InterspaceKnowledgebaseDocumentationMy InterspaceManage User Accounts
MY INTERSPACE
01-Sep-201816-Jan-2024
Manage User Accounts
The My Interspace control panel allows you to create, edit and manage user accounts for your organization. To manage users:

  1. Sign in to your My Interspace control panel.
  2. Click the profile icon in the upper left corner.
  3. Select User Management from the dropdown menu.

The user management page displays all registered users and provides tools for account administration.

1.Adding a New User

To create a new user account:

  1. Click the Add User button (marked with a "+" icon) above the user list.
  2. Complete the user details form:

    • Full Name: Enter the user's complete name.
    • Email Address: Enter a valid email address. This serves as the username for signing in and is used for account notifications and password recovery.
    • Password: Create a secure password that meets your organization's security requirements.
    • Access Rights: Select the appropriate permission level based on the user's role.
  3. Click Submit.

After the account is created, a verification email is automatically sent to the user's email address. The user must click the verification link in the email to:

  • Confirm ownership of the email address
  • Activate their My Interspace account

Until the email is verified, the user cannot sign in to My Interspace.

2.Editing User Information

To modify an existing user's details:

  1. Locate the user in the user list.
  2. Click the edit button (pencil icon) in the user's row.
  3. Update the necessary information.
  4. Save your changes.

3.Deleting a User

To remove a user account:

  1. Locate the user in the user list.
  2. Click the delete button (trash can icon) in the user's row.
  3. Confirm the deletion when prompted.
Warning: Deleting a user account is permanent and cannot be undone. Ensure you want to remove the account before confirming.

4.Secure Accounts with Two-Factor Authentication

Two-factor authentication (2FA) adds an additional layer of security to user accounts. When enabled, users must provide two forms of verification to sign in:

  • Their password
  • A unique verification code sent to their registered device

This significantly reduces the risk of unauthorized account access, even if a password is compromised. For detailed instructions, see our guide: Securing Your Interspace Account.

Related content
Documentation
Cloud
Communications
Hosting
My Interspace
Tech Articles
Tutorials
Learn
News
Latest news
Latest events
Related products
Premium Internet Access
Highest-grade Internet access for professional needs. Superior point-to-point fiber-optic link, symmetrical down/up speed, unlimited traffic, SLA 99.9% and static IP. Direct connections to the top tier 1 global providers. Our network architecture is passionately designed to ensure the highest quality connections to any destination worldwide, boasting unmatched transfer speeds and multi-tier redundancy.
Dedicated Servers
Dedicated servers on high-grade hardware from well-known sever vendors. They are hosted in our own data centers, enabling us full control in safe-guarding the uptime 24/7. Selection of primary data centers and a disaster recovery one located at a safe distance. Power control options (reset, power off/on) and free of charge KVM-over-IP available 24/7 on a single click, including support to remotely boot/install your own ISO images.
Elastic Cloud VPS
Elastic Cloud VPS is a virtual machine running on advanced cloud and networking technologies, offering superior advantages over traditional VPS hosting at an exceptional price-to-performance ratio. Deploy OS and apps in just 1 min. One-click geo-redundant backups, snapshots and disaster recovery. Next-generation AMD EPYC processors, ultra-fast NVMe storage, dedicated connections and free private networking.
[OLD] Cloud VPN PointConnect
Cloud VPN enables individual computers to securely connect to your cloud private network from anywhere in the world, by encrypting data as it travels over the Internet. Once connected, they can access any of your virtual or dedicated servers, as well as metro Ethernet endpoints using their private IPs. It's perfect for providers of CRM, ERP and services alike, who want to provide secure access to their apps over the Internet.


Our website uses cookies. By continuing to use our website, you consent to the use of cookies and you agree with our Terms and conditions.    I understand