Back to Features
Enterprise Security

Role & User Management

Enterprise-grade role-based access control with granular permissions, approval workflows, and complete audit trails for compliance-ready security operations.

Role Hierarchy & Access Control

Five-tier role structure designed for security agency operations

1

Managing Director

Super Admin

Complete system control and oversight

Key Permissions:
  • Full platform access
  • User management
  • Financial controls
  • System configuration
  • Audit logs access
2

General Manager

Operations Lead

Manage all operational activities

Key Permissions:
  • Client management
  • Guard assignment
  • Schedule approval
  • Performance reviews
  • Reporting access
3

Assistant GM

Operations Support

Support daily operations management

Key Permissions:
  • Shift scheduling
  • Attendance tracking
  • Incident management
  • Guard communication
  • Basic reporting
4

Operational GM

Field Coordinator

Coordinate field operations and sites

Key Permissions:
  • Site oversight
  • Guard deployment
  • Incident response
  • Client coordination
  • Operational reports
5

Field Officer

Region-Limited Access

Manage assigned region or site

Key Permissions:
  • Assigned sites only
  • Guard check-ins
  • Incident reporting
  • Limited scheduling
  • Site-level reports

User Lifecycle Management

Secure onboarding process with multi-level approvals

Step 1

User Creation

HR or admin creates user profile with role assignment and initial permissions

Step 2

Approval Process

Managing Director or designated approver reviews and activates the account

Step 3

Credential Setup

User receives secure login link and sets password with 2FA enrollment

Step 4

Access Granted

User gains access to assigned modules, sites, and data based on their role

Security & Permissions

Enterprise-grade security controls and compliance features

Granular Permissions

Define exactly what each role can view, edit, approve, or delete across the platform

Multi-Factor Authentication

Enforce 2FA for sensitive roles with SMS, email, or authenticator app verification

Session Management

Automatic timeout, concurrent session limits, and IP-based access restrictions

Audit Trail

Complete log of all user actions, changes, and approvals for compliance reporting

Approval Workflows

Multi-level approvals for critical actions like payroll, client changes, or guard termination

Access Reviews

Periodic access reviews and automatic alerts for inactive or expired accounts

Compliance Ready

Built-in controls for SOC 2, ISO 27001, and industry regulations. Complete audit trails, data encryption, and role segregation ensure you stay compliant and audit-ready at all times.

See Role Management in Action

Schedule a demo to see how our role-based access control protects your operations