Skip to main content
Version: 1.0.0

Administration

This guide covers user management, roles and permissions, affiliations, domains, activity logs, and billing. Most administration features require Admin or Tenant Admin access.

Settings

User Management

Inviting Users

To add a new user to your Detektix tenant:

  1. Navigate to Settings → Users
  2. Click Invite User
  3. Enter the user's email address
  4. Select a role (Tenant Admin, Admin, or Read Only)
  5. Assign the user to one or more affiliations (determines which data they can access)
  6. Send the invitation

The user will receive an email invitation. Once they sign in via SSO (Google or Microsoft), they'll have access to the platform with the assigned role and affiliation scope.

Managing Users

From the Users page, you can:

  • View all users — See everyone who has access to your tenant
  • Change roles — Upgrade or downgrade a user's permission level
  • Update affiliations — Add or remove affiliation access
  • Remove users — Revoke access entirely

Role Permissions Matrix

CapabilityTenant AdminAdminRead Only
View PhantomIDs, logs, threat actorsYesYesYes
View dashboards and analyticsYesYesYes
View incidents and campaignsYesYesYes
Create/Edit PhantomIDsYesYesNo
Generate new PhantomIDsYesYesNo
Run injectionsYesYesNo
Manage injection targets and mappingsYesYesNo
Create/Edit campaigns and incidentsYesYesNo
Manage integrationsYesYesNo
Configure threat actor profilesYesYesNo
Manage users and invitationsYesYesNo
Access all affiliationsYesNoNo
Manage domainsYesNoNo
View activity logsYesNoNo
Manage billing and tiersYesNoNo
Key Difference: Tenant Admin vs Admin

The primary difference is scope. Tenant Admins have access to all affiliations and system-level settings (domains, billing, audit logs). Admins are scoped to their assigned affiliations and cannot access tenant-wide settings.

Affiliations

Affiliations are organizational units within your tenant — departments, brands, regions, or any logical grouping that needs its own set of PhantomIDs and data isolation.

Why Affiliations Matter

  • Data isolation — Users only see PhantomIDs, logs, and threat actors within their assigned affiliations
  • Separate analytics — Dashboard charts and metrics are scoped by affiliation
  • Independent operations — Each affiliation can have its own injection targets, campaigns, and tags
  • Access control — Users are assigned to specific affiliations, limiting their data visibility

Managing Affiliations

Creating an affiliation:

  1. Navigate to Settings → Affiliations
  2. Click Create Affiliation
  3. Enter a name and description
  4. The affiliation is immediately available for assigning users and PhantomIDs

Editing affiliations:

  • Update the name or description at any time
  • Affiliations with existing PhantomIDs cannot be deleted (archive the PhantomIDs first)

Assigning users to affiliations:

  • When inviting a new user, select which affiliations they can access
  • Users can be assigned to multiple affiliations
  • Tenant Admins automatically have access to all affiliations

Best Practices

  • Create affiliations that mirror your organizational structure
  • Use descriptive names (e.g., "Germany Operations", "Partner Fraud Detection", "Casino Monitoring")
  • Keep affiliation count manageable — too many creates complexity without benefit
  • Assign users to only the affiliations they need (principle of least privilege)

Domain Management

Domains are the email domains used by your PhantomIDs. Managing domains ensures email monitoring works correctly.

Tenant Admin Only

Domain management is restricted to Tenant Admin users.

Viewing Domains

Navigate to Domains to see all registered domains with:

FieldDescription
DomainThe email domain (e.g., example.com)
StatusCurrent state: Pending, Active, Inactive, or Error
CreatedWhen the domain was registered

Domain Status

StatusDescription
PendingDomain registered, DNS configuration in progress
ActiveDomain is fully configured and receiving emails
InactiveDomain is registered but not actively receiving
ErrorDNS configuration issue — check settings

Email Domain Whitelist

The email domain whitelist prevents false positives by suppressing alerts from known, trusted email domains. For example, if your organization's own domain sends automated emails to PhantomIDs, whitelist it to avoid triggering unnecessary incidents.

Activity Logs

The activity log provides a complete audit trail of every action taken in the platform.

Tenant Admin Only

Activity logs are only accessible to Tenant Admin users.

What's Logged

Every user action is recorded:

FieldDescription
ActionWhat was done: create, update, delete
Entity TypeWhat was affected: honeypot, domain, user, injection target, etc.
Entity IDThe specific record that was modified
UserWho performed the action
TimestampWhen it happened
Page/RouteWhere in the application the action occurred
MetadataAdditional context about the change

Filtering Logs

Filter the activity log by:

  • User — Show actions by a specific team member
  • Action type — Show only creates, updates, or deletes
  • Entity type — Show only PhantomID changes, user changes, etc.
  • Date range — Focus on a specific time period

Using Activity Logs

Activity logs are valuable for:

  • Compliance — Demonstrate who did what and when for audit purposes
  • Incident investigation — Trace back changes that may have caused issues
  • User monitoring — Verify that team members are operating within their expected scope
  • Change tracking — Understand what changed and when, especially after unexpected behavior

Logs are immutable — once recorded, they cannot be edited or deleted.

Billing & Usage

Track your platform usage and manage subscription tiers.

Tenant Admin Only

Billing is only accessible to Tenant Admin users.

Usage Metrics

The billing dashboard shows:

  • Active PhantomIDs — Number of currently active (non-archived) identities
  • Phone numbers — Provisioned Twilio numbers
  • Call volume — Total calls received in the current period
  • SMS volume — Total SMS messages received
  • Email volume — Total emails captured
  • Injection jobs — Number of injection jobs executed
  • Storage — Data storage used for recordings, emails, and logs

Tier Limits

Your subscription tier determines the limits for:

  • Maximum active PhantomIDs
  • Maximum phone numbers
  • Maximum injection targets
  • Maximum users
  • Available features (some features are tier-dependent)

If you're approaching a limit, the platform will display a warning. Contact your Detektix account representative to discuss tier upgrades.

AI Templates

Navigate to AI Templates to manage prompt templates used by the injection system's browser automation:

  • View and edit AI instructions for web form filling
  • Create templates for different types of registration forms
  • Templates can be reused across multiple injection targets

Settings Overview

The Settings page is your central configuration hub. Here's a summary of what's available:

SectionDescriptionAccess
UsersInvite, manage, and remove usersAdmin+
AffiliationsCreate and manage organizational unitsAdmin+
IntegrationsConfigure external platform connectionsAdmin+
API KeysManage API access tokensAdmin+
DomainsRegister and manage email domainsTenant Admin
BillingView usage and manage subscriptionTenant Admin
Activity LogsView the audit trailTenant Admin