Users
Create, manage, and control user access
SendAuth authentication and access controls are centered on users.
User management features require administrator or registrar permissions. Regular users can only view and edit their own profile information.
Creating Users
Basic User Information
When creating a new user, you can provide:
- Email address - Primary identifier and contact method
- First name - User’s given name
- Last name - User’s family name
- Phone number - Mobile number for SMS notifications
- Role - User’s access level within the organization. Read more about roles
- Company - Associated company or department. Read more about companies
Permission Assignment
Users are assigned permission labels and groups. Read more about permission labels and groups.
Communication Preferences
Users can control how they receive authentication notifications:
- Email notifications - Authentication requests sent via email
- SMS notifications - Authentication requests sent via text message
Users should have at least one communication method enabled for enhanced security.
Passkey Management
Passkey Operations
Registrars and higher can:
- Generate registration links - Create secure registration URLs for users
- Monitor registration - Track passkey setup progress
- Revoke passkeys - Remove compromised or unused authentication methods
Users should register passkeys on devices they personally control. Never share passkey registration links through insecure channels.
User Search and Filtering
Search Capabilities
Find users using various criteria:
- Name search - First name, last name, or full name
- Email search - Email address or domain
- Phone search - Phone number or partial matches
- Company search - Company name or department
Advanced Filtering
- Permission filtering - Show only users with specific permissions
- Role filtering - Display users by role level
- Status filtering - Active, deleted, or all users
- Company filtering - Users from specific companies
Sorting Options
Organize user lists by:
- Name - Alphabetical by first or last name
- Email - Alphabetical by email address
- Company - Grouped by company association
- Creation date - Newest or oldest first
User Authentication
Authentication Requests
Authenticators and higher can initiate authentication requests for users to:
- Identity verification - Confirm user identity for sensitive operations
API Key Management
User API Keys
For programmatic access, users can manage their own API keys:
API keys provide programmatic access to user accounts. Store keys securely and rotate them regularly. Never share API keys or commit them to version control.
- Generation - Create new API keys for applications
- Management - View key information and usage
- Revocation - Disable compromised or unused keys