Users
The Users section allows administrators to manage user accounts in SingleJump.
Users can be assigned roles, device groups, and security configurations such as Two-Factor Authentication and SSH session recording.
This section is essential for controlling access to devices and system resources.
Users List
The Users list provides an overview of all registered users.
Each row displays:
- Name – The full name of the user
- Username – Used to log into SingleJump
- Two Factor Auth – Indicates if 2FA is enabled
- Enabled – Shows whether the user account is active
- Edit – Modify the user
- View – Detailed user information
You can also use the search bar to quickly locate a specific user.
To create a new user, click New user.
Create User
Clicking New user displays the user creation form.
Below is a description of each field and option.
Logged user password *
Your current password is required to authorize the creation of a new user.
SingleJump stores all SSH private keys and sensitive user-level encryption keys encrypted.
These can only be decrypted using the password of the logged-in administrator.
Because creating a new user requires generating secure access keys, the system must first decrypt the administrator’s encryption material.
This ensures:
- Only an authenticated admin can create new users
- No one can generate encryption data without permission
- The system maintains strict cryptographic security
Name *
The full name of the new user.
Username *
Unique username used to log into SingleJump.
Example:
- peter
- admin01
Password *
Password for the new user’s login.
It must include uppercase letters, lowercase letters, numbers, and special characters.
Password confirmation *
Ensures that the password was entered correctly.
Roles
Select one or more roles to assign permissions to the user.
Roles determine what the user can view or modify inside SingleJump.
Examples:
- Super Admin
- User
- Read-only
- Support
(See the Roles section for more details.)
Device Group
Optional: assign the user to a device group.
This enables granular access control, ensuring the user can only access devices from specific groups.
Enabled
Controls whether the user account is active.
Disabled users cannot log in or perform any actions.
Record
If enabled, all SSH sessions performed by this user will be recorded.
This is useful for:
- Auditing
- Compliance
- Security investigations
Creating the User
At the bottom, you can choose:
- Create – Save the user
- Create & create another – Save and open a blank form
- Cancel – Discard changes
Summary
The Users section is the core of SingleJump’s access management layer.
Using this page, administrators can:
- Add and manage user accounts
- Assign roles with specific permissions
- Control device-level access
- Enable or disable SSH session recording
- Require Two-Factor Authentication
- Maintain encryption security through password-based decryption
Together with Roles, ACLs, and Device Groups, this section ensures that only authorized and properly authenticated users can interact with devices and system resources.