Admin Dashboard Overview
Accessing Admin Dashboard
Section titled “Accessing Admin Dashboard”The admin dashboard runs on a separate port (default 3001):
http://localhost:3001Login with an admin account.
Creating Administrators
Section titled “Creating Administrators”Create During First Deployment
Section titled “Create During First Deployment”Auto-create via environment variables:
CREATE_ADMIN=trueADMIN_USERNAME=adminADMIN_PASSWORD=YourSecurePassword123!ADMIN_ROLE=super_adminManual Creation
Section titled “Manual Creation”Use the command line tool:
# Auto-generate passworddocker exec -it glean-backend /app/scripts/create-admin-docker.sh
# Specify username and passworddocker exec -it glean-backend /app/scripts/create-admin-docker.sh myusername MyPass123!Admin Roles
Section titled “Admin Roles”| Role | Permissions |
|---|---|
super_admin | Super administrator, all permissions |
admin | Operations administrator, user and content management |
readonly | Read-only administrator, view only |
Main Features
Section titled “Main Features”Dashboard
Section titled “Dashboard”Overview of key metrics:
- Total users
- Active users (DAU/MAU)
- Total feeds
- Total articles
- System health status
User Management
Section titled “User Management”Manage platform users:
- View user list
- Search and filter users
- View user details
- Disable/enable user accounts
System Configuration
Section titled “System Configuration”Configure system parameters:
- Registration toggle
- Default settings
- System parameter adjustments
Security Measures
Section titled “Security Measures”Independent Authentication
Section titled “Independent Authentication”The admin dashboard uses an independent authentication system, completely isolated from user authentication.
Operation Auditing
Section titled “Operation Auditing”All admin operations are logged, including:
- Operation time
- Operating administrator
- Operation type
- Operation details
Session Management
Section titled “Session Management”Admin session timeout defaults to 2 hours, shorter than regular users.
Best Practices
Section titled “Best Practices”Security Recommendations
Section titled “Security Recommendations”- Strong Passwords: Use complex passwords
- Regular Rotation: Regularly change admin passwords
- Least Privilege: Assign admin roles based on need
- Monitor Logs: Regularly check audit logs
Operational Recommendations
Section titled “Operational Recommendations”- Confirm reasons before disabling users
- Sensitive operations require secondary confirmation
- Regularly backup system configuration
Next Steps
Section titled “Next Steps”- User Management - Detailed user management guide
- System Settings - System configuration documentation