Resolute B.I.

Web

Project: User Management

My Role

  • Lead Designer

  • UX Research

Background

Resolute Building Intelligence provides fault detection, analytics, and reporting solutions through its two applications, Synergy and Fusion. By connecting to a building’s existing BAS, Resolute BI delivers insights using rule-based analytics and reports, helping users better understand performance and identify potential issues.

However, separating the platform into two applications introduced several challenges. User management was not only split between Synergy and Fusion, but also siloed at the customer level. Each customer maintained its own set of users, with no centralized way to view or manage them across the platform. This made it difficult to locate users, understand access, and manage permissions without first knowing where a user existed.

The Goal

The goal was to create a centralized user management experience that works across the entire platform. This included giving administrators a single place to manage users while introducing a more flexible and customizable approach to roles, permissions, and access.

The Process

Investigation

To understand the problem space and define a scalable solution, the investigation was broken down into four key areas:

1.

Audit existing permissions

2.

Understand the system hierarchy

3.

Define user roles

4.

Define user-controlled settings

  1. Audit Existing Permissions

The existing permission system was fragmented across applications and customers, making it difficult to understand who had access to what.

Permissions were tightly coupled to roles, limiting flexibility and making it difficult to support different user needs.

Key Findings

  • Roles were rigid and defined too much of the user experience

  • Permissions were not easily adjustable without changing roles

  • Access varied across applications, leading to inconsistency

  • There was no centralized way to view or manage users

Synergy vs. Fusion invite workflows

Synergy vs. Fusion user management screens

Design Implications

These findings revealed that the core issue was not just fragmentation across applications, but a lack of a scalable permission model.

This led to several key design decisions:

  • Introduce flexible, atomic permission controls instead of rigid roles

  • Separate administrative capabilities from user roles

  • Define a clear access hierarchy to control visibility and scope

  • Create a centralized user management system across the platform

  • Roles should act as a starting point, not a fixed definition.

  1. Understanding the Hierarchy

While user management was the primary focus of this project, permissions could not be defined without understanding how access is structured across the platform.

In Resolute, a user’s permissions are not only determined by their role, but also by where they have access within the system.

How Hierarchy Impacts Access

Access is assigned at different levels of the system

Access is assigned at different levels of the system:

  • Organization – broad access across multiple portfolios

  • Portfolio – primary workspace for most users

  • Site – location-specific access

Each level defines both:

  • What data a user can see

  • What actions they can take

Key Findings

Permissions are scoped, not global.

A user with the same role can have completely different experiences depending on their assigned access level.

For example:

  • A Service Engineer with Portfolio access can view and manage data across multiple buildings

  • The same role with Site access is limited to a single location

This made it clear that roles alone were not enough to define access.

Access defines scope.

Portfolio access vs. Site access

Design Implications

This understanding directly influenced the permission model:

  • Introduced access scopes (Organization, Portfolio, Site)

  • Ensured permissions are always applied within a defined scope

  • Allowed users to have the same role with different levels of access

  • Made access more predictable and scalable across customers

  1. Defining User Roles

User roles were redefined to better reflect real responsibilities and how users interact with the platform.

The Problem

The existing role system varied between Synergy and Fusion and lacked flexibility.

  • Each application defined its own set of roles

  • Roles had fixed permissions that could not be adjusted

  • Users with overlapping responsibilities often didn’t fit cleanly into a single role

For example:

  • Synergy used roles like Admin and Integrator

  • Fusion introduced additional roles such as Super Admin, Portfolio Manager, Facility Manager, and Limited User

This created inconsistencies and made it difficult to standardize access across the platform.

Key Insight

Roles should provide a starting point, not define the entire user experience.

The Approach

  • Roles act as templates with default permissions

  • Permissions can be customized based on user needs

  • Administrative responsibilities are separated from roles

Permission cards illustrating how roles act as a starting point (Team Member), evolve through customization (Integrator), and can be extended with administrative responsibilities.

Role Types

  • Integrator – configures systems and manages data

  • Service Engineer – identifies and diagnoses issues

  • Facilities Manager – manages operations

  • Team Member – flexible, minimal access

  • Executive – high-level visibility

Unifying fragmented roles across Synergy and Fusion into a single, scalable system

Integrator

Description

Integrators are responsible for configuring building data, maintaining data quality, and completing system integration workflows.

Default Permissions

  • Rule Configuration

  • Custom Dashboard Configuration

Access Scope

Available at Organization and Portfolio levels only

Default Features

  • Overview

  • Custom Dashboards

  • Integrator & Configuration Features

  • Explorer

Service Engineer

Description

Focused on identifying, diagnosing, and providing solutions for issues.

Default Permissions

  • Rule Configuration

  • Custom Dashboard Configuration

Access Scope

Available at any level

Default Features

  • Overview

  • Custom Dashboards

  • Diagnostics & Reporting Features

  • Explorer

Feature Groups (Used in Role Definitions)

Dashboard & Insights

  • Overview

  • Custom Dashboards

Diagnostics & Reporting

  • Action Center

  • Analytics

  • Document Center

  • Energy Usage

  • Explorer

  • Reports

Integration & Configuration

  • Computed Points

  • Connectors

  • Equipment Tagging

  • Job Statuses

  • Plant Relationships

  • Points Audit

  • Point Mapping

  • Point Tagging

  • Reports

  • Rules

  • Site Editor

  • User Audit

Feature availability is determined by access scope. Integration and configuration features are only available at the Organization and Portfolio levels, where system setup and data structuring occur.

Design Implications

This new approach to roles enabled:

  • Greater flexibility without increasing complexity

  • Consistent behavior across the platform

  • Easier onboarding with sensible defaults

  • The ability to support edge cases without creating new roles

By decoupling roles from strict permissions, the system became more adaptable to real-world use cases.

  1. Define User-Controlled Settings

With roles, permissions, and access scopes defined, the next step was to establish what users should be able to manage on their own.

The goal was to give users control over their personal experience without exposing system-level configuration that should remain restricted to administrators.

The Problem

In the existing experience, user-related actions were fragmented and inconsistent.

  • Profile details, notifications, and settings were not centralized

  • Some actions required administrative intervention that could reasonably be self-managed

  • There was no clear distinction between what a user could control and what required elevated permissions

Additionally, users often had multiple profiles across applications.

For example, Synergy users maintained a separate profile in Fusion. When transitioning between applications, their role would also change (e.g., Admin or Integrator in Synergy becoming Super Admin in Fusion), creating confusion around identity, permissions, and responsibilities.

Key Findings

User control should be clearly separated from system controls

Users should be able to manage their own preferences and personal settings, while administrative actions remain restricted based on permissions and access scope.

The Approach

Centralized User Profile

All user-specific settings were consolidated into a single, accessible profile experience.

From the profile, users can:

  • View and update personal information (name, email, timezone)

  • Manage notification preferences

  • View their assigned access (Organization, Portfolio, Site)

Access details are read-only, providing visibility into what a user can access without allowing modifications.

This created a single, predictable location for user-specific controls while maintaining clear boundaries between user and administrative responsibilities.

Access the user profile through the avatar menu.

The profile is presented as a contextual drawer, allowing users to view and manage their information without leaving their workflow.

Clear Boundaries Between User and Admin Actions

Actions were divided into two categories:

User-controlled

  • Profile information

  • Notification preferences

  • Password management

Admin-controlled

  • Roles and permissions

  • Access scope (Organization, Portfolio, Site)

  • Feature availability

This ensures users can manage their experience without impacting system configuration.

Contextual Editing Experience

Instead of navigating away from the user management table, profile and settings are handled through a side drawer.

This allows users to:

  • View and edit details without losing context

  • Quickly switch between different settings (profile, notifications, password)

  • Maintain continuity within the workflow

The drawer adapts based on the selected task. This example shows editing user details.

Example of managing notification preferences.

Design Implications

This approach resulted in:

  • Reduced reliance on administrators for simple updates

  • A clearer mental model of control and responsibility

  • A more streamlined and accessible user experience

  • Better alignment between user expectations and system behavior

By defining clear boundaries between user and system control, the experience became more intuitive and efficient.

The Design

User Management Overview

User Management Overview

The user management experience is centered around a single, unified dashboard that provides visibility into all users within the selected scope.

Users are organized into two groups:

  • Active Members – users with current access

  • Pending Members – users who have been invited but have not yet completed onboarding or whose invites have expired

Both groups can be expanded or collapsed, allowing administrators to focus on relevant users while maintaining a clear overview.

Key Features

  • Centralized Visibility
    All users are managed from a single interface, eliminating the need to navigate across multiple systems.

  • Access Summary
    Each user includes a summarized view of their access (e.g., number of portfolios or sites), making it easy to understand scope at a glance.

  • Status Indicators
    Clear status labels (Active, Pending, Expired) provide immediate feedback

  • Scalable Interaction
    Infinite scrolling supports large user sets without sacrificing performance.

  • Unified Search
    Search spans both Active and Pending users.

Design Considerations

Splitting users into Active and Pending groups helped separate day-to-day management from onboarding workflows, reducing visual clutter and improving scan-ability.

At the same time, keeping both groups within a single dashboard maintains a centralized experience, reinforcing the goal of unified user management across the platform.

Inviting Users

The invite process was redesigned to guide administrators through assigning access, roles, and permissions in a structured flow.

Each step builds on the previous one, ensuring users are configured correctly and reducing the likelihood of errors.

The Flow

The invite process follows a step-by-step structure:

  1. Member Details

Enter basic user information such as name and email

  1. Access Assignment

Define where the user should have access (Organization, Portfolio, or Site).

  1. Permissions & Filters

Configure role-based permissions and feature access within the selected scope.

  1. Review & Confirm

Validate all selections before sending the invite.

Key Design Decisions

Guided Configuration

Breaking the process into steps reduces cognitive load and keeps the flow predictable.

Access is Defined First

Access scope is established before roles and permissions.

This ensures:

  • Only relevant roles are available

  • Permissions and features are limited to the selected scope

  • Invalid configurations are prevented

Error Prevention

The system helps prevent common issues, such as:

  • Missing access assignments

  • Duplicate or conflicting access

  • Invalid permission configurations

Errors are surfaced within the flow so they can be resolved before continuing.

Example of an error state

Flexible for Complex Access

Multiple access items can be assigned within a single invite, allowing efficient setup without repeating the process.

Design Implications

This approach resulted in:

  • A more intuitive onboarding process

  • Fewer configuration errors

  • Better support for complex access scenarios

  • A system that scales for both simple and advanced use cases

Editing & Reinviting Users

Administrators can update user details, access, and permissions directly from the user management table.

These workflows support ongoing user management beyond the initial invite.

Editing Users

Example of the Edit User panel

Users are edited through a persistent side panel that appears alongside the table.

This allows administrators to:

  • Maintain context while editing

  • Scroll and select other users

  • Make repeated updates efficiently

Reinviting Users

Example showing the Reinvite option in the actions menu

Users with pending or expired invites can be reinvited in two ways:

  • Quick Reinvite from the table

  • Edit and Reinvite after making updates

Key Design Decisions

  • Persistent editing pattern
    The split view layout keeps the table visible while editing, supporting multi-user workflows.

  • Flexible reinvite options
    Supports both quick actions and more detailed updates.

  • Clear status feedback
    User status is always visible, helping administrators understand when action is needed.

Design Implications

This approach resulted in:

  • Faster updates to user access and permissions

  • Reduced friction when managing pending or expired users

  • A consistent and predictable editing experience

  • Better support for ongoing user management beyond initial onboarding

Expected Impact

While this work was completed prior to development and release, the redesigned user management system was built to address key limitations in the existing experience and support the long-term unification of the platform.

Key Improvements

  • Centralized User Management
    Consolidates users across applications into a single interface, reducing fragmentation and improving visibility.

  • Scalable Permission Model
    Introduces a flexible system of roles, permissions, and access scope that can adapt to different user types and organizational structures.

  • Reduced Configuration Errors
    A structured invite flow ensures access, roles, and permissions are assigned in a valid and predictable way.

  • Improved Usability
    Clear separation between user-controlled settings and administrative actions simplifies the overall experience.

  • Efficient Workflows
    Persistent editing patterns and flexible reinvite options support real-world user management tasks.

Reflection

This project focused on defining a scalable foundation for user management within a unified platform.

By aligning roles, permissions, and access with how the system is structured, the experience becomes more predictable, easier to manage, and better suited for growth.

Keith Murphy

Product Designer

2026

Contact

Email: kmurphy@themurphyfiles.com

Phone: (248) 878-5538

Social

Keith Murphy

Product Designer