Creating & Managing Users
WARNING
We require all users to be authenticated through Azure. No personal accounts can be used. No "Local ImmyBot" accounts are possible
This guide explains how to add and manage users in ImmyBot.
User Authentication Methods
ImmyBot uses Azure AD/Entra ID for authentication:
- Azure AD/Entra ID Integration: Required for all ImmyBot instances
- Self-Registration: Allow users to request access (with admin approval)
Adding Users via Self-Registration
Self-registration is one way to add users to ImmyBot:
- Have the person navigate to your ImmyBot instance (e.g.,
https://yourdomain.immy.bot
) - They will see a login screen where they can request access:
)
- As an administrator, you'll see a yellow notification indicator at the top of your screen
- Click the notification to review and approve the access request:
- Select the appropriate role for the user (see User Roles and Security for details)
- Click Grant Access to approve their access
Managing People and Users
In ImmyBot, there's an important distinction:
- People are added to the system first (either through self-registration or Azure AD). People correspond to users you can select as the primary user of computers being deployed and are largely populated by syncing users from Azure/Microsoft Partner Center. This sync happens roughly ever hour.
- These people are then assigned as users with specific roles and permissions to allow them to login to your ImmyBot instance.
To manage people:
- Navigate to Show more > People
- View the list of all People in your ImmyBot instance.
- Click on the Edit person link to edit their details:
- Tags can be assigned to the person here
- Any other changes to the details here will be overwritten by the Azure sync.
Tip If you need to force a sync for Azure people, you can do so per tenant by going to Tenants > Select the tenant to sync > Go to the Azure tab and click Sync Azure Details
To manage Users:
- Navigate to Show More > Users
- View the list of all Users in your ImmyBot instance.
- Click on the Edit User link to edit their details:
- Set an Access Expiration
- Adjust current roles and permissions
- If enabled, you can also Impersonate the user to see what they see. The Audit trail will reflect the session is impersonated and by whom.
Best Practices
Follow these best practices for user management:
- Principle of Least Privilege: Assign the minimum necessary permissions
- Regular Audits: Periodically review user accounts and permissions
- Offboarding Process: Disable accounts promptly when users leave
- Role-Based Access: Use roles to manage permissions consistently
- Documentation: Maintain documentation of who has access and why
Next Steps
After adding users, you might want to explore:
- User Roles and Security - Learn about user permissions and security
- Tenant Management - Configure tenant access for users
- Azure AD/Entra ID Integration - Configure Azure AD/Entra permissions