User governance

If you’re a Super Admin, or an IAM Admin, account governance offers a lens into user trends within your Kissflow account, shedding light on how users interact with various roles. It enables you to track and identify the most active flow creators, enriching your understanding of user engagement. This insight is crucial for effective user governance, aiding in the streamlined management of your account's workflows.

Selecting any user will take you to a detailed page where you can learn about the user’s account status, last signed-in, added-on, and added details. Also, you can learn more about that particular user from the following sections

Flows created

From this section, you can learn about a user’s contribution to the development trend of your account by analyzing the number of flows they have created. This information will help you understand the extent of their involvement within your account.


In the Flows section, you can view the flows (processes, boards, and apps) a particular user can access. This helps ensure the user is granted access only to authorized flows, aligning with proper permissions and security measures.


To ensure that a user is accessing authorized groups, it is essential to review the groups they are a part of. This section helps you maintain proper access controls and ensures that sensitive information or resources within specific groups are accessed only by authorized individuals. 


In the Datasets section, the datasets a particular user can access are listed along with their roles. This can help you maintain data security in your dataset and prevent unauthorized access or misuse of sensitive information.


You can view the lists that can be accessed by a particular user, along with the roles they’re in. Based on this, you can verify their permissions and ensure they are restricted to authorized lists.


You can see the list of integrations from the Integrations section that a particular user can access. Correspondingly, the statuses of those integrations and the connectors used by them are also displayed. This will help ensure that the user is only accessing authorized integrations and prevent potential data exposure.


In this section, you can view all the connections used by a specific user in Kissflow, allowing you to clearly understand their involvement with external and internal systems. You can also identify the users exposing sensitive data outside your account through external connectors of your account’s integrations. This makes identifying potential risks or issues easier and proactively mitigating them.

Authentication keys

You can view a comprehensive list of all the access and API keys created by a specific user in your account. These keys are used for authentication purposes, and by reviewing the list, you can gain visibility into when they were last accessed when they will expire, and which keys are currently active. This information can help you manage your account’s security and ensure only authorized users can access your resources.

Active sessions

Under this section, you can view a specific user's active login sessions, their last sign-in time, and the internet protocol (IP) address from which they logged in. Based on this, you can learn about any unauthorized or suspicious login sessions.

Download, print, and export logs

Identifying any instances where sensitive data may be shared outside the Kissflow platform and taking necessary actions to prevent it is important.

You can analyze and track all download, print, and export instances of flow data (attachments, forms, and reports, respectively) by a user in the last 30 days to gain visibility into the potential exposure of sensitive data.

Audit log

Gain visibility and obtain valuable insights by utilizing the audit log, which provides a comprehensive record of all activities a particular user performs across the account. The audit log allows for a detailed analysis of the actions taken, offering valuable information and the ability to track and understand the user's interactions within the account.