MANAGED & UNMANAGED EMPLOYEES
Pre-Requisite
Your organisation needs to be on the Secure or Complete plan to distinguish managed and unmanaged employees.
Introduction
This feature allows admins to take ownership of maintaining a clear distinction between users that need to be managed and those that do not.
Managed Employees
This feature is available for the Secure and Complete Plan
This feature is available for the Secure and Complete Plan
Employee indicated to be 'Managed' should be carefully curated by an organisation's admins. This group of employees will be under the active management of our third-party provider, JumpCloud. These users have a separate set of JumpCloud credentials, which are used to log in to company-configured resources such as applications.
The Benefits:
Centralised Management: The platform serves as a centralised hub for managing user access across various resources, simplifying user provisioning, authentication, and security enforcement.
Separate Credentials: Managed Users are equipped with distinct JumpCloud credentials. This separation enhances security by limiting the exposure of critical credentials.
Resource Access Control: Administrators can configure user access to company resources and applications, ensuring users can only access what they are authorised to.
Suspension and Activation: Admins possess the authority to suspend or activate Managed Users swiftly. This functionality is vital for swiftly addressing personnel changes or security concerns.
Password Management: Admins can trigger password changes for Managed Users, enhancing security by ensuring regular updates to user credentials.
Unmanaged Employees
Unmanaged Users represent a unique category of user accounts that operate under a distinct set of rules compared to their managed counterparts. This group of users are not actively managed, and admins do not have the capabilities of performing managed users' actions on them.
The Benefits:
Limited Resource Access: Unmanaged Users have restricted access to company-configured resources, thereby minimising the risk of unauthorised access and data breaches.
External Users: Often utilised for temporary or external personnel, Unmanaged Users allow organisations to grant access to specific resources without compromising security.
Focused Security: By confining access and privileges, Unmanaged Users enhance the overall security posture of the organisation, mitigating the potential risks of unauthorised access.