Event Management Overview
This section explains how events are created and managed in Conducky, including the workflow for System Admins and Event Admins. Events are the core organizational unit in Conducky, providing isolated environments for incident management.
Event Management Workflow
Conducky supports flexible event creation through multiple pathways depending on organizational structure:
Organization-Based Events
- Organization Admin creates event within their organization
- Event inherits organization context and admin automatically gets event admin role
- Event Admin configures detailed settings (contact info, dates, CoC, etc.)
- Event becomes active once fully configured
- Event Admin manages ongoing operations (users, reports, settings)
Direct System Admin Creation
- System Admin creates minimal event with basic information (name, slug, description)
- Event is created as inactive (
isActive: false
) until fully configured - System Admin assigns Event Admin role to designated event organizer
- Event Admin completes setup and activates the event
This workflow ensures proper separation of concerns and supports both organizational hierarchies and direct system administration.
Event Data Model
Each event has a unique id
, name
, and slug
that are used throughout the system:
- Events are isolated: Users can only access data from events where they have roles
- Events have roles: Users are assigned specific roles (Reporter, Responder, Admin) per event
- Events track activity: All incidents, audit logs, and invitations are scoped to events
- Events have settings: Each event can be configured independently
See the Event Structure page for detailed technical information.
Key Event Management Areas
This guide is organized into focused sections:
- Creating Events - How to create and set up new events
- Event Structure - Understanding event data and relationships
- Event Configuration - Managing event settings and metadata
- Role Management - Understanding event permissions and roles
- Event Administration - Advanced management features
Who Can Manage Events
System Admins
- Create events globally for any organization
- Generate admin invites for event organizers
- Monitor system-wide event activity
- Manage event status (active/disabled)
System Admins do not automatically have access to event data. They must be explicitly added to events by Event Admins to view or manage incident reports.
Event Admins
- Complete event setup and configuration
- Manage team members and send invitations
- Configure event settings including code of conduct
- Monitor event activity and incident reports
- Handle ongoing operations for their events
Organization Admins
- Create events within their organization
- Automatically receive Event Admin role for created events
- Manage organization-scoped event settings
Event Lifecycle
Events go through several phases:
- Creation - Basic event information is set up
- Configuration - Event details, settings, and team are configured
- Activation - Event becomes live and accessible to users
- Operation - Ongoing incident management and team coordination
- Archival - Event is completed but data is preserved
Getting Started
For System Admins
- Review the Creating Events guide for event creation
- Understand Role Management for proper permission assignment
- Learn about Event Administration for ongoing management
For Event Admins
- Start with Event Configuration to set up your event
- Review Role Management to understand team permissions
- Check Event Administration for ongoing operations
For New Users
- Understand Event Structure to learn how events work
- Review Role Management to understand your permissions
- See the main User Guide for general usage information
Security and Isolation
Events provide strong isolation between different organizations and conferences:
- Data isolation: Event data is strictly scoped and cannot be accessed across events
- Role-based access: Users only see features and data appropriate to their role
- Audit logging: All event management actions are tracked for security
- Secure invitations: Invite links use secure tokens with expiration and usage limits
This ensures that each event operates independently while maintaining system security.