Administration Overview
The Administration module provides centralized control over SPEAR’s configuration, user management, security settings, and system operations. Access requires appropriate administrative permissions.
Module Capabilities
Section titled “Module Capabilities”| Area | Description |
|---|---|
| Users & Access | User accounts, groups, and role-based permissions |
| Authentication | OAuth/SSO providers and authentication settings |
| Branding | Logos, colors, and visual customization |
| Services | SMTP, storage, and external service configuration |
| Integrations | Third-party service connections (AI, APIs) |
| System | Backups, maintenance, and system health |
| Security | Audit logs, session management, and security policies |
| Module Settings | Per-module configuration options |
Access Requirements
Section titled “Access Requirements”Administration requires elevated permissions:
| Permission Level | Access |
|---|---|
| Super Admin (0) | Full administrative access |
| Admin (1) | Administrative access except system-critical operations |
| Manager (2+) | No administrative access |
Navigation
Section titled “Navigation”Access the Administration module from the main navigation sidebar under Admin or directly at /console/admin/.
Admin Dashboard with Quick Actions Screenshot
Quick Actions
Section titled “Quick Actions”- Create User: Add new user accounts
- Manage Groups: Configure group permissions
- System Backup: Trigger manual backup
- View Audit Log: Review security events
Administrative Workflow
Section titled “Administrative Workflow”From the Admin Dashboard, you can:
User Management:
- Create new user accounts
- Assign users to groups
- Manage role-based permissions
System Configuration:
- Configure SMTP and storage services
- Set up integrations (AI, APIs, etc.)
- Manage backups and system health
Security:
- Review audit logs
- Manage active sessions
- Configure authentication providers
Branding:
- Upload company logos
- Set brand colors
- Configure PDF and portal themes
Best Practices
Section titled “Best Practices”See the Best Practices guide for:
- User provisioning workflows
- Security hardening recommendations
- Backup and recovery procedures
- Monitoring and alerting setup
Related Documentation
Section titled “Related Documentation”- Deployment Guide - Initial setup and configuration
- Environment Variables - System configuration options
- Security - HTTPS and SSL setup