Skip to main content
CEMAC’s user management system lets administrators control who has access to the platform, what they can do, and how they interact with the system.

User roles

CEMAC has two primary user roles with different permission levels:

Administrator

Admins have full system access:

User management

Create, edit, and deactivate user accounts

System configuration

Modify settings, thresholds, and business rules

Full data access

View, modify, and delete all records

Reports & exports

Export data and generate comprehensive reports

Employee

Employees have operational access:

Sales processing

Process customer transactions

Inventory viewing

View product information and stock levels

Customer service

Access customer information and history

Basic reporting

View analytics and dashboards
Employees cannot modify inventory, change settings, or access financial reports. This separation ensures data integrity and security.

User list

The user management dashboard displays all team members:

User table columns

Each user entry shows:
ColumnInformation
User IDUnique identifier (first 10 characters)
EmailLogin email address
NameFirst and last name
RoleAdministrator or Employee badge
StatusActive or Inactive indicator
ActionsQuick action buttons

Status indicators

  • Green badge
  • Can log in to the system
  • Permissions are enforced
  • Counted in license/subscription
  • Red badge
  • Cannot log in
  • Previous work remains in system
  • Not counted in active user limit
Inactivating a user immediately revokes their access but preserves their historical data (sales, notes, etc.).

Create new users

Add team members to your CEMAC account:
1

Open user creation form

Click New User button in the user management view
2

Enter user details

Required information:
  • First name
  • Last name
  • Email address (must be unique)
  • Password (minimum 6 characters)
  • Role (Administrator or Employee)
3

Set initial status

Users are created as Active by default
4

Save user

Click Create User to add them to the system

Email validation

Email addresses must:
  • Be properly formatted ([email protected])
  • Be unique in the system
  • Not be from disposable email providers

Password requirements

Passwords must meet these criteria:
  • Minimum 6 characters
  • Recommended: Mix of letters and numbers
  • No maximum length
Encourage users to change their password after first login and use a password manager for better security.

Edit user profiles

Modify existing user information:

Editable fields

Update first name and last name if:
  • User gets married/divorced
  • Name was entered incorrectly
  • User preferences change
Email addresses cannot be changed after account creation. This prevents:
  • Accidental lockouts
  • Security issues
  • Data integrity problems
To change email, create a new account and deactivate the old one.

How to edit

  1. Click the edit icon (pencil) next to any user
  2. Modify allowed fields
  3. Click Save Changes
  4. Changes take effect immediately

Manage user status

Activate or deactivate users as needed:

Deactivate users

Reasons to deactivate:
  • Employee leaves the company
  • Temporary suspension
  • Role change pending
  • Account security concern
To deactivate:
  1. Click the deactivate icon (user with slash) next to active user
  2. Confirm the action
  3. User immediately loses access
  4. Historical data remains intact

Reactivate users

Restore access to inactive users:
  1. Click the activate icon (user with check) next to inactive user
  2. Confirm the action
  3. User can log in with existing password
  4. All previous settings restored
Reactivating a user restores their role, permissions, and preferences exactly as they were.

Change user roles

Switch users between Administrator and Employee roles:

When to change roles

Promote to admin

  • Employee takes on management duties
  • Need additional admin coverage
  • User requires advanced features

Demote to employee

  • Admin transitions to operational role
  • Reduce permission scope
  • Temporary role adjustment

How to change roles

1

Click role icon

Click the gear icon next to the user
2

Review confirmation

System shows current and new role details
3

Confirm change

Click Change Role button
4

Immediate effect

New permissions apply immediately (user may need to refresh)
Role changes are immediate. If a user is currently logged in, they may need to refresh their browser to see updated permissions.

Search and filter users

Find specific users quickly:

Search functionality

The search bar matches:
  • Email addresses
  • First names
  • Last names
  • Partial matches work
Search is case-insensitive and updates results in real-time.

Filter options

  • All users
  • Administrators only
  • Employees only
  • All statuses
  • Active users only
  • Inactive users only
Combine search and filters: Search for “john” + filter “Active” + filter “Employee” to find active employees named John.

Pagination

User list displays in pages:

Default settings

  • 10 users per page
  • Page navigation at bottom
  • Jump to specific page number
  • Total user count displayed
  • Previous: Go to previous page (disabled on page 1)
  • Page numbers: Click to jump directly
  • Next: Go to next page (disabled on last page)
  • Ellipsis (…): Indicates hidden page numbers

User permissions matrix

Complete breakdown of role capabilities:
FeatureAdminEmployee
User Management
View users
Create users
Edit users
Change roles
Activate/deactivate
Inventory
View products
Add products
Edit products
Delete products
Manage categories
Sales
Process sales
View sales history
Modify sales
Delete sales
Export sales
Customers
View customers
Add customers
Edit customers
Delete customers
Analytics
View dashboards
Export reports
Financial data
Alerts
View alerts
Manage alerts
Configure thresholds
Generate alerts
Settings
System settings
Business configuration
Integration settings

Security features

Authentication

CEMAC uses secure authentication:

Token-based auth

JWT tokens for session management

Secure storage

Encrypted password storage

Session timeout

Automatic logout after inactivity

Login monitoring

Track failed login attempts

Password security

Best practices enforced:
  • Passwords are hashed, never stored in plain text
  • Minimum length requirements
  • Users can change own password anytime
  • Admins cannot view user passwords
If a user forgets their password, admins can create a new password for them, but cannot retrieve the old one.

Audit trail

Track user activities:

Logged actions

The system records:
  • User logins and logouts
  • Role changes
  • Status changes (activate/deactivate)
  • Failed login attempts
  • Critical operations

Vendor tracking in sales

Every sale records:
  • Which user processed it
  • When it was processed
  • User’s role at the time
  • Any modifications made
Audit logs help with accountability, troubleshooting, and compliance.

Best practices

Recommendations for user management:

Minimum admins

Have at least 2 admins to prevent lockouts, but not too many to maintain security

Regular review

Quarterly review of active users and remove those who no longer need access

Strong passwords

Enforce strong password policies and regular password changes

Role appropriateness

Only grant admin access to users who truly need it for their responsibilities

Build docs developers (and LLMs) love