Revoke Users
This topic provides a technical overview of how Admins can revoke user access within a system, focusing on the functionalities such as hiding UserGroups and manually enabling/disabling users. These features are particularly relevant for applications and trial environments within the C3 Agentic AI Platform.
Hiding groups
Admins have the capability to configure a list of groups to be hidden from all users. This feature is designed to simplify the user interface by displaying only the relevant groups for an application.
Implementation
Configuration-only approach: Initially, the hiding of groups may be implemented without a user interface, necessitating configuration at the system level.
Seeding configuration: This configuration can be seeded with the application package, eliminating the need for manual configuration in each app instance.
Manually enabling/disabling users
Admins can manually enable or disable users, providing them the flexibility to quickly grant or revoke access to the application or environment.
Key aspects
User visibility: When a user is disabled, their associated UserGroups remain visible.
Retention of assignments: UserGroup assignments are retained and should be reinstated upon re-enabling a user.
Restriction on UserGroup assignments
IdP management: In some cases, a user may opt to manage group memberships through their Identity Provider (IdP). This necessitates disabling the assignment of Users to C3 UserGroups within the C3 Agentic AI Platform.
Default settings in C3 AI Studio: By default, C3 AI Studio has UserGroup assignment disabled. However, after a user initiates their environment, they should have the option to enable UserGroup assignments through the UI.
The ability to hide irrelevant UserGroups and manually enable/disable users is crucial for Admins managing access within the C3 Agentic AI Platform. These functionalities not only enhance the security and relevancy of the application environment but also provide flexibility in access control, catering to diverse operational needs and preferences. By understanding and leveraging these capabilities, organizations can maintain a secure, streamlined, and user-friendly environment.