Skip to content

Mideye Users – Manage Authentication User Accounts

The Mideye Users page is the primary user management interface for all authentication accounts in MideyeServer. It supports two user types: Database Users (managed locally with stored passwords) and Directory Users (sourced from LDAP or Entra ID directories). Each user is configured with an authentication type, role, phone number, and optionally assigned hardware or software tokens for multi-factor authentication.

The page includes server-side pagination, filtering by username/phone/token, and role-based editing restrictions that enforce a strict hierarchy — administrators can only manage users with roles below their own level.

Required Role: ROOT, SUPER_ADMIN, or ADMIN (to create, edit, delete, or change passwords)

Navigation: Home → Users & Tokens → Mideye Users

RoleLevelCan Manage
ROOT100All users; can lock root user
SUPER_ADMIN90ADMIN, OPERATOR, USER, PROVIDED
ADMIN80OPERATOR, USER, PROVIDED
OPERATOR70Cannot manage other users
USER60Cannot manage other users
PROVIDED50Directory-user default; cannot manage other users

Users can always edit their own account if they are SUPER_ADMIN or ADMIN.

Server-side pagination with sort. Default sort: username ascending. Page sizes: 10, 15, 20, 50, 100.

ColumnDescriptionHidden by Default
UsernameLogin name (always visible, not hideable)No
User TypeDATABASE_USER or DIRECTORY_USERYes
RoleAssigned role (translated label)Yes
Phone NumberMSISDN for OTP deliveryNo
Token NumberHardware token serial numberYes
Auth TypeAuthentication methodYes
Last LoginMost recent authentication timestampYes
LockedLock status icon (Lock/LockOpen)No
TokensSoftware token icon + hardware token badge countNo
ActionEdit, Delete, Change Password (conditional)No

A popover filter with three search modes:

FilterIconDescription
UsernameAccountFilter users by username (default)
Phone NumberPhoneFilter by MSISDN
Token NumberSecurityFilter by hardware token serial
ActionVisibilityDescription
EditWhen current user can manage targetOpen the multi-tab edit form
DeleteWhen target is not ROOTDelete the user account
Change PasswordDatabase users onlyOpen the password change dialog
Lock Root UserROOT users only, by ROOT onlyLock the root user account

Use the Actions Menu (top-right) which offers:

  • Add New Database User — locally managed with password
  • Add New LDAP User — directory-sourced user

The form is organized into tabs. The Tokens and RADIUS Attributes tabs are only visible when editing an existing user.

FieldTypeRequiredValidationDefaultDescription
UsernameTextYesUnique (async check)Login name
RoleSelectYesCannot exceed current user’s roleROLE_USERAccess level
Auth TypeSelectYesTOUCH_MOBILEAuthentication method
PasswordPasswordYes (create only)Validated against password policyOnly shown on create
Password ConfirmationPasswordYes (create only)Must match passwordOnly shown on create
Phone NumberTextConditionalFormat: + followed by 3–14 digitsRequired when auth type needs MSISDN
Token NumberTextConditionalRequired for TOKEN auth type
Message TypeSelectNoINBOX_SMSOTP delivery: FLASH_SMS or INBOX_SMS
Expiration DateDateNoNoneAccount expiration date
LockedCheckboxNoOffManually lock the account
Don’t Write Successful LoginsCheckboxNoOffExclude successful auths from auth log
Password ResetCheckboxNoOn (new)Force password reset on next login
Ignore Inactivity TimeoutCheckboxNoOffExempt from inactivity auto-lock
RADIUS ClientsMulti-selectNoAllRestrict user to specific RADIUS clients
Shared Account NumbersMulti-tagWhen SHARED_ACCOUNTMin: 1 entryPhone/token numbers for shared accounts

Same fields as Database User with these differences:

DifferenceDetail
UsernameDisabled when editing
Password fieldsNot shown
Password ResetNot shown
Default RoleROLE_PROVIDED
Default Auth TypeDIRECTORY_DEFINED
Auth TypeDescriptionRequires PhoneRequires Token
PASSWORDPassword only (single factor)NoNo
MOBILESMS OTP to mobile phoneYesOptional
TOKENHardware token OTPNoYes
CONCATPassword + OTP concatenatedNoOptional
PLUSMideye Plus app signingYesOptional
TOUCHMobile app approvalYesOptional
TOUCH_PLUSTouch with Plus fallbackYesOptional
TOUCH_MOBILETouch with SMS fallbackYesOptional
ASSISTED_LOGINApprover-based authenticationNoNo
SHARED_ACCOUNTMultiple phone/token numbersNoNo
ON_PREMOn-premises OATH tokenNoNo
MAGIC_LINKEmail magic linkYesOptional
PASSWORD_RESETPassword reset flowYesOptional
DIRECTORY_DEFINEDAuth type from directory (directory users only)YesOptional

Available roles in the dropdown depend on the current user’s role level:

Your RoleAvailable Roles to Assign
ROOTSUPER_ADMIN, ADMIN, OPERATOR, USER
SUPER_ADMINADMIN, OPERATOR, USER
ADMINOPERATOR, USER

For directory users, PROVIDED is always appended.

Manage software and hardware tokens assigned to the user.

Each user can have one registered authenticator app.

StateAvailable Actions
No authenticator registeredRegister Authenticator — displays QR code for scanning, requires OTP verification
Authenticator registeredVerify OTP — test the token; Unregister — remove the authenticator

A data grid lists all hardware tokens assigned to the user.

ColumnDescription
Serial NumberToken hardware identifier
StateVALID, REVOKED_TOKEN_LOST, REVOKED_TOKEN_BROKEN, or REVOKED_TOKEN_OTHER
Token TypeTOTP or HOTP
Software TokenWhether it’s a software token (hidden by default)
ManufacturerToken manufacturer (hidden by default)
ActionOperations menu: Verify OTP, Change Status, Unassign

Assign Hardware Token: Click the Assign button to search and select from unassigned tokens via autocomplete.

Configure per-user Vendor-Specific Attributes returned in RADIUS Access-Accept responses.

ColumnDescription
RADIUS AttributeAttribute name from the vendor dictionary
ValueThe attribute value
ActionEdit and Delete buttons

Add/Edit Dialog Fields:

FieldTypeRequiredDescription
RADIUS VendorSelectNoStandard (RFC 2865) or vendor-specific
RADIUS AttributeSelectYesFiltered by vendor, only configurable attributes
ValueTextYesAttribute value

Available for database users from the list page action column.

FieldTypeRequiredValidationDescription
New PasswordPasswordYesValidated against password policy
Confirm PasswordPasswordYesMust match
Password ResetCheckboxNoDefault: OnForce password reset on next login

Available only when the current user is ROOT and the target is the root user.

Displays a warning about the consequences of locking the root account and how to revert it.

  1. Click ActionsAdd New Database User.
  2. Enter a unique username.
  3. Select the appropriate role and authentication type.
  4. Set the password (must meet the configured password policy).
  5. Enter the phone number if the auth type requires it.
  6. Click Save.
  1. Click ActionsAdd New LDAP User.
  2. Enter the exact username as it appears in the directory.
  3. Change the role from PROVIDED to the desired level (e.g., OPERATOR).
  4. Adjust the auth type if needed (defaults to DIRECTORY_DEFINED).
  5. Click Save.
  1. Edit the user.
  2. Go to the Tokens tab.
  3. Click Assign in the Hardware Tokens section.
  4. Search for the token by serial number.
  5. Select the token and confirm.
  1. Edit the user.
  2. Go to the RADIUS Attributes tab.
  3. Click Add New.
  4. Select the vendor and attribute.
  5. Enter the attribute value.
  6. Save.
IssuePossible CauseResolution
Cannot create user — username takenUsername already existsChoose a different username
Password rejectedDoes not meet password policyCheck requirements on User Settings
Cannot assign higher roleRole hierarchy restrictionYou can only assign roles below your own level
Cannot delete root userROOT users cannot be deletedLock the root user instead
Auth type dropdown limitedAir-gapped mode activeOnly PASSWORD and ON_PREM available without internet
Token tab not visibleUser not yet savedSave the user first; Tokens tab appears in edit mode