If a Member with a Primary Owner, Security Admin or Workspace Admin account type leaves your organization, there are specific, mandatory actions you need to perform in Pigment, including reassigning the Primary Owner account type to another Member.
Change the Primary Owner
Before leaving, the Primary Owner needs to switch ownership of their account type to another Member. The new Primary Owner is the only Member who can transfer this account type back.
To switch:
- Click the menu (…) next to the new Primary Owner’s name.
- Select Set as Primary Owner.
A new Primary Owner is assigned, and the original Primary Owner’s account type is updated to Security Admin.
What happens if your Primary Owner has left without switching Primary Ownership? When this occurs, you need to log a ticket with Pigment Support.
Change ownership of API keys
If an outgoing administrator is the owner of an API key, then the best security practice is to generate new API keys. Additionally, ensure that any old API keys are revoked.
Change ownership of scheduled imports
Import schedules rely on active accounts within a Workspace. If the Member who scheduled an import is deactivated from a Pigment Workspace, you must update the ownership of scheduled imports to prevent import failures.
To change ownership of scheduled imports, open Import scheduling. Whichever Member edits the schedule configuration becomes the owner of the schedule configuration. Also ensure that any recipient of import notifications is updated on the change of ownership.
Change ownership of Applications
It’s likely that your administrator is the owner of Applications in your Workspace. Security Admins can change an Application's owner from the Workspace home page.
To do this:
- Open the Workspace homepage.
- Click the menu (…) on the required Application, and then Change owner.
- From the menu, select a new Primary Owner, and click Change.
Members with Define Application Security permission can also update the owner within the Application itself. For more information, see Application permissions. .