Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

User Management in Hudu: Roles, Permissions & Access

Hudu
04/12/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Hudu provides six role levels from free read-only portal members to licensed users with varying degrees of admin tools, documentation capabilities, and editing rights
  • Users can be added individually or via bulk CSV import, with permissions managed through group assignments that control company visibility via allow lists and deny lists
  • The user dashboard centralizes all management functions including role changes, password resets, group assignments, and activity monitoring in a single interface

Summary

This tutorial demonstrates Hudu's user management capabilities, covering the complete workflow from adding new users to validating their access permissions. The platform offers six role levels ranging from free portal members with read-only access to super admins with full administrative capabilities. Users can be added individually through the invite interface or in bulk via CSV import. The system uses a group-based permissions model where users are assigned to groups that control company visibility through allow lists and deny lists. Each user's dashboard provides centralized visibility into their role level, security settings, login frequency, documentation contributions, and company interactions. Administrators can modify user roles, reset passwords, archive accounts, and use the impersonation feature to view the platform from any user's perspective, ensuring permissions are configured correctly. This comprehensive approach to user management enables organizations to maintain granular access control while streamlining the administration of technician permissions across their documentation environment.

Chapters

0:00 - Adding Users to Hudu
0:36 - Role Levels and Permissions
1:31 - User Management Dashboard
3:23 - Impersonating Users

Key Quotes

0:42 "Hoodoo has six different role levels to choose from. Portal members are your completely free users who are read-only accessed through the portal. The other five levels are all going to be considered a licensed user."
1:13 "This is why it is important to have groups created before adding users so that way you can easily place a user into their designated groups when adding them into Hoodoo."
3:33 "This can be very useful if you ever want to view what your other role levels see when they access Hoodoo. Essentially, being able to see your instance from their perspective to confirm the permissions they have is what you intended."

Categories:
  • » Data Protection
Channels:
News:
Events:
Tags:
  • How-To
  • Getting Started
  • Identity & Access
  • Best Practices
  • User Management
  • Role-Based Access Control
  • Permission Management
  • Group Administration
  • User Onboarding
  • Access Validation
  • Documentation Access Control
  • MSP Tools
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: User Management in Hudu: Roles, Permissions & Access

              Upcoming Webinar Calendar

              • 04/15/2026
                01:00 PM
                04/15/2026
                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/
              • 04/16/2026
                11:00 AM
                04/16/2026
                Beyond the Alert – Building the Human Centric Agentic SOC
                https://www.truthinit.com/index.php/channel/1372/beyond-the-alert-–-building-the-human-centric-agentic-soc/
              • 04/21/2026
                02:00 PM
                04/21/2026
                How Purpose Brands scales IT with Zendesk ITAM
                https://www.truthinit.com/index.php/channel/1881/how-purpose-brands-scales-it-with-zendesk-itam/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/

              Upcoming Events

              • Apr
                15

                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities

                04/15/202601:00 PM ET
                • Apr
                  16

                  Beyond the Alert – Building the Human Centric Agentic SOC

                  04/16/202611:00 AM ET
                  • Apr
                    21

                    How Purpose Brands scales IT with Zendesk ITAM

                    04/21/202602:00 PM ET
                    • Apr
                      30

                      Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection

                      04/30/202610:00 AM ET
                      • Apr
                        30

                        The New Economics of VMware Exit

                        04/30/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version