Skip to main content
Version: Current

Step 4: Verify User Access

After setting up the account, team memberships, and user groups, it's essential to confirm the user can log in and has the intended level of access.

Steps:

  1. Inform User: Notify the new user that their Zudello account is ready. Provide them with their email address (username) and the initial password you set (or instruct them to check for the verification email if enabled).
  2. Initial Login & Password Change: Ask the user to log in to Zudello at https://app.zudello.io.
    • If email verification was enabled, they will be prompted to verify their email and set a new, secure password.
    • If verification was disabled, they should log in with the initial password and be encouraged to change it immediately via their Profile > Advanced > Set new password.
  3. Verify Team Access: Have the user check if they can see and switch between all the teams they were assigned to using the company menu (top right).
  4. Verify Permissions (Spot Check): Ask the user to attempt a few key actions relevant to their role within one of their assigned teams (e.g., view invoices, create a requisition, access expense claims). Confirm they can perform expected actions and are appropriately restricted from actions they shouldn't have access to.
  5. Troubleshoot (If Necessary): If the user encounters login issues or incorrect permissions, revisit their user settings (Organisation Settings > Users > Edit User):
    • Double-check the email address.
    • Reset the password if needed (Advanced > Reset password).
    • Verify the correct teams are assigned and active (Team settings).
    • Confirm the correct user groups are selected for each team (Team settings > User groups).
    • Review the permissions associated with the assigned user groups (Organisation Settings > User groups).

What Happens Next?

The user is successfully onboarded and ready to start using Zudello!

End of Tutorial

You have successfully created a new user account, assigned team memberships, configured permissions via user groups, and verified access.


Related How-To Guides: