When Should I Delete a User versus Making the User Inactive? Article

When Should I Delete a User versus Making the User Inactive? Article

If a user has a complicated set of department security rights it can be helpful to inactivate the user when they no longer need system access.   When a new person who needs the same security as the inactive person is identified the Duplicate User function can be used to copy all the security rights of the inactive user.  This can be an very efficient way to manage security. 


Deleting a user does not delete Audit History.


If the user's security setup is not complicated then the user can be deleted.



    • Related Articles

    • Assign User Permissions Article

      PDF Tutorials  Interactive Tutorial Cropped Screenshots Full Page Screenshots           Step By Step Tutorial - Assign User Permissions CLICK ON THE BLUE LINK ABOVE TO VIEW TUTORIAL See attached PDF's, and Other Tutorials & Knowledge Base Page Links ...
    • User Profile Article

      The user profile window has three (3) tabs:  1. User Info 2. System Info 3. Error Reporting User Info Tab To change password, enter existing password, a new password, and enter the password a second time to confirm. Enter the User's First & Last Name ...
    • Can I Delete Granted OrgUnit Permissions? Article

      1. To delete granted OrgUnit/s Permissions for a given User select their User Profile on the Assign User Permissions Select the OrgUnit by checking the box. Click on Delete Selected Permissions. Then Click on Save User. Below illustrates the deletion ...
    • How Do I to Delete an OrgUnit? Article

      Please see the Manage OrgUnits article for more information. There are two options: Uncheck the IsBudgeted and InReports checkboxes to hide the unused departments. (They will still be using up licensed units); or If you are running short on OrgUnit ...
    • Assign User Permissions Tutorial

      PDF Tutorials  Interactive Tutorial Cropped Screenshots Full Page Screenshots           Prerequisite Steps:  Import Active Directory Users, Map Users to Companies Purpose: This screen is used to assign user security as well as restrict system user ...