Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

User & Group Management in Hudu Documentation Platform

Hudu
05/19/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Security groups in Hudu control user access to documentation, with permissions configurable at both company level and individual item level
  • Six user role levels provide varying capabilities from read-only portal members to super admins with full administrative control
  • Groups can be restricted using allow lists (access only specified clients) or deny lists (access all except specified clients)
  • Login schedules enable time-based access restrictions, such as limiting user access to business hours only

Security Group Configuration

This tutorial demonstrates how to establish permission-based access control in Hudu through security groups. The video walks through creating groups based on organizational roles (such as tiered technician levels or departments), configuring company access using allow lists or deny lists, and setting login schedules to restrict access to specific time windows. Groups serve as the foundation for controlling what users can view, edit, and delete within the documentation platform, with a default group automatically assigned to new users who haven't been placed in a specific group.

User Roles and Permissions

Hudu offers six distinct user role levels ranging from portal members (free end-user accounts) through spectators, authors, editors, admins, and super admins. Each role carries different capabilities for reading, editing, and administering documentation. Beyond role-based permissions, administrators can apply granular restrictions at both the group level and individual item level, blocking access to specific passwords, knowledge base articles, custom asset layouts, or entire client spaces. The platform provides visibility into who has access to any given item through a quick access review feature.

Chapters

0:00 - Introduction to User Management
0:54 - Creating Security Groups
2:24 - Configuring Group Permissions
4:05 - Setting Login Schedules
5:22 - Item-Level Permissions
6:12 - Adding Users and Roles

Key Quotes

0:34 "A very important aspect of documentation is what you may allow or not allow certain internal users to view, edit, and delete within your documentation."
1:32 "Hoodoo starts with a default group that has the most restrictions. This ensures that if a user isn't added to a group, they won't have access to anything they shouldn't."
5:28 "Nearly everything stored within Hoodoo comes equipped with more options, allowing the ability to restrict individual items from security groups."
7:56 "There are countless permissions that can be set in Hoodoo, and utilizing groups to your advantage can make life a whole lot easier when managing your documentation and securing your instance."

Categories:
  • » Cybersecurity » Identity & Access Management (IAM)
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Identity & Access
  • How-To
  • Getting Started
  • Technical Deep Dive
  • User Management
  • Access Control
  • Security Groups
  • Permission Configuration
  • Role-Based Access
  • Documentation Security
  • IT Documentation
  • User Onboarding
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: User & Group Management in Hudu Documentation Platform

              Upcoming Webinar Calendar

              • 05/20/2026
                10:00 PM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Stages
                https://www.truthinit.com/index.php/channel/1953/establishing-a-robust-ai-governance-framework-for-genai-throughout-deployment-stages/
              • 05/21/2026
                11:00 AM
                05/21/2026
                Risk in Real Time Demo Series: The Autonomous Era - Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/risk-in-real-time-demo-series-the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                10:00 AM
                05/27/2026
                Adopting AI: From Illusion to Intentional Control
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transitioning-from-illusion-to-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                Harnessing AI for Smaller Teams: Strategies for Secure Implementation
                https://www.truthinit.com/index.php/channel/1951/harnessing-ai-for-smaller-teams-strategies-for-secure-implementation/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Delving into Recent Findings and 2026's Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-delving-into-recent-findings-and-2026s-threat-landscape/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: Which Issues to Address First?
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-which-issues-to-address-first/

              Upcoming Events

              • May
                20

                Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Stages

                05/20/202610:00 PM ET
                • May
                  21

                  Risk in Real Time Demo Series: The Autonomous Era - Orchestrating a Resilient Enterprise

                  05/21/202611:00 AM ET
                  • May
                    27

                    Adopting AI: From Illusion to Intentional Control

                    05/27/202610:00 AM ET
                    • May
                      28

                      Harnessing AI for Smaller Teams: Strategies for Secure Implementation

                      05/28/202601:00 PM ET
                      • Jun
                        02

                        Spring of Satori: Delving into Recent Findings and 2026's Threat Landscape

                        06/02/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version