Skip to main content

Security Groups

Security Groups are how you control who sees what in the platform. They are permission containers that connect people to the equipment and facilities they need to work with โ€” giving every user access to exactly the right assets and systems, and nothing beyond that.


๐Ÿงฉ How Security Groups Workโ€‹

The concept is straightforward: place a user in a Security Group, and they automatically gain access to every asset and system in that same group. There are no individual permission assignments, no complex access matrices โ€” just logical grouping.

Every Security Group has three types of members:

Member TypeDescription
UsersThe people who need access
AssetsThe equipment they can view and manage
SystemsThe facilities or locations they can access

๐Ÿ“Œ The core rule: Everyone in a group can access everything in that group. Access is granted at the group level, not the individual record level.

Why This Mattersโ€‹

ChallengeHow Security Groups Solve It
Multiple customers sharing one platformOne group per customer keeps data fully isolated
Regional teams with separate equipmentGroups scoped by geography keep each team focused
Large fleets to manageAssign once to a group โ€” no individual assignments needed
Growing business with changing access needsAdd or remove members from a group at any time

A Practical Exampleโ€‹

Consider a Security Group named SG_Distributor_MidwestRegion:

SG_Distributor_MidwestRegion
โ”œโ”€โ”€ ๐Ÿ‘ค Users
โ”‚ โ”œโ”€โ”€ Regional Account Manager
โ”‚ โ””โ”€โ”€ Field Service Technician
โ”œโ”€โ”€ ๐Ÿ”ฉ Assets
โ”‚ โ”œโ”€โ”€ Centrifugal Pump Unit 4
โ”‚ โ””โ”€โ”€ Conveyor Drive Assembly
โ””โ”€โ”€ ๐Ÿ— Systems
โ”œโ”€โ”€ Chicago Processing Plant
โ””โ”€โ”€ Milwaukee Distribution Hub

Both users immediately gain access to both assets and both systems โ€” no further configuration required.


๐Ÿ“‹ Security Groups Listโ€‹

The list view displays all Security Groups in your account.

List Columnsโ€‹

ColumnDescription
NameThe Security Group name
Action๐Ÿ—‘ Delete option

Available controls: Search by group name ยท Toggle between grid and list views ยท โž• Add new group ยท Export Security Groups data


๐Ÿ” Security Group Detail Viewโ€‹

Click any Security Group name to open its detail page, which contains three tabs.

TabWhat It Shows
UsersAll users in the group โ€” name, email, and date added
AssetsAll assets in the group โ€” name, serial number, owner, and model
SystemsAll systems in the group โ€” system ID, name, type, integrator, and status

โž• Creating a Security Groupโ€‹

Click + on the Security Groups list to begin. Creation takes two steps.

Step 1 โ€” Name and Descriptionโ€‹

Provide a unique name and a brief description of the group's purpose.

โš ๏ธ Non-obvious: Security Group names must be unique within your account. The platform will not allow duplicate names.

Recommended naming convention:

PrefixUse ForExample
SG_Customer_Customer-specific groupsSG_Customer_AcmeManufacturing
SG_Distributor_Regional distributor groupsSG_Distributor_SoutheastRegion
SG_Internal_Internal team groupsSG_Internal_SupportTeam

๐Ÿ’ก A consistent naming convention becomes essential once you have many Security Groups. Establish your pattern before you scale.

Step 2 โ€” Add Members via Transfer Listsโ€‹

Three transfer lists are presented โ€” one for Assets, one for Systems, and one for Users. Each list has two sides:

SideDescription
Choices (left)All available items in your account, not yet in this group
Chosen (right)Items selected for this Security Group

Select items from the left, move them to the right with the arrow control, and repeat for each category. To deselect, move items back from right to left.

๐Ÿ“Œ Administrator visibility note: Super Administrators see all users in the account. Administrators see all users except other Super Administrators.

โœ… Result: The Security Group is created instantly. All added users immediately gain access to all added assets and systems.


โœ๏ธ Editing a Security Groupโ€‹

  1. Open the Security Group from the list.
  2. Click the EDIT button on the detail page.
  3. Update the name or description if needed.
  4. Use the same transfer lists to add or remove assets, systems, and users.
  5. Submit to save.

โš ๏ธ Non-obvious: Changes take effect immediately upon saving. Users gain or lose access the moment the update is confirmed.

When editing, the Choices list automatically excludes items already in the group, so you only see what is available to add โ€” reducing clutter when managing large groups.


๐Ÿ—‘๏ธ Deleting a Security Groupโ€‹

Click the ๐Ÿ—‘ delete icon on the Security Groups list row for the group you wish to remove.

What happens on deletion:

  • The Security Group is disabled and can no longer be assigned.
  • All users in the group immediately lose access to the associated assets and systems.
  • The users, assets, and systems themselves are not deleted โ€” only the access relationships are removed.

โš ๏ธ Non-obvious: Deletion cannot be undone. Verify that removing access for all members is intentional before proceeding. If in doubt, communicate the change to affected users in advance.


๐Ÿ—๏ธ Common Access Structuresโ€‹

By Customer (most common for multi-customer platforms)โ€‹

One Security Group per customer ensures complete data isolation. No customer can view another's equipment or facilities.

SG_Customer_CompanyA
โ”œโ”€โ”€ Users: CompanyA personnel
โ”œโ”€โ”€ Assets: CompanyA equipment
โ””โ”€โ”€ Systems: CompanyA facilities

SG_Customer_CompanyB
โ”œโ”€โ”€ Users: CompanyB personnel
โ”œโ”€โ”€ Assets: CompanyB equipment
โ””โ”€โ”€ Systems: CompanyB facilities

By Geography (for regional operations)โ€‹

One Security Group per territory keeps regional teams focused on their own equipment without visibility into other regions.

SG_Distributor_NortheastRegion
โ”œโ”€โ”€ Users: Northeast distributor team
โ”œโ”€โ”€ Assets: Northeast equipment
โ””โ”€โ”€ Systems: Northeast facilities

SG_Distributor_SouthwestRegion
โ”œโ”€โ”€ Users: Southwest distributor team
โ”œโ”€โ”€ Assets: Southwest equipment
โ””โ”€โ”€ Systems: Southwest facilities

Hybrid (for complex organizations)โ€‹

Combine customer-facing and internal groups to give your support team full visibility while keeping customers isolated from each other.

SG_Customer_AcmeMfg_External
โ”œโ”€โ”€ Users: Acme's own personnel
โ”œโ”€โ”€ Assets: Acme's equipment
โ””โ”€โ”€ Systems: Acme's facilities

SG_Customer_AcmeMfg_Internal
โ”œโ”€โ”€ Users: Your internal support staff
โ”œโ”€โ”€ Assets: Acme's equipment
โ””โ”€โ”€ Systems: Acme's facilities

๐Ÿ”„ Common Workflowsโ€‹

Workflow 1 โ€” Onboarding a New Customerโ€‹

  1. Click + to create a new Security Group.
  2. Name it using the SG_Customer_ convention.
  3. Add the customer's users in the Users transfer list.
  4. Add the customer's assets in the Assets transfer list.
  5. Add the customer's facilities in the Systems transfer list.
  6. Save.

โœ… Result: The customer's users immediately have access to their equipment and facilities โ€” and nothing belonging to any other customer.


Workflow 2 โ€” Removing Access When a User Leavesโ€‹

  1. Open the relevant Security Group.
  2. Click EDIT.
  3. In the Users transfer list, move the departing user from Chosen back to Choices.
  4. Submit.

โœ… Result: The user's access is revoked instantly across all assets and systems in the group.


Workflow 3 โ€” Reassigning an Asset to a New Groupโ€‹

  1. Open the Security Group that currently contains the asset.
  2. Click EDIT and move the asset from Chosen back to Choices โ€” then save.
  3. Open the destination Security Group.
  4. Click EDIT and move the asset from Choices to Chosen โ€” then save.

โœ… Result: The asset is accessible to the new group and removed from the old one. Historical data for the asset is preserved.


๐Ÿ—‚๏ธ Planning Your Security Group Structureโ€‹

Before creating groups, consider how your business is organized. A few key questions to guide your structure:

  • Are you organized by customer, geography, or product line? The answer determines whether your primary grouping unit is a company, a region, or a product category.
  • What are your data isolation requirements? If customers must never see each other's data, one group per customer is non-negotiable.
  • Which internal teams need cross-customer visibility? Support and service teams typically need broader access โ€” plan for a separate internal group structure rather than adding internal staff to every customer group.
  • What does compliance require? Export your Security Group list periodically and retain it as an access audit record.

โœ… Best Practicesโ€‹

  • Apply the principle of least privilege. Add users only to the Security Groups they genuinely need. If a user works exclusively with one customer's equipment, do not include them in any other customer's group.
  • Establish a naming convention before you scale. A clear, consistent prefix system (SG_Customer_, SG_Distributor_, SG_Internal_) makes managing many groups significantly easier.
  • Review Security Groups monthly. Remove users who have left or changed roles, decommission groups containing no active members, and remove assets that have been retired.
  • Document your structure. Maintain a reference that describes the purpose of each Security Group, who should be in it, and what it should contain. This is invaluable when onboarding new administrators.
  • Test after major changes. After restructuring groups, verify access by reviewing the Users, Assets, and Systems tabs on the affected groups to confirm membership is correct.

๐Ÿ› ๏ธ Troubleshootingโ€‹

A user cannot see an asset they need access toโ€‹

Work through this checklist in order:

  1. Open the relevant Security Group and check the Users tab โ€” confirm the user is listed.
  2. Check the Assets tab โ€” confirm the asset is in the same group.
  3. Verify the group was saved after the last edit (check the group's current membership against what you intended).
  4. If the issue persists, remove the user and re-add them, then save.

There are too many Security Groups to manage efficientlyโ€‹

  1. Identify groups with no users โ€” these can likely be deleted.
  2. Identify groups with identical or overlapping membership โ€” consider consolidating them.
  3. Shift toward fewer, broader groups where data isolation requirements allow it.

Managing Security Groups is taking too much timeโ€‹

  • Use the search function within transfer lists rather than scrolling through large lists.
  • Select multiple items at once instead of moving them individually.
  • Build a standard checklist for common setups such as new customer onboarding, so the process is consistent and fast.

๐Ÿ’ก Tips & Shortcutsโ€‹

TipHow
Find a group quicklyUse the search bar on the Security Groups list
Bulk select in transfer listsSelect multiple items at once โ€” no need to move them one by one
Search within transfer listsUse the search box inside a transfer list when the list is long
Audit accessUse the export feature to generate a record of all Security Groups and their members
Track your changesNote why you created or modified a group โ€” the reason may not be obvious later