Help Center

Permissions & Security

Control who can access what with a robust, multi-tenant aware permission model and strong security.

Overview

TrakSun uses role-based access control (RBAC) with organization scoping to ensure the right people have the right access. Every action is validated against the user's role, organization, and resource ownership. Sensitive operations are protected by additional checks.

The system is built with least-privilege principles, detailed audit logging, and proper isolation between organizations in a multi-tenant architecture.

Permission Model

RBAC Core

  • Actions mapped to permissions
  • Permissions grouped into roles
  • Roles assigned to users

Resource Scoping

  • Organization boundary enforcement
  • Project-level permissions
  • Row-level checks for sensitive data

Roles

System Roles

  • Super Admin
  • Organization Admin
  • Project Manager
  • Field Executive
  • Viewer

Custom Roles

  • Per-organization role definitions
  • Permission templates
  • Granular permission toggles

Scoping & Isolation

Organization Isolation

All data access is scoped to the user's organization ID to prevent cross-tenant leakage.

Project Boundaries

Project-level permissions ensure users only access specific projects they are assigned to.

Resource Ownership

Sensitive resources enforce owner checks in addition to role permissions.

Security Controls

Authentication

  • Email/Password & Phone OTP
  • 2FA support
  • Session management & timeouts

Authorization

  • Role-based checks
  • Organization scoping
  • Policy enforcement at API layer

Best Practices

Least Privilege

Assign the minimum permissions required for each role.

Regular Reviews

Audit roles, permissions, and access logs on a regular schedule.

Separation of Duties

Distribute critical permissions to avoid single points of failure.

Last updated on November 17, 2025