Role & User Management
Enterprise-grade role-based access control with granular permissions, approval workflows, and complete audit trails for compliance-ready security operations.
Role Hierarchy & Access Control
Five-tier role structure designed for security agency operations
Managing Director
Super Admin
Complete system control and oversight
- Full platform access
- User management
- Financial controls
- System configuration
- Audit logs access
General Manager
Operations Lead
Manage all operational activities
- Client management
- Guard assignment
- Schedule approval
- Performance reviews
- Reporting access
Assistant GM
Operations Support
Support daily operations management
- Shift scheduling
- Attendance tracking
- Incident management
- Guard communication
- Basic reporting
Operational GM
Field Coordinator
Coordinate field operations and sites
- Site oversight
- Guard deployment
- Incident response
- Client coordination
- Operational reports
Field Officer
Region-Limited Access
Manage assigned region or site
- Assigned sites only
- Guard check-ins
- Incident reporting
- Limited scheduling
- Site-level reports
User Lifecycle Management
Secure onboarding process with multi-level approvals
User Creation
HR or admin creates user profile with role assignment and initial permissions
Approval Process
Managing Director or designated approver reviews and activates the account
Credential Setup
User receives secure login link and sets password with 2FA enrollment
Access Granted
User gains access to assigned modules, sites, and data based on their role
Security & Permissions
Enterprise-grade security controls and compliance features
Granular Permissions
Define exactly what each role can view, edit, approve, or delete across the platform
Multi-Factor Authentication
Enforce 2FA for sensitive roles with SMS, email, or authenticator app verification
Session Management
Automatic timeout, concurrent session limits, and IP-based access restrictions
Audit Trail
Complete log of all user actions, changes, and approvals for compliance reporting
Approval Workflows
Multi-level approvals for critical actions like payroll, client changes, or guard termination
Access Reviews
Periodic access reviews and automatic alerts for inactive or expired accounts
Compliance Ready
Built-in controls for SOC 2, ISO 27001, and industry regulations. Complete audit trails, data encryption, and role segregation ensure you stay compliant and audit-ready at all times.
See Role Management in Action
Schedule a demo to see how our role-based access control protects your operations