User Profile
  • 4 Minutes to read
  • Contributors

    User Profile


      Article Summary

      An overview of how to manage your account profile

      When managing your account profile, you'll find two main sections:

      1. My Profile: This section holds your personal details and account settings.
      2. My Activities: Here, you can view all the activities you've performed within your account.

      This article focuses on the My Profile section, which consists of the following sub-sections:

      1. My Profile: This area contains your personal details, such as your First Name, Last Name, Phone Number, Email Address, Gender, and Date of Birth along with the access to your manager's contact information.

      image.png

      2. Multi Factor: This sub-section enables users to enhance the security of their accounts by adding an extra layer of verification. Users can utilize multiple authentication factors to ensure secure access to their accounts.

      To activate the Multi factor authentication:

      • Users need enable the Multi Factor.
      • Users can select their preferred verification method from the three available options (Google Authenticator, SMS, and Email) based on their comfort and convenience. This allows them to choose the method that best suits their security needs and preferences.

      Google Authenticator:

      • If you choose Google Authenticator as your extra layer of verification, there is a process to establish it.
      NOTE

      Google Authenticator is a mobile security application based on two-factor authentication (2FA) that helps to verify user identities before granting them access to websites and services.

      • Click on the Google Authenticator link (Highlighted), as shown below, to download the app.
      • Open the Google Authenticator app and scan the QR code present in the multi factor page to connect the Google Authenticator with Quixy.
      • The Google Authenticator app will get connected with the Quixy server and generate a new verification code every 30 seconds.
      • The verification code can then be used when logging in to the Quixy platform.

      SMS & Email

      • If you choose SMS/email as your extra layer of verification.
      • A SMS or email will be sent with a verification code every time to your registered mobile number or email address to login.

      3. Password: This subsection is dedicated to managing your account's password. Here, you can change your password whenever needed or as per your requirements.

      4. Roles: This subsection offers insights into all the roles assigned to the logged-in user across various workspaces within their organization.

      5Integrations: External Integrations (App integrations) in Quixy are mainly used to establish a connection between the Quixy platform and 3rd party platform using application programming interface (APIs). Once connected, the app can request and share data freely with the other app.

      5.1. Secret Key: Secret Key plays a significant role in Quixy Integrations for both pushing and pulling data. It is the piece of information or parameter used to encrypt and decrypt messages symmetrically (uses only one key), or what we call secret-key encryption.

      • Generate Key: This feature helps you generate a key that you can use to connect external applications or programs. By generating this key and the API URL, passing it to the third party, you can establish a connection between the third party and Quixy.
      • Revoke Key: This feature helps you in case of a breach. By clicking on revoke key, you can end any established connection, ensuring security.

      5.2. Basic Authentication: Basic Authentication is a simple authentication scheme built into the HTTP protocol. It is used to authenticate users requesting access to a web server or application.

      5.3. Access Token: The access token serves as a key that allows a 3rd party or application to access and interact with Quixy's APIs on behalf of a user or application. The token has an initial validity period. After the specified number of days, the URL expires, which results in the connection expiring.

      6. Notifications: Within this subsection, logged-in users can customize their notification preferences. They can choose to enable or disable email and SMS notifications for various types of activities, which are listed below:

      6.1. Task Created: When a task is created for the logged-in user through a workflow or recurring tasks, an email and SMS notification will be sent to the user to keep them informed.

      6.2. Task Completed: When a task assigned to the logged-in user is successfully completed, an email and SMS notification will be sent to the user to provide confirmation.

      6.3. Task Completed Initiator

      6.3. Task Escalation: If a task assigned to the logged-in user is not completed within the specified time period by a team member, the user will receive an email and SMS notification to alert them about the delay.

      6.6. Task Re-assigned:  

      6.7. Task Reminder: When a task is assigned to the logged-in user, they will receive an email and SMS notification reminding them to complete the task within the specified time period.

      6.8. Role Changes: Whenever a new role is assigned to the logged-in user or there are changes or removals of existing roles, an email and SMS notification will be sent to keep the user informed about these updates. An Email & SMS notification will be sent to the logged in user, when a new role is assigned or the existing role is changed/removed.

      7. Preferences: Within this sub-section, the logged-in user can access and modify their account preferences, including settings for Time Zone, RTL (Right-to-Left language support), Calendar, and E-signature.

      NOTE
      E-Signature:
      Users can add their e-signatures to their profile using three methods:

      1. Draw Signature: Users can create their signature by drawing it directly on the platform.
      2. Upload Signature: Alternatively, users can upload an image of their signature.
      3. Text-to-Signature: Users can input text that will be automatically converted into a signature using the preferred font style.

      Once added, this e-signature can be utilized in apps through the User Detail form field whenever a user's e-signature is needed, thereby reducing the possibility of signature errors.
      19 Esignature GIF

      8. Dashboard:  This feature allows you to select the layout of your dashboard list, choosing between standard view or tabs view. In the standard view, a drop-down list of dashboards is presented, and you can select one from the list. In the tabs view, dashboards are presented as tabs, making it more convenient to switch between them with just one click.

      Standard View:

      Tabs View:





      Was this article helpful?