User Access
Control who has access to Tether and what they can do. User access management ensures the right people have the right permissions.User access management requires Admin permissions.
Understanding User Roles
Tether has three roles:| Role | Description |
|---|---|
| Admin | Full access to all features and settings |
| Sales Rep | Focused access to sales-related features based on channel assignments |
| Tether Admin | System-level access including all Admin capabilities plus internal configuration tools |
The Tether Admin role is typically reserved for Tether support staff. It includes everything an Admin can do, plus access to advanced system configuration such as mapper settings and data management operations.
Admin Capabilities
Admins have full access:- All SKUs and collections
- All channels and warehouses
- All transactions
- All settings and configuration (terminology, inventory & forecast settings, periods)
- User management
- Integrations
Sales Rep Capabilities
Sales Reps have focused access:- View SKUs and collections
- View demand forecasts (with limited editing)
- View sales history
- View assigned channels
- Access the command palette for navigation and search
- Inventory management, warehouses, or suppliers
- Integrations
- Transactions
- Settings or user management
- Dimensions or product hierarchy configuration
Tether Admin Capabilities
Tether Admins have all Admin capabilities, plus:- Mapper configuration for data processing integrations
- Data management operations (e.g., bulk deletion of sales orders or model outputs)
Managing Users
Accessing User Management
User List
| Column | Description |
|---|---|
| Name | User’s display name |
| User’s email address | |
| Role | Admin or Sales Rep |
| Status | Active or Inactive |
| Last Active | Recent activity date |
Inviting Users
Adding a New User
Invitation Process
- User receives email invitation
- User clicks link to accept
- User creates password
- User can access Tether
Configuring Permissions
Channel-Based Access
Control which channels users can see:Hierarchy-Based Access
Assign access at hierarchy levels:| Level | Access Granted |
|---|---|
| All Channels | Everything |
| Channel Type | All channels of that type |
| Region | All channels in region |
| Individual | Specific channels only |
Editing Users
Changing User Role
Updating Channel Access
Deactivating Users
When to Deactivate
- Employee leaves company
- Role change doesn’t require access
- Temporary suspension
Deactivation Process
Effects of deactivation:
- User cannot log in
- User retains in system for records
- Can be reactivated later
Reactivating Users
- Find deactivated user
- Click Reactivate
- Confirm reactivation
Access Control Best Practices
Principle of Least Privilege
Principle of Least Privilege
Grant minimum necessary access:
- Only needed channels
- Only needed features
- Review regularly
Regular Access Reviews
Regular Access Reviews
Periodically review users:
- Check active users still need access
- Verify role assignments
- Update channel access
Prompt Deactivation
Prompt Deactivation
When employees leave:
- Deactivate immediately
- Don’t wait for cleanup
- Document the change
Document Access Decisions
Document Access Decisions
Keep records of:
- Why access was granted
- Who approved
- When reviewed
Security Considerations
Password Requirements
Users must create secure passwords:- Minimum length requirements
- Complexity requirements
- No password reuse
Session Security
| Feature | Description |
|---|---|
| Session Timeout | Auto logout after inactivity |
| Single Session | One active session per user |
| Secure Connection | HTTPS required |
Audit Trail
User actions are logged:- Login/logout events
- Data changes
- Settings modifications
Troubleshooting
User Can’t Log In
Possible causes:- Incorrect password
- Account deactivated
- Invitation not accepted
- Verify account is active
- Check invitation was accepted
- Reset password if needed
User Missing Data
Possible causes:- Channel not assigned
- Filters applied
- Role restrictions
- Review channel assignments
- Check user’s filters
- Verify role permissions
Invitation Not Received
Possible causes:- Email in spam
- Incorrect email address
- Email delivery issues
- Check spam folder
- Verify email address
- Resend invitation
Next Steps
Roles & Permissions
Understand role capabilities
Channel Hierarchy
Configure access hierarchy
Inventory Settings
Configure system settings
Terminology
Customize terminology