Skip to main content

User Access

Control who has access to Tether and what they can do. User access management ensures the right people have the right permissions.
User access management requires Admin permissions.

Understanding User Roles

Tether has three roles:
RoleDescription
AdminFull access to all features and settings
Sales RepFocused access to sales-related features based on channel assignments
Tether AdminSystem-level access including all Admin capabilities plus internal configuration tools
The Tether Admin role is typically reserved for Tether support staff. It includes everything an Admin can do, plus access to advanced system configuration such as mapper settings and data management operations.

Admin Capabilities

Admins have full access:
  • All SKUs and collections
  • All channels and warehouses
  • All transactions
  • All settings and configuration (terminology, inventory & forecast settings, periods)
  • User management
  • Integrations

Sales Rep Capabilities

Sales Reps have focused access:
  • View SKUs and collections
  • View demand forecasts (with limited editing)
  • View sales history
  • View assigned channels
  • Access the command palette for navigation and search
Sales Reps cannot access:
  • Inventory management, warehouses, or suppliers
  • Integrations
  • Transactions
  • Settings or user management
  • Dimensions or product hierarchy configuration

Tether Admin Capabilities

Tether Admins have all Admin capabilities, plus:
  • Mapper configuration for data processing integrations
  • Data management operations (e.g., bulk deletion of sales orders or model outputs)

Managing Users

Accessing User Management

1

Go to Settings

Click your profile avatar in the top-right corner and select Settings
2

Select User Access

Click on the User Access card
3

View Users

See list of all users

User List

ColumnDescription
NameUser’s display name
EmailUser’s email address
RoleAdmin or Sales Rep
StatusActive or Inactive
Last ActiveRecent activity date

Inviting Users

Adding a New User

1

Click Invite User

From User Access, click Invite User
2

Enter Details

Provide user information:
  • Email address
  • Name (optional)
  • Role
3

Configure Access

For Sales Rep role:
  • Assign channels
  • Set permissions
4

Send Invitation

Click Send Invite

Invitation Process

  1. User receives email invitation
  2. User clicks link to accept
  3. User creates password
  4. User can access Tether

Configuring Permissions

Channel-Based Access

Control which channels users can see:
1

Select User

Click on user to edit
2

Find Channel Access

Locate channel assignment section
3

Assign Channels

Select channels user can access
4

Save

Apply changes

Hierarchy-Based Access

Assign access at hierarchy levels:
LevelAccess Granted
All ChannelsEverything
Channel TypeAll channels of that type
RegionAll channels in region
IndividualSpecific channels only
See Channel Hierarchy for more.

Editing Users

Changing User Role

1

Select User

Click on user to edit
2

Change Role

Update role from dropdown
3

Adjust Access

Update permissions if needed
4

Save

Apply changes
Changing from Admin to Sales Rep removes access to settings and user management.

Updating Channel Access

1

Select User

Click on user to edit
2

Modify Channels

Add or remove channel assignments
3

Save

Apply changes

Deactivating Users

When to Deactivate

  • Employee leaves company
  • Role change doesn’t require access
  • Temporary suspension

Deactivation Process

1

Select User

Click on user to deactivate
2

Click Deactivate

Choose deactivate option
3

Confirm

Confirm the deactivation
Effects of deactivation:
  • User cannot log in
  • User retains in system for records
  • Can be reactivated later

Reactivating Users

  1. Find deactivated user
  2. Click Reactivate
  3. Confirm reactivation

Access Control Best Practices

Grant minimum necessary access:
  • Only needed channels
  • Only needed features
  • Review regularly
Periodically review users:
  • Check active users still need access
  • Verify role assignments
  • Update channel access
When employees leave:
  • Deactivate immediately
  • Don’t wait for cleanup
  • Document the change
Keep records of:
  • Why access was granted
  • Who approved
  • When reviewed

Security Considerations

Password Requirements

Users must create secure passwords:
  • Minimum length requirements
  • Complexity requirements
  • No password reuse

Session Security

FeatureDescription
Session TimeoutAuto logout after inactivity
Single SessionOne active session per user
Secure ConnectionHTTPS required

Audit Trail

User actions are logged:
  • Login/logout events
  • Data changes
  • Settings modifications

Troubleshooting

User Can’t Log In

Possible causes:
  • Incorrect password
  • Account deactivated
  • Invitation not accepted
Solutions:
  1. Verify account is active
  2. Check invitation was accepted
  3. Reset password if needed

User Missing Data

Possible causes:
  • Channel not assigned
  • Filters applied
  • Role restrictions
Solutions:
  1. Review channel assignments
  2. Check user’s filters
  3. Verify role permissions

Invitation Not Received

Possible causes:
  • Email in spam
  • Incorrect email address
  • Email delivery issues
Solutions:
  1. Check spam folder
  2. Verify email address
  3. Resend invitation

Next Steps

Roles & Permissions

Understand role capabilities

Channel Hierarchy

Configure access hierarchy

Inventory Settings

Configure system settings

Terminology

Customize terminology