Users

Two-factor authentication

Two-factor authentication is an additional security step that’s designed to help strengthen your account and prevent others from accessing your account, even if your password becomes compromised. Two-factor authentication requires you to verify your identity not only with your e-mail address and password, but also by generating a so-called one-time password, which is only valid for a short amount …

Two-factor authentication Read More »

Add a user group

User groups make it possible to organize users within a company. This will result in more clarity, but more importantly makes it easier to configure access to your devices. Instead of granting individual users access to a specific device, you can grant an entire user group access (more details in our Access & permissions-article). The following steps will show …

Add a user group Read More »

Invite a new user

You can have an unlimited amount of users in your company. To invite a new user you only need their e-mail address. If they already have a Lenze account, they’ll receive a company invite by e-mail. If they don’t yet have a Lenze account, the invite will automatically direct to a registration page first, before being added to your …

Invite a new user Read More »

Change your profile settings

You can change your profile information and settings on the X4 remote by going to the account menu and pressing [My profile]. The following details can be changed: Name: at “My info”. Job position: at “My info”. Language: at “My localization”. Localization: at “My localization”. Timezone: at “My localization”. E-mail address: at “Login and security” > [Change e-mail …

Change your profile settings Read More »

Access & permissions

You decide what users can do by specifying which permissions these users have and what devices they have access to. This is important to maintain a clear, secure, and shielded environment when having users from different departments or parties in your company. This article shows every possibility to specify access to devices and user permissions, so you can choose the best …

Access & permissions Read More »