Skip to content

Platform Users

Platform Users are the individuals who can log in and use Hydden.Control. Administrators manage platform users, assign roles, and configure scoped access to ensure users have appropriate permissions for their responsibilities.

Overview

Platform Users represent individuals who can log in and interact with Hydden.Control. This is distinct from Owners, which represent identity owners (employees, contractors, vendors) whose accounts and access are being reviewed.

ConceptDescriptionExamples
Platform UsersUsers who log into Hydden.Control to manage and review accessAdministrators, Reviewers, Auditors
OwnersIdentity owners whose accounts and access are being governedEmployees with accounts in various systems

Platform Users vs Owners

Platform Users have roles that determine what they can do in Hydden.Control. Owners are the people whose access is being reviewed in campaigns. A person can be both a Platform User and an Owner.

The Platform Users page displays all users in your organization with their:

  • Name - User's display name
  • Email - Authentication email address (must match SSO provider)
  • Subject - Authentication subject from SSO provider
  • Provider ID - Identity provider identifier
  • Status - Active, Inactive, or Suspended
  • Roles - Assigned role(s): Administrator, Reviewer, or Auditor
  • Last Login - Most recent sign-in timestamp
  • Created - Account creation date
  • Token Version - Internal version for security token management
  • Actions - Suspend, Edit, Delete options

User Roles

Hydden.Control supports three user roles, each with different capabilities:

RolePurposeAccess Level
AdministratorSet up and manage Hydden.ControlFull access to all features
ReviewerParticipate in access review campaignsScoped access to assigned reviews
AuditorView campaign results and reportsRead-only scoped access

Administrator

Administrators have full access to all Hydden.Control features:

  • Create, modify, and delete campaigns
  • Configure settings, rules, and policies
  • Manage platform users
  • Access all identity data
  • View and export reports

Single Admin Protection

If you are the only administrator, you cannot downgrade your own role to prevent accidental lockout.

Reviewer

Reviewers participate in access review campaigns:

  • Review accounts in campaigns where they are assigned as a reviewer
  • Make accept, reject, and flag decisions
  • Add comments to review decisions
  • Generate campaign report downloads
  • Read-only access to identity data within their scope

Auditor

Auditors view campaign results for compliance purposes:

  • Read-only access to campaigns
  • View review decisions and comments
  • Generate campaign report downloads
  • Read-only access to identity data within their scope

Scoped Access

Reviewers and Auditors have scoped access, meaning they can only access specific applications and account types. Administrators configure this scope when creating or editing users.

Assigned Applications

Specify which applications the user can access:

  • Select specific applications from your connected data sources
  • User can only view and review accounts associated with these applications
  • Leave empty for no application restrictions (access all applications)

Account Types

Specify which types of accounts the user can access:

Account TypeDescription
User AccountStandard user accounts
Service AccountNon-human service accounts
Admin AccountAdministrative accounts
Federated AccountAccounts from federated identity sources
System AccountSystem-generated accounts

Select the account types relevant to the user's review responsibilities.

Scope Configuration

For Reviewers assigned to specific campaigns, configure their scope to match the campaign's target applications and account types.


Owner Management

Owners represent the individuals (employees, contractors, vendors) whose accounts and access are governed through Hydden.Control. While Platform Users manage the system, Owners are the subjects of access reviews.

Owner Attributes

Owners have rich attribute profiles synchronized from connected data sources:

Attribute CategoryFields
Identity InformationIdentity ID, Identity Name, Identity Email, Alt Email
Organizational DataDepartment, Title, Location, Manager, Start Date, End Date
Contact InformationMobile Phone, Phone
Owner ClassificationOwner Type (Employee, Contractor, Vendor), Status (Active, Inactive)
Role AssignmentsAssigned roles based on organizational attributes

Owner Statistics and Risk Metrics

Each owner profile includes calculated risk metrics and statistics:

  • Account Activity: Number of active, inactive, and dormant accounts
  • Account Statistics: Total accounts owned, account distribution by type
  • Breach Data: Accounts identified in known breach databases
  • Group Membership: Groups the owner belongs to across systems
  • Password and Security: Password age, MFA status across accounts
  • Privilege: Privileged and highly privileged account counts
  • Total Threat: Overall risk score calculated from account risks
  • Stale Accounts: Accounts not used in 90, 180, or 365 days
  • MFA Gaps: Accounts without MFA enabled
  • Failed Logins: Accounts with recent failed authentication attempts

Owner vs Platform User Relationship

ScenarioPlatform UserOwner
IT Administrator managing ControlYes (Administrator role)Possibly (if they have accounts being reviewed)
Manager reviewing team accessYes (Reviewer role)Yes (they also have accounts in systems)
Employee with corporate accountsNo (doesn't manage Control)Yes (their accounts are reviewed)
Service AccountNoNo (represented as Account, not Owner)

Synchronizing Owners

Owner data is synchronized from connected data sources:

  1. Navigate to Settings > Data Sync
  2. Configure sync for identity sources (Workday, HR systems, etc.)
  3. Run manual sync or schedule automatic synchronization
  4. Owner profiles are created/updated based on synchronized identity data
  5. Owners are automatically linked to their accounts via owner mapping algorithms

See Data Sync for detailed sync configuration.


Adding a User

Manual User Creation

  1. Navigate to Settings > Platform Users.
  2. Click + Add User.
  3. Enter the user's Email - must match their authentication provider email.
  4. Enter the user's Name - display name shown in the application.
  5. Select a Status:
    • Active - User can log in
    • Inactive - User cannot log in (preserved for reactivation)
    • Suspended - User access temporarily revoked
  6. Select the user's Role:
    • Administrator
    • Reviewer
    • Auditor
  7. If the role is Reviewer or Auditor, configure Scoped Access:
    • Select Assigned Applications
    • Select Account Types
  8. Click Create.

Editing a User

  1. Find the user in the Platform Users table.
  2. Click the Edit icon (pencil) in the Actions column.
  3. Modify user details as needed.
  4. Click Save.

::: note Role Changes and Token Invalidation When a user's role is changed, their token version is incremented. This invalidates all existing authentication tokens for that user, forcing them to sign in again with their new role. This security measure ensures users immediately operate under their new permission level and prevents privilege escalation from cached tokens. :::

User Status Management

Suspending a User

To temporarily revoke access:

  1. Click the Suspend icon in the Actions column.
  2. Confirm the suspension.

Suspended users cannot log in but their account and history are preserved.

Reactivating a User

  1. Click Edit on the suspended user.
  2. Change Status from Suspended to Active.
  3. Click Save.

Deleting a User

  1. Click the Delete icon in the Actions column.
  2. Confirm the deletion.

Permanent Action

Deleting a user permanently removes their account. Consider suspending instead to preserve audit history.

Role Definition Matrix

The following matrix details permissions for each role across Hydden.Control features:

FeatureAdministratorReviewerAuditor
AccountsFull accessRead only (scoped)Read only (scoped)
OwnersFull accessRead only (scoped)Read only (scoped)
RolesFull accessRead onlyRead only
PoliciesFull accessNo accessNo access
GroupsFull accessRead only (scoped)Read only (scoped)
ApplicationsFull accessRead only (scoped)Read only (scoped)
CampaignsFull accessReview assigned itemsRead only
SettingsFull accessNo accessNo access
Job HistoryFull accessNo accessNo access
Audit LogFull accessNo accessNo access
AI AssistantFull accessScoped accessScoped access
UI ThemeSelect themeSelect themeSelect theme
ProfileView/EditView/EditView/Edit

Campaign Permissions Detail

ActionAdministratorReviewerAuditor
Create campaignsYesNoNo
Modify campaignsYesNoNo
Delete campaignsYesNoNo
Start/extend/end campaignsYesNoNo
Review itemsYesYes (assigned only)No
View campaign progressYesYes (assigned only)Yes
Export reportsYesYesYes

Token Duration

Authentication tokens have the following expiration:

Token TypeDuration
Access Token1 hour
Refresh Token24 hours

Users are automatically signed out when both tokens expire. Sessions remain active as long as the user is actively using the application and the refresh token is valid.

Best Practices

  1. Least privilege - Assign the minimum role needed for each user's responsibilities
  2. Scope appropriately - Configure scoped access for Reviewers and Auditors to limit data exposure
  3. Regular review - Periodically audit platform users and remove those who no longer need access
  4. Multiple admins - Maintain at least two administrators to prevent lockout scenarios
  5. Use suspension - Suspend rather than delete users to preserve audit history

Hydden Documentation and Training Hub