Manage Users#
User management in Reply CMP integrates with your Azure Active Directory (Microsoft Entra ID) tenant. Users are invited as guest users via the Microsoft Graph API and then assigned roles within Reply CMP.
Navigate: left navigation → Tenant → Users.
The Users list#
The Users tab shows a card grid of all current users with:
Display name and email
Assigned role badge(s) — colour-coded by role category
Last activity indicator
Inviting a user#
Click “+ Invite User”
Enter the user’s email address
Optionally add a display name (defaults to the username part of the email)
Click Invite
What happens:
Reply CMP calls the Microsoft Graph Invitations API to send an invitation email
The user receives a welcome email with a link to accept and log in
Once accepted, the user appears in the Users list and can be assigned roles
Note
The invitation uses Azure AD guest user functionality. The invitee must have a Microsoft account or Azure AD account to accept. External email-only addresses (non-Microsoft) are not supported.
Assigning roles#
Click on a user card → the User Role Drawer opens on the right
Toggle roles on or off
Click Save
Available roles#
Role |
Category |
What it allows |
|---|---|---|
Owner |
Built-in |
Full platform access including RBAC management |
Contributor |
Built-in |
Full platform access except RBAC changes |
Reader |
Built-in |
Read-only access to all modules |
Discovery Contributor |
Module |
Full Discovery access |
Discovery Reader |
Module |
Read-only Discovery access |
FinOps Contributor |
Module |
Full FinOps access |
FinOps Reader |
Module |
Read-only FinOps access |
Provisioning Contributor |
Module |
Full Provisioning access |
Provisioning Reader |
Module |
Read-only Provisioning access |
Policy Contributor |
Module |
Full Automation access |
Policy Reader |
Module |
Read-only Automation access |
Monitoring Contributor |
Module |
Full Monitoring access |
Monitoring Reader |
Module |
Read-only Monitoring access |
Tenant Reader |
Tenant |
View tenant configuration |
User Administrator |
Admin |
Invite users and assign roles (limited by superset rule) |
For the complete permissions matrix, see Roles and Permissions.
The superset rule#
Important
You can only assign roles whose permissions are a subset of your own permissions. This prevents privilege escalation.
Example: a FinOps Reader cannot assign the FinOps Contributor role to someone else.
The role drawer automatically disables roles that exceed your own permission set. If you need to assign a role you don’t hold yourself, ask a Tenant Owner.
Viewing effective permissions#
The User Role Drawer shows a collapsible Effective Permissions section:
All permissions the user holds given their assigned roles
Grouped by feature category (Discovery, FinOps, Provisioning, etc.)
Each permission shown as
Module.Resource / Action(e.g.FinOps.Cost / Read)
Use this view to audit exactly what a user can do before confirming an invite-to-role workflow.
Self-operation restrictions#
Certain operations cannot be performed on your own account to prevent accidental lock-out:
You cannot remove your own Owner role
You cannot delete your own user account
To make these changes to your own account, ask another Tenant Owner.
Removing a user#
Click on the user card → Role Drawer opens
Click Remove user from tenant at the bottom of the drawer
Confirm
Removed users lose all access immediately. Their historical activity remains visible in the Audit Log.