Managing Users
The System | Users page provides the following tabs:
-
Users – Lets you view, edit, and add users.
-
Activity Log – Provides a sortable, searchable table of events broken out by user, time, and activity.
-
Current Sessions – Provides a sortable, searchable table of currently active sessions on the Stellar Cyber server.
Users List
The Users List, with all existing users, appears by default.
In this table you can:
- Select Create at the top of the list to add a new user. Adding a user is described in the following section.
- Select the icon to edit the user.
- Select the icon to delete the corresponding user.
Only users with the built-in Super Admin profile assigned can edit or delete other users with the Super Admin profile. For all other users, the Edit and Delete icons do not appear next to users with the Super Admin profile assigned.
See the Tables page for more information on working with tables.
Detecting Dormant Users
The Users List includes a Last Login column that makes it easy to detect users who have not logged in for a long time and manage those accounts according to your policy.
If the Last Login column does not appear in the Users List, you can use the Change Columns feature to add it. Note that if a user has not logged in since this feature was introduced in v4.3.6, the Last Login field might simply show a dash (-).
Removing Duplicate User Accounts
From 5.2.0, the Stellar Cyber platform is insensitive to case differences between the email addresses
In releases before 5.2.0, admin1@yourorganization.com
and Admin1@yourorganization.com
, for example, were acceptable email addresses for two different accounts. From 5.2.0, Stellar Cyber is insensitive to case and now considers these duplicate user accounts. If there is already one user account with an email address of admin2@yourorganization.com
and you try to create a second user account with ADMIN2@YOURORGANIZATION.COM
, the second account won't be allowed. Stellar Cyber considers it a duplicate and blocks its creation.
However, when Stellar Cyber detects a tenant with user accounts that differ only by case and were created in earlier releases, it continues to apply case sensitivity to all user accounts throughout the system. For example, if there already are two user accounts with email addresses admin3@yourorganization.com
and ADMIN3@yourorganization.com
, Stellar Cyber continues to allow them as two separate accounts. When this occurs, Stellar Cyber displays a banner to Super Admin users in the root system when they visit System | Users. The banner notifies them about duplicate users and urges them to resolve them or communicate with tenant administrators to resolve them:
Attention Admins! Duplicate accounts detected. To ensure platform integrity, take action immediately! Reach out to users for resolution by using the filter to identify accounts. Show me duplicates.
After the duplicates are resolved for all tenant, partner, and root users in the system, Stellar Cyber starts applying case insensitivity to all user accounts and stops displaying the banner to root Super Admin users.
In addition to the banner, a Duplicate Identities column appears in the Users table. Select Show me duplicates in the banner to filter the table by this column, displaying only duplicate accounts. Delete the duplicate accounts so just one account remains and notify the affected user. Until you've removed all the duplicates, the banner will continue to appear each time you access the System | Users page. When there are no more duplicates, the banner will stop appearing.
Adding or Editing a User
When you add or edit a user, a similar dialog box appears. The only difference is that you cannot change the User Name in the Edit dialog box. This example shows the Edit Existing User dialog box.
-
For Authentication Only SSO: First, manually add all users on the Stellar Cyber Platform. After this manual entry, users can log in with SSO.
-
For Authentication & Authorization SSO: Configure all users through the IdP.
You enable SSO for all users except the root admin user. The root admin user must always use local authentication (
https://your.stellar.cyber.address/login).
-
For Local access (bypass) when SSO is enabled: If Stellar Cyber loses connectivity with your IdP, users configured for SSO cannot log in. As a preventive bypass method, manually create a new user in the Stellar Cyber Platform with root scope and with a valid email address that has "
+admin
" appended to a valid user name, as follows:<user>+admin@yourorganization.com
(joe+admin@yourorganization.com
). The user you create must be able to receive a password reset email at<user>@yourorganization.com
. This email alias is what Stellar Cyber uses to permit the bypass of an SSO for a local login. After you create this separate user account, the user can log in two ways:-
An SSO user with
<user>@yourorganization.com
or
-
A local user at
https://your.stellar.cyber.address/login
using<user>+admin@yourorganization.com
If SSO is configured, it's recommended to keep an active administrative account in the Stellar Cyber user management.
-
You can enter or modify:
-
User Name – Each user has a unique name, which is case insensitive. The name cannot be changed after you add the user. This field does not support multibyte characters.
-
Display Name – Can be used to represent the user in displays instead of the User Name.
-
Password – The password assigned to the user. Appears when adding a new user.
-
Reenter new password – Verification for the password.
If you're using SSO, the password fields may not appear. See Logging In for details.
-
Phone Number – A phone number for the user.
-
Email address – This email address is used to send notifications to the user for password recovery. Each user must have a unique email address, which is case insensitive. You cannot use the same address for multiple users.
-
Language Preferences – Sets the display language for the Stellar Cyber UI. After you save the setting, the user must log out and log back in for the change to take effect.
-
Use a query as preset filter – Enable this option to create an Interflow query that limits the data available to this user. You can build a complex query using standard AND/OR/NOT operators to match specified conditions and strings.
This feature is deprecated in the 5.3.0 release and is scheduled for removal in the 5.5.0 release.
Use the Build a Query controls to create your query. Start by choosing your operator from the Condition Type dropdown. Then, use the Add Condition and Add String Condition buttons to add criteria for your query. The Add Condition button lets you select different Interflow fields and specify their values (for example, host_name in the query illustrated below). See the Interflow overview for information on the available fields.
As you add conditions, the Query content field updates to show the logic in place, as illustrated below. You can also use the Add Inner Group to nest logic within your query.
Once you have created your query, this user's Stellar Cyber displays will only be based on data matching the query.
Stellar Cyber automatically checks entered queries and prevents the submission of invalid values. For example, if you select a Date field as part of the filter but supply a non-standard date value, the query is rejected by the system.
-
User Scope – Must be Root, Partner, or Tenant.
-
Root – Allows full access to all Stellar Cyber functions, including user and license management.
-
Partner – Allows access to the specified tenant group. If you select Partner the Tenant Group drop-down appears.
Partner users can see all other partner users with the same Tenant Group assigned. Similarly, partner users can create additional partner users to manage the same Tenant Group.
-
Tenant – Allows access to the specified tenant. If you select Tenant, the Tenant drop-down and Use User as Tenant Default checkbox appear. See the Tenant overview page for information on tenants.
-
-
User Privilege – Select a profile. The profiles are defined on the Role Based Access Control page. See Role Based Access Control for details on configuring profiles.
-
Tenant Group – Appears if you choose Partner scope. Select the Tenant Group that the partner can access. The partner has write access for all tenants in this group and can view the data for those tenants. See Tenant Groups for more details.
-
Tenant – Appears if you choose Tenant scope. Select the name of the tenant. The user has read access to that tenant, and only that tenant.
-
Use User as Tenant Default – Appears if you choose Tenant scope. Set this user as the default user for the specified tenant.
-
API Access – Appears if you choose Super Admin privilege and Root scope. To create a unique API token for this user, select Generate New Token. Copy the token and send it to the user. Stellar Cyber does not save the token. If you exit before saving the token, you must generate a new token.
For pre-5.4.1 releases, this is the only way to configure API keys for public API access. These options are only available to users with Root scope and Super Admin privileges. This technique is still available for Super Admin users with Root scope in 5.4.1.
Refer to Managing API Keys in the 5.4.1 Release for details on an Early Access Program feature in 5.4.1 that lets you use a new API Keys tab in the Edit User dialog box to configure per-user API keys, scoped to RBAC and tenancy. -
Two-Factor Authentication – Enable to require this user to use two-factor authentication (2FA) the next time they log in.
-
Homepage – Set the page that appears in Stellar Cyber whenever this user logs in. Note the following:
-
Any user with the Add User privilege can create a user with a homepage set.
-
Any user with the Edit User privilege can modify another user’s homepage.
-
Available pages are listed according the user scope and privilege selected in the Add/Edit User dialog box.
-
The Role-Based Access Control page includes a Customize Homepage privilege that specifies whether the current user is allowed to customize their own homepage, either from the controls at the top of the user interface or the Edit User dialog box.
-
A User is distinct from a Recipient. The Recipient can be used as the target of automated messages. See the Recipients page for more details.
Changing a User's Password
This option is not applicable when the server is configured for SSO.
To change a user's password (other than your own):
-
Select System | Users.
The table of users appears.
-
Select for the user whose password you want to change.
The Edit Existing User screen appears.
-
Select Change Password.
The Trigger Password Reset button appears.
-
Select Send Reset Link.
An email is immediately sent to the user from support@stellarcyber.ai. The user has 24 hours to reset their password.
Managing API Keys in the 5.4.1 Release
This section describes a feature that is only available as part of an Early Access Program in the 5.4.1 release and may not appear in your version of the Stellar Cyber Platform. Contact your account manager to inquire about taking part in an Early Access Program.
Prior to the 5.4.1 release, public API access was only available to users with Root scope and Super Admin privileges. This technique is still available in 5.4.1.
The 5.4.1 release also introduces per-user API keys, scoped to a user's RBAC privileges and tenancy as an Early Access Program feature. If this feature is enabled in your deployment, you will see an API Keys tab in the Edit User dialog box, as illustrated below:
If you do not see the API Keys tab, this Early Access Program feature is not enabled in your deployment. Super Admin users with Root scope can continue to configure API tokens using theAPI Access option in the Settings tab of the Edit Existing User dialog box.
The Early Access Program implementation of API keys has the following benefits:
-
Respects the industry-standard principle of least privilege, only granting an API key the tools that it needs to perform the job you want it to do.
-
Allows easy breach isolation, with API keys tied to specific users.
-
Enables immediate key revocation to contain exposures quickly and limit the dwell time of any unauthorized access.
Stellar Cyber recommends that you consider creating service accounts scoped with only the RBAC privileges necessary to perform specific tasks. This way you can grant personnel just the access they need to perform specific API tasks.
Using the API Keys Tab
The API Keys tab lets you create and revoke an account's API keys. The keys listed in the API Keys tab are specific to the selected account and are limited by its user scope (tenancy) and RBAC privileges:
-
An account can only make calls to the public API endpoints available to its assigned RBAC privileges.
-
An account can only access API data available to its user scope and tenancy. For example:
-
A partner user can access data for any of its associated tenants.
-
A tenant user can only access data for its own tenancy.
-
A root user can access data from the entire platform.
-
You use the API keys listed here to generate a JSON Web Token for access to the API.
Administrative users can revoke keys for users with lower privileges than their own, subject to the normal limits on tenancy and scope. They cannot, however, create a key for another user.
Creating an API Key in the Edit User Window
Use the following procedure to create an API key in the Edit User window:
-
Click on the API Keys tab in the Edit Existing User dialog box:
-
Click the Create API Key button to generate a new key for your account.
The Create API Key button only appears if you are logged in to the account you are editing. You can't create API keys for other user accounts.
-
Supply a name for your key in the window that appears and click Create. Choose a name that is short and memorable so you can easily identify the purpose of the key in Stellar Cyber displays.
-
Use the Copy button to copy your API key now and store it somewhere safe. For security reasons, you will not be able to retrieve the key from within Stellar Cyber later on.
If you do lose or forget your key, you can always revoke it and generate a new one. However, you'll also need to update any scripts that use the old key so that they'll continue to work with the new one.
-
Click Close once you have copied the key.
The new key appears in the list with its name, status, and the last time it was accessed. In addition, a Revoke button appears in the Action column, allowing you to revoke a specific key on demand.
Revoking an API Key in the Edit User Window
You can revoke API keys in the Edit Existing User window's API Keys tab:
-
Revoke an individual key by locating the key you want to revoke in the list and clicking its Revoke button in the Action column.
-
Revoke all of an account's API keys by clicking the Revoke all API Keys button at the top of the API Keys tab. Then, click Revoke all in the confirmation prompt that appears.
Revoking Keys for Other Accounts
You can also revoke the keys of users with lower privileges than your own, subject to the normal rules of tenancy and scope.
Revoked Keys Continue to Appear
Revoked keys continue to appear in the list of API Keys with a Status of Revoked for a few days after they have been revoked. This can be helpful when you need to remind yourself of which API keys you've revoked so you can update any scripts using the keys. Keep in mind, however, that once a key has been revoked, it cannot be reverted to Active.
API Keys and the Activity Log
Stellar Cyber records an entry in the Activity Log each time an API key is created or revoked.
Activity Log Tab
Use the System | Users | Activity Log tab to monitor Stellar Cyber activity by user account. You can see at a glance which accounts are performing which tasks in Stellar Cyber in a searchable, sortable table similar to the example below.
The User Activity Log is automatically reduced to the latest two million entries at 02:00 AM every Sunday in UTC time.
Current Sessions Tab
To see a table of active Stellar Cyber logins, select System | Users | Current Sessions. You can see at a glance which accounts are logged in to the system in a searchable, sortable table similar to the example below.