User accounts enable you to provide access to and manage permissions for resources. You can use the API to perform standard CRUD operations on user objects, and also change passwords, generate API keys, impersonate users, and enable multi-factor authentication.

For background information about managing users, see Vulnerability Management User Guide.