Skip to main content

Overview

The Users page is your central hub for managing everyone who interacts with your incident management system. Whether they’re responders who need full access or stakeholders who only need to receive notifications, you can configure exactly how each person participates in your incident workflow.

Full Users

Team members who can log in, respond to incidents, and manage the platform

Contacts

Stakeholders who receive notifications but don’t need login access

Understanding User Types

EasyContact supports two distinct user types to give you flexibility in how you structure your incident response team.
Full users are active team members who need to interact with the platform directly.Capabilities:
  • Log in to the platform
  • Acknowledge and resolve incidents
  • Create and manage incidents
  • Access dashboards and analytics
  • Configure personal notification preferences
  • Participate in on-call schedules
  • Enable two-factor authentication
Best for: Engineers, on-call responders, team leads, administrators

Adding Users

1

Navigate to Users

Go to SettingsUsers in the main navigation
2

Click Add User

Click the Add User button in the top right corner
3

Choose User Type

Select whether you’re adding a Full User or a Contact Only
4

Enter User Details

Fill in the required information:
  • Email address (required)
  • First name and Last name
  • Phone number (required for SMS and voice notifications)
5

Configure Contact Methods

Select how this user can be reached:
  • Email — Always available
  • SMS — Requires phone number
  • Voice — Requires phone number
6

Assign Roles

For full users, assign one or more roles that define their permissions
7

Send Invitation

Click Send Invitation to complete the process
Full users will receive an email invitation with a link to set up their account. The invitation expires after 7 days.

Managing Invitations

The Invitations tab shows all pending, accepted, and expired invitations.

Invitation Statuses

StatusDescription
PendingInvitation sent, waiting for user to accept
AcceptedUser has created their account
Expired7-day window has passed without acceptance
CancelledInvitation was manually revoked

Resending Invitations

If a user hasn’t received their invitation or it has expired:
  1. Find the invitation in the Invitations tab
  2. Click the three-dot menu (⋮) on the right
  3. Select Resend Invitation
You can also copy the invitation link directly and share it through your preferred channel.

Editing User Details

To modify an existing user’s information:
1

Find the User

Use the search bar or scroll through the user list
2

Open Edit Dialog

Click the three-dot menu (⋮) and select Edit
3

Update Information

Modify any of the following:
  • Personal details (name, phone)
  • Contact methods
  • Notification preferences
  • Role assignments
  • Timezone and language
4

Save Changes

Click Save to apply your changes

Notification Preferences

Each user can have customized notification rules based on incident urgency.

Urgency Levels

High Urgency

Critical incidents that require immediate attention. Typically configured with no delay and multiple notification channels.

Low Urgency

Informational alerts or non-critical issues. Can be configured with delays and fewer channels.

Notification Channels

ChannelDescriptionRequirements
PushMobile app notificationsEasyContact mobile app installed
EmailEmail alertsValid email address
SMSText messagesPhone number configured
VoicePhone callsPhone number configured

Configuring Notification Rules

For each urgency level, you can set:
  • Delay — Wait time before sending (0-60 minutes)
  • Channels — Which notification methods to use
High Urgency:
  • Delay: 0 minutes (immediate)
  • Channels: Push, SMS, Voice
Low Urgency:
  • Delay: 15 minutes
  • Channels: Email only

Role Management

Roles define what actions a user can perform within the platform.

Assigning Roles

  1. Edit the user’s profile
  2. In the Roles section, check the roles you want to assign
  3. Save your changes
Removing all roles from a user will restrict their access to basic read-only functionality.

Multiple Roles

Users can have multiple roles assigned simultaneously. Their effective permissions are the union of all assigned role permissions.

Security Features

Two-Factor Authentication (2FA)

Administrators can manage 2FA settings for users:
  • Enable 2FA — Require the user to set up an authenticator app
  • Disable 2FA — Remove the 2FA requirement (use with caution)
1

Select User

Find the user in the list and click the menu (⋮)
2

Manage 2FA

Select Manage 2FA from the dropdown
3

Toggle Setting

Enable or disable the 2FA requirement

Password Reset

If a user is locked out or needs a new password:
  1. Click the user’s menu (⋮)
  2. Select Reset Password
  3. Choose to either:
    • Send a reset email to the user
    • Generate a temporary password to share manually
Temporary passwords must be changed on the user’s next login.

Deactivating Users

Instead of deleting users, you can deactivate them to preserve historical data.

To Deactivate a User:

  1. Edit the user’s profile
  2. Uncheck the Active toggle
  3. Save changes
Deactivated users:
  • Cannot log in
  • Won’t receive notifications
  • Are preserved in incident history
  • Can be reactivated at any time

To Remove a User Completely:

  1. Click the user’s menu (⋮)
  2. Select Remove User
  3. Confirm the deletion
Removing a user is permanent. Consider deactivating instead to maintain audit trails.

Use the search bar to find users by:
  • Name
  • Email address

Filter by Type

Use the filter dropdown to show:
  • All Users — Everyone in your organization
  • Full Users — Only users with login access
  • Contacts Only — Only notification-only users

Best Practices

For executives, managers, or external parties who only need visibility, create them as Contacts. You can always upgrade them to Full Users later if needed.
Set up notification rules during user creation to ensure they receive alerts through their preferred channels from day one.
Assign the minimum necessary roles to each user. This follows the principle of least privilege and keeps your organization secure.
Enable two-factor authentication for administrators and users with elevated permissions.
Periodically review your user list and deactivate accounts that are no longer needed.

Troubleshooting

  1. Check the spam/junk folder
  2. Verify the email address is correct
  3. Resend the invitation
  4. If still not received, copy the invite link and share it directly
  1. Verify the user’s account is active
  2. Check if 2FA is required but not configured
  3. Try resetting the user’s password
  1. Verify contact methods are configured
  2. Check notification rules for the appropriate urgency level
  3. Ensure the phone number format is correct (include country code)
  4. Verify the user is active