Skip to main content
Platform Access Control
Updated over 3 months ago

Introduction

Our platform integrates personal control and transparency, resonating with the ethos of Web 3.0. We ensure every user has clear access to their data and the tools essential to them, advocating for both personal agency and transparency.

How Platform Access Control Works

  1. Entities: Any data point or item within our platform is classified as an 'entity' – from user profiles to documents and settings.

  2. Actions: Actions define the operations a user can execute on an entity, from viewing to controlling its entire lifecycle.

  3. Roles: Roles are ascribed to users, dictating their permissions and defining their capabilities on the platform.

  4. Granular Permissions: These provide an additional layer of specificity, allowing further customization of what a user can or cannot do. This ensures that businesses and individual consumers alike can fine-tune their access controls.

Permission Hierarchy

Our permissions are tiered for precise and effective control:

  • Control: This top-tier permission gives users comprehensive authority over an entity, including determining other user access levels. It's akin to having ultimate oversight.

  • Manage: Users can modify settings, configurations, and even adjust permissions. However, they cannot alter the user designated as 'Control'.

  • Edit: Users can make modifications to an entity's content or properties but cannot tweak core settings or permissions.

  • Read: At this basic level, users can view the entity, ensuring data accessibility without any modification rights.

Assigning and Modifying Roles

To maximize platform security:

  1. Initial Assignment: During user onboarding, evaluate their functions and responsibilities to determine the appropriate role and permissions.

  2. Periodic Review: As user needs or roles evolve, so should their platform permissions. It's essential to conduct regular checks to align permissions with current needs.

  3. Special Cases: For specific short-term requirements, such as audits, temporarily upgrade permissions. Ensure they're reverted post-completion.

Conclusion

Our robust access control safeguards platform integrity for both businesses and individual consumers. By mastering the permission hierarchy and maintaining vigilant oversight of roles, we provide a secure and efficient environment. For further inquiries or assistance, our support team is available.

Did this answer your question?