methods to use
Example Configuration
Example Configuration
High Urgency:
- Delay: 0 minutes (immediate)
- Channels: Push, SMS, Voice
- Delay: 15 minutes
- Channels: Email only
Role Management
Roles define what actions a user can perform within the platform.Assigning Roles
- Edit the user’s profile
- In the Roles section, check the roles you want to assign
- Save your changes
Multiple Roles
Users can have multiple roles assigned simultaneously. Their effective permissions are the union of all assigned role permissions.Security Features
Two-Factor Authentication (2FA)
Administrators can manage 2FA settings for users:- Enable 2FA — Require the user to set up an authenticator app
- Disable 2FA — Remove the 2FA requirement (use with caution)
1
Select User
Find the user in the list and click the menu (⋮)
2
Manage 2FA
Select Manage 2FA from the dropdown
3
Toggle Setting
Enable or disable the 2FA requirement
Password Reset
If a user is locked out or needs a new password:- Click the user’s menu (⋮)
- Select Reset Password
- Choose to either:
- Send a reset email to the user
- Generate a temporary password to share manually
Temporary passwords must be changed on the user’s next login.
Deactivating Users
Instead of deleting users, you can deactivate them to preserve historical data.To Deactivate a User:
- Edit the user’s profile
- Uncheck the Active toggle
- Save changes
- Cannot log in
- Won’t receive notifications
- Are preserved in incident history
- Can be reactivated at any time
To Remove a User Completely:
- Click the user’s menu (⋮)
- Select Remove User
- Confirm the deletion
Filtering and Search
Search
Use the search bar to find users by:- Name
- Email address
Filter by Type
Use the filter dropdown to show:- All Users — Everyone in your organization
- Full Users — Only users with login access
- Contacts Only — Only notification-only users
Best Practices
Start with Contacts for Stakeholders
Start with Contacts for Stakeholders
For executives, managers, or external parties who only need visibility, create them as Contacts. You can always upgrade them to Full Users later if needed.
Configure Notification Preferences Early
Configure Notification Preferences Early
Set up notification rules during user creation to ensure they receive alerts through their preferred channels from day one.
Use Role-Based Access
Use Role-Based Access
Assign the minimum necessary roles to each user. This follows the principle of least privilege and keeps your organization secure.
Require 2FA for Critical Roles
Require 2FA for Critical Roles
Enable two-factor authentication for administrators and users with elevated permissions.
Regular Access Reviews
Regular Access Reviews
Periodically review your user list and deactivate accounts that are no longer needed.
Troubleshooting
User didn't receive invitation email
User didn't receive invitation email
- Check the spam/junk folder
- Verify the email address is correct
- Resend the invitation
- If still not received, copy the invite link and share it directly
Invitation link expired
Invitation link expired
Invitations expire after 7 days. Simply resend the invitation to generate a new link.
User can't log in after accepting invite
User can't log in after accepting invite
- Verify the user’s account is active
- Check if 2FA is required but not configured
- Try resetting the user’s password
Notifications not being received
Notifications not being received
- Verify contact methods are configured
- Check notification rules for the appropriate urgency level
- Ensure the phone number format is correct (include country code)
- Verify the user is active