Managed users

The manageable users of the system can be found in the "Participants" -section's "Impersonations" -section. If for example a certain event or even a school holds a vote, but not everyone has a working email address an admin user can add managed users, who can use the system under the supervision of the admin or the admin themselves can use it.

A "New" -button can be found from the whole list -actions, which can be used to add a new manageable user to the system. This feature adds a new user to the system, who does not have an email address. While adding a new manageable user the system asks for a authorization method, if a strong authorization method is defined in the system.

While adding the user, the system asks for the same information that the user would get asked while authenticating the account. For example when authenticating with an ID card, you have to fill the information found in the card to the system. The information to be filled depend on the strong authentication method.

When the manageable user is added, it can be managed with its action buttons. The following action buttons can be found for managed users:

  • Impersonate user - This button begins the impersonating process. Before the session begins, the strong identification information has to be filled in the system before every session. When the session begins, the user has a limited time to navigate the website until the session ends. If you allow a non-admin user to navigate the site during the session, their actions have to be supervised, because when the session ends, they will return to the dashboard.
  • View logs - Shows the auditlog information about what was done with the account. Practically this shows which admin user impersonated this user, when the session started and when it ended. If the session expired, this is also shown in the logs.
  • Promote - If you want to grant the user their own account later, it can be done with the "Promote" feature. This feature asks the admin user the user's email address and links it to this account. When the email address is added, and the user themselves have confirmed it, the manageable user becomes a registered user in the system. After this is done the admin cannot impersonate the specific user anymore.