Alarm.com 101: Understanding the Difference Between a “User” and a “User Login” — and How to Create Each

When it comes to managing your Alarm.com security system, two terms often cause confusion: Users and User Logins. While they sound similar, they serve very different purposes — and knowing the difference is key to keeping your property secure while giving the right people the right access.

🔍 User vs. User Login — What’s the Difference?

Feature User User Login
Pupose Grants control of the alarm system when on-site. Grants access/control to your alarm system via the website or mobile app.
Where It’s Used Physically at the security panel/lock On the Alarm.com website or app
When It’s Used Arming/disarming the system, unlocking doors Remotely viewing cameras, controlling devices, and managing settings.
Identification Unique 4–6 digit code. Unique username/email and password.
Typical Use Case Employees, family members, or contractors who need to physically interact with the system. Managers, homeowners, or trusted users who need remote control and/or monitoring capabilities.
Security Tip Each person should have their own code so you can track who accessed the system and when. Limit logins to those who truly need remote access, and use strong passwords with two‑factor authentication.

Think of it this way:

  • User = “Who can walk up to the panel and use it?”

  • User Login = “Who can log into the Alarm.com app or website?”


How to…

🛠 Create a User in Alarm.com

  1. Log in to your Alarm.com account (web or app).

  2. Navigate to the Users section.

  3. Click Add User.

  4. Enter the person’s first and last name and click Create.

  5. Assign a unique Access Code (4-6 digits) and specific Device Access permissions — for example, whether they can arm/disarm security panels/partitions or unlock doors using their Access Code.

  6. Save your changes.

  7. (Optional) Assign the user’s Access Period for the devices:

    • At All Times (default) provides 24/7 access.

    • Restricted Schedule limits user access to a recurring weekly schedule. Recommended for contractors, such as cleaners or staff, who should not have 24/7 access.

    • Temporary Access provides continuous access between specified dates. Recommended for temporary guests or contractors who may need access outside of a standard schedule.

  8. (Optional) Add user Contact Information.

  9. Test the new code at the panel to ensure it works.

Pro Tip: If you want this person also to receive system notifications (like “Front Door Unlocked” or “System Disarmed”), you can enable them as a notification recipient in the same menu.

🌐 Create a Secondary User Login in Alarm.com

  1. Log in to your Alarm.com account via the website. (You cannot manage User Logins within the app)

  2. Go to the Users tab.

  3. Click Manage Logins at the top of the page.

  4. Select Add a Login.

  5. Enter the person’s email address and choose a Login Name.

    • Pro Tip: The Login Name must be unique for each property, so you may get an error message that the Login Name is already in use if they already have an Alarm.com account.

  6. SaveAlarm.com will send them an email invitation.

  7. Assign their Login Permissions:

    1. Master Control has all of the permissions of the primary account login, including the ability to update the primary email and phone number for the account and the ability to manage other user logins.

    2. Full Control has access to most website and app functionality, but does not have access to manage user logins.

    3. Read-only can see most pages and settings, but cannot make any changes.

    4. Limited Device Access can only control and observe the specified devices.

  8. Save your changes.

  9. Have them follow the link in the email to set their password.

Pro Tips:

  • If the invite email doesn’t arrive, check spam/junk folders. If it is still missing, delete the login and re-create it.

  • Only grant Master Control permissions to trusted individuals who will assist you in managing the system and other user logins.


🔐 Best Practices for Security

  • Separate Codes & Logins: Never share your own code or login — create unique ones for each person.

  • Review Regularly: Remove codes and logins for people who no longer need access.

  • Use Two‑Factor Authentication: Adds an extra layer of protection for logins.

  • Audit Activity: Use Alarm.com’s history logs to see who accessed the system and when.


The Bottom Line

In Alarm.com, Users control physical access, while User Logins control digital access. By understanding and managing both, you can keep your home or business secure, organized, and compliant with best practices.

Next
Next

Troubleshooting the ADC Video Doorbell with AI Analytics (ADC-VDB770)