Skip to main content
Set up your organization structure to ensure proper access control and efficient device management across your teams.

What you’ll accomplish

  • Add team members and assign appropriate roles
  • Set up company entities and departments
  • Configure organization preferences
  • Understand permissions and access control

Adding Team Members and Roles

User Roles Overview

June provides several built-in roles to match your organization’s needs:
  • Organization Admin: Full access to all features and settings
  • IT Manager: Device management, reporting, and user administration
  • IT Technician: Device actions and basic management tasks
  • Department Manager: View and manage devices for their department
  • End User: View assigned devices and submit requests

Adding Team Members

1

Navigate to User Management

Go to Administration > User Management from the main navigation.
2

Invite New Users

Click “Add User” and enter the user’s email address and basic information.
3

Assign Roles

Select the appropriate role based on their responsibilities and access needs.
4

Set Department Assignment

Assign users to their respective departments for proper access control.
5

Send Invitation

The user will receive an email invitation with setup instructions.

Setting Up Company Entities

Department Structure

Organize your devices and users by department for better management:
1

Access Organization Settings

Navigate to Administration > Organization Settings.
2

Create Departments

Add departments that match your company structure (e.g., Engineering, Sales, HR, Finance).
3

Set Department Managers

Assign department managers who can oversee devices and users in their area.
4

Configure Department Policies

Set specific policies for each department, such as refresh schedules and security requirements.

Location Management

If your organization has multiple locations:
  • Add office locations and their details
  • Configure location-specific policies
  • Set up location managers
  • Enable location-based reporting

Configuring Organization Preferences

General Settings

  • Company name and logo
  • Primary contact information
  • Time zone and regional settings
  • Fiscal year settings for financial reporting
  • Default device naming conventions
  • Automatic device assignment rules
  • Device health monitoring preferences
  • Compliance policy defaults
  • Organization-wide notification settings
  • Escalation procedures
  • Communication channels
  • Emergency contact procedures

Understanding Permissions and Access Control

Permission Levels

June uses a hierarchical permission system:
Permission LevelAccess Rights
GlobalAccess to all organizational data and settings
DepartmentAccess limited to assigned department(s)
Device-specificAccess to specific devices only
Read-onlyView-only access with no modification rights

Role-Based Access Control (RBAC)

1

Review Default Roles

Examine the built-in roles and their permissions to understand the access structure.
2

Create Custom Roles

If needed, create custom roles that match your organization’s specific requirements.
3

Assign Granular Permissions

Fine-tune permissions for specific features like device actions, reporting, or user management.
4

Test Access Levels

Verify that users have appropriate access by testing with different role assignments.

Best Practices for Access Control

Security Guidelines

  • Follow the principle of least privilege
  • Regularly review and audit user permissions
  • Use department-based access for most users
  • Limit global admin access to essential personnel
  • Implement approval workflows for sensitive actions

Integration with Identity Providers

If your organization uses an identity provider:

Next Steps

Once your organization is set up:
  1. Connect Integrations: Link your MDM and identity provider systems
  2. Import Device Data: Sync your existing device inventory
  3. Configure Policies: Set up refresh policies and compliance rules
  4. Train Team Members: Ensure everyone knows how to use their assigned features
Changes to organization structure and permissions may take a few minutes to propagate across all systems.
I