No results

Help CenterUser ManagementResetting User Passwords

Resetting User Passwords

Last updated October 10, 2024

Resetting User Passwords in Addigy

Ensuring the security of user accounts is a top priority for every organization. In Addigy, resetting user passwords is a straightforward process designed to maintain cybersecurity while providing users with access control over their accounts. This article will guide you through the steps necessary to reset a user password within the Addigy platform.

Why You Might Need to Reset Passwords

There are several reasons why a user might need to reset their password, including:

  • Forgotten passwords
  • Security concerns or potential breaches
  • Routine password updates as per company policy

Step-by-Step Guide to Resetting User Passwords

Follow these steps to successfully reset a user's password in Addigy:

  • Log in to your Addigy Admin account.
  • Navigate to the 'Users' section in the dashboard.
  • Locate the user whose password you need to reset. You can use the search bar for quick access.
  • Click on the user's name to view their account details.
  • Find the 'Password' field and click on the 'Reset Password' button.
  • Enter a new password that meets the required criteria (e.g., length, complexity).
  • Confirm the new password by re-entering it in the next field.
  • Click 'Save' to update the password for the user.
  • Notify the user of their password reset, providing them with any necessary instructions to log in with their new password.
  • Best Practices for Password Management

    To enhance the security of user accounts, consider implementing the following best practices:

    • Encourage the use of strong, unique passwords that include a combination of letters, numbers, and symbols.
    • Regularly prompt users to change their passwords, especially in the case of any security incidents.
    • Enable two-factor authentication for an additional layer of security.

    Resetting user passwords in Addigy is a critical task for maintaining account security. By following these steps and best practices, you can ensure that user accounts remain protected and accessible only to authorized individuals.

    Was this article helpful?