Administration Overview
The Administration module provides centralized control over SPEAR’s configuration, user management, security settings, and system operations. Access requires appropriate administrative permissions.
Module Capabilities
Section titled “Module Capabilities”| Area | Description |
|---|---|
| Users & Access | User accounts, groups, and role-based permissions |
| Authentication | OAuth/SSO providers and authentication settings |
| Branding | Logos, colors, and visual customization |
| Services | SMTP, storage, and external service configuration |
| Integrations | Third-party service connections (AI, APIs) |
| System | Backups, maintenance, and system health |
| Security | Audit logs, session management, and security policies |
| Module Settings | Per-module configuration options |
Access Requirements
Section titled “Access Requirements”Administration requires elevated permissions:
| Permission Level | Access |
|---|---|
| Super Admin (0) | Full administrative access |
| Admin (1) | Administrative access except system-critical operations |
| Manager (2+) | No administrative access |
Navigation
Section titled “Navigation”Access the Administration module from the main navigation sidebar under Admin or directly at /console/admin/.
Admin Dashboard with Quick Actions Screenshot
Quick Actions
Section titled “Quick Actions”- Create User: Add new user accounts
- Manage Groups: Configure group permissions
- System Backup: Trigger manual backup
- View Audit Log: Review security events
Administrative Workflow
Section titled “Administrative Workflow”flowchart TD
A[Admin Dashboard] --> B{Task Type}
B --> C[User Management]
C --> C1[Create Users]
C --> C2[Assign Groups]
C --> C3[Manage Permissions]
B --> D[System Config]
D --> D1[Configure Services]
D --> D2[Set Up Integrations]
D --> D3[Manage Backups]
B --> E[Security]
E --> E1[Review Audit Logs]
E --> E2[Manage Sessions]
E --> E3[Configure Auth]
B --> F[Branding]
F --> F1[Upload Logos]
F --> F2[Set Colors]
F --> F3[Configure Themes]
Best Practices
Section titled “Best Practices”See the Best Practices guide for:
- User provisioning workflows
- Security hardening recommendations
- Backup and recovery procedures
- Monitoring and alerting setup
Related Documentation
Section titled “Related Documentation”- Deployment Guide - Initial setup and configuration
- Environment Variables - System configuration options
- Security - HTTPS and SSL setup