User Management
User Management in Visual Guard provides a centralized and secure way to manage user identities, access rights, and authentication methods across your applications. It enables administrators to create, organize, and maintain users efficiently while enforcing consistent security policies.
With support for multiple authentication modes—including Active Directory, Entra ID (Azure AD), database, and passwordless authentication—Visual Guard adapts seamlessly to diverse enterprise environments. Administrators can assign users to groups and roles, apply permissions, configure MFA, and control data access with precision.
Types of Users

Visual Guard User
A Visual Guard user is a locally managed account created and maintained within Visual Guard. Authentication is handled internally by Visual Guard using a username and password, and access is controlled through assigned roles, groups, and security policies.
Database User
A database user is an account that authenticates directly against the repository database (such as SQL Server or Oracle). Visual Guard validates the user’s credentials using the database authentication mechanism while still managing roles, permissions, and access rules within Visual Guard.
Windows User
A Windows user is an account authenticated through Windows or Active Directory (AD). Visual Guard leverages the existing domain identity for authentication, allowing organizations to reuse centralized Windows credentials while managing application-specific authorization and security policies in Visual Guard.
Benefits of User Management in Visual Guard
🔐 Centralized Access Control
Manage all users, roles, groups, and permissions from a single, unified interface, reducing administrative overhead and configuration errors.
⚙️ Simplified Administration
Easily create, update, deactivate, or remove users while applying security policies consistently across applications and environments.
🧩 Scalable Role & Group Management
Assign roles and permissions at the group level, making it easy to scale user access management as teams and organizations grow.
🔄 Flexible Authentication Options
Support for multiple authentication methods—including Active Directory, Entra ID (Azure AD), database, and passwordless authentication—ensures seamless integration with existing identity systems.
🛡️ Enhanced Security & Compliance
Enforce strong security policies such as MFA, password rules, and access validation while maintaining detailed audit trails for compliance and monitoring.
🔍 Improved Visibility & Control
Gain clear insight into user access, roles, and activity, helping administrators quickly identify misconfigurations or potential security risks.
🚀 Operational Efficiency
Automated workflows and streamlined user actions reduce manual effort, enabling faster onboarding, role changes, and issue resolution.
