Admin Teams
Admin Teams provides administrators with advanced team management capabilities, allowing you to standardize roles, enforce policies, and audit access across your organization. This interface is designed for administrators who need centralized control over team membership, role assignments, and access management.
Understanding Admin Teams
Admin Teams extends standard team management with administrative features for centralized control and policy enforcement.
Centralized Management
Manage all team members from a central administrative interface. Standardize roles and enforce policies across the organization.
Policy Enforcement
Enforce organizational policies through standardized role assignments. Ensure consistent access control across all teams and workspaces.
Access Auditing
Audit team membership and access across the organization. Review role assignments, identify security issues, and maintain compliance.
Common Use Cases
Organizational Management
Manage team members across the entire organization from one central location. Standardize roles and ensure consistent access control.
Security Compliance
Enforce security policies by centralizing access control. Restrict sensitive operations (billing, settings) to a small admin group.
Access Auditing
Conduct regular audits of team membership and access. Identify security issues, ensure compliance, and maintain accurate access records.
Role Standardization
Standardize roles across the organization. Use custom roles for finer access control and ensure consistent permissions for similar job functions.
Key Benefits
Centralized Control
Manage all team members from one central interface. Standardize roles and enforce policies across the entire organization.
Enhanced Security
Centralize ownership for billing and sensitive keys to a small admin group. Enforce security policies through standardized role assignments.
Compliance & Auditing
Audit team membership and access across the organization. Maintain compliance with security policies and organizational requirements.
Policy Enforcement
Enforce organizational policies through standardized role assignments. Ensure consistent access control across all teams and workspaces.
Adding Team Members
Add new team members to your organization and assign them appropriate roles.
Step 1: Navigate to Admin Teams
-
1
Go to Teams: Navigate to Teams in the main navigation menu.
-
2
Click Admin Teams: Select Admin Teams from the Teams submenu.
-
3
Click Add New Team Member: Look for the Add New Team Member or Invite button, typically at the top of the team members list.
Step 2: Enter Team Member Details
Fill in the team member information:
Required Information
- Name: The team member's full name
- Email: The team member's email address (use company emails for traceability)
- Role: Select a role to assign to the team member. Use custom roles for finer access control
- Workspace(s) (if applicable): If using workspaces, specify which workspace(s) the team member should belong to
Step 3: Send Invitation
After entering team member details:
- Review the team member information and role assignment
- Click Send Invitation or Invite
- The team member will receive an email invitation
- Track invitation status (pending/accepted) in the team members list
Using Custom Roles
Custom roles allow you to create fine-grained access control tailored to your organization's needs.
Benefits of Custom Roles
- Finer Access Control: Create roles with specific permission combinations that match your organization's exact needs
- Job Function Alignment: Align roles with specific job functions or departments (e.g., "Sales Manager", "Billing Specialist")
- Consistent Permissions: Ensure all team members with the same role have identical permissions, eliminating inconsistencies
- Easy Updates: When responsibilities change, update the role once and all team members with that role are updated automatically
Creating Custom Roles: Custom roles are created in the Roles & Permissions section. Once created, they can be assigned to team members through Admin Teams or Team Management.
Security Best Practices
Follow these security practices when managing admin teams:
Centralize Sensitive Operations
Restrict sensitive operations to a small admin group:
Sensitive Operations to Restrict
- Billing & Payment Methods: Only grant billing permissions to trusted administrators. Billing changes can have financial consequences.
- API Keys & Settings: Restrict access to API keys, webhook configurations, and system settings. These control critical integrations.
- Role Management: Limit role creation and assignment to senior administrators. Role changes affect all users with those roles.
- White Labeling: If using white labeling, restrict access to branding and configuration changes to authorized administrators only.
Revoke Access Promptly
When team members leave, revoke access immediately:
Immediate Action Required
- Deactivate Immediately: When team members leave, deactivate their accounts immediately. Don't wait for scheduled reviews.
- Remove Access: Remove all role assignments and workspace access for departed team members.
- Review Permissions: Review what the team member had access to and verify no unauthorized actions were taken.
- Update Documentation: Update team documentation and access records to reflect the change.
Best Practices
Role Management
- Use Custom Roles: Create custom roles tailored to your organization's needs rather than using generic roles. This provides finer access control.
- Standardize Roles: Standardize roles across the organization. Ensure similar job functions have consistent role assignments.
- Document Roles: Document the purpose and permissions of each role. This helps with audits and future maintenance.
- Review Regularly: Periodically review role assignments to ensure they still match current organizational needs.
Access Control
- Centralize Sensitive Operations: Restrict billing, API keys, and system settings to a small admin group. Don't grant these permissions broadly.
- Enforce Least Privilege: Grant only the minimum permissions necessary for team members to perform their job functions.
- Revoke Promptly: Revoke access immediately when team members leave. Delayed access removal is a security risk.
- Regular Audits: Conduct regular audits of team membership and access to ensure compliance with security policies.
Policy Enforcement
- Standardize Policies: Enforce organizational policies through standardized role assignments. Ensure consistent access control across all teams.
- Document Policies: Document access control policies and procedures. This helps with compliance and training.
- Monitor Compliance: Regularly monitor team membership and access to ensure compliance with organizational policies.
- Update Policies: When organizational policies change, update role assignments and access control accordingly.
Troubleshooting
Cannot manage team members
Checklist:
- Check permissions: Ensure you have the necessary permissions to manage teams. Admin Teams typically requires admin-level permissions.
- Verify role: Check that your user account has a role with team management permissions assigned.
- Super Admin: Super Admins can always manage teams. If you're a Super Admin and still can't, contact support.
- Workspace context: If using workspaces, ensure you're in a workspace where you have admin permissions.