Users
Users in Cloud Commander can have the following identity providers:
Microsoft Entra ID
After you set up your tenants, the Microsoft Entra ID users in the tenants are synchronized with Cloud Commander and you can view them on the Users page.
You can manage Microsoft Entra ID users with Cloud Commander. You can also perform tasks such as password resets, viewing risky users and authentication methods, managing Exchange Online mailboxes, Microsoft Teams, and product license assignment.
Cloud-only users and Hybrid Identity users
Microsoft Entra ID users can be cloud-only users or hybrid users that are on-premises Active Directory users synchronized with Microsoft Entra ID. In Cloud Commander, we use the following synchronization types for users:
- Cloud: Microsoft Entra ID cloud-only users.
- Cloud and On-premises: Hybrid users that are on-premises Active Directory users synchronized with Microsoft Entra ID.
Hybrid Identity users and groups are synchronized with Cloud Commander using one-way or two-way synchronization depending on the tenant configuration. When you add, edit, or remove a hybrid user or group in Cloud Commander, the action is saved back to the on-premises Active Directory.
N-able Login
N-able Login provides users with seamless access to N-able client systems and applications. With N-able Login, users can access our applications with a single set of credentials, simplifying moving between applications such as N-central, N-sight, and Cloud Commander.
In Cloud Commander, you can:
- View N-able Login users in the Users list.
- Drill down to view the N-able Login user summary, groups, and roles.
- Assign platform roles and platform user groups to N-able Login users. For instructions, see Platform groups and roles.
In Cloud Commander, you cannot manage N-able Login users. Instead, you manage them through your N-able RMM platform.
In Cloud Commander, you cannot view or perform tasks that involve Microsoft Entra ID data for N-able Login users. This means you cannot view or manage N-able Login users for the following features:
- Authentication methods
- Exchange online
- Microsoft Teams
- Product licenses
- Risky users
Related articles
Updated: Mar 05, 2025