Our software is built from a strong foundation. At the core of every application a user can create, access, edit and delete content.
Permissions/Roles Based Access
Strong authentication combined with user/roles permissions give you complete control over what your users can and cannot do.
The following table displays how roles based permissions works. An admin is able to add users and sign a role to each user. The role’s CRUD permissions then defines what tables from the database the user can Create, Read Update and Delete from.