Role-Based Access Control with 20+ predefined roles, JWT RS256 token authentication, device-level session management, and fine-grained permission wildcards across all business contexts.
Every action in the system is guarded by a permission check. Roles bundle sets of permissions; users inherit all permissions of their assigned role.
Assign one or multiple roles per user. Roles can be scoped to a specific department or branch.
Wildcard syntax: resource:action:scope. Supports * for any resource, action, or scope.
Each login creates a device-bound session. Admins can view and revoke active sessions per user.
Short-lived access tokens (JWT RS256) with refresh rotation. Configurable TTL per role.
Three-part syntax gives precise, composable control. A user gets the union of all their roles' permissions β no conflicts, no inheritance gaps.
resource β any entity or * for all contextsaction β read, create, update, delete, approve, exportβ¦ or *scope β own, department, all, or * for global accessAll roles are ready to use out of the box. Custom roles can be composed from existing permission sets.
Full system access β all resources, all actions, all scopes. Unrestricted.
Cross-departmental view and approval rights. Cannot modify system configuration.
Full access to finance contexts: invoicing, accounting, cash flow. No warehouse or production access.
Warehouse operations: stock movements, lot management, picking, receiving. Read-only on orders.
Full CRM and sales cycle access: leads, orders, quotes, contracts. Own records only by default.
Read-only access across all non-sensitive contexts. Suitable for observers, auditors, and executives.
Authentication is built on JWT RS256 with asymmetric key signing. Every authenticated device maintains an independent, traceable session that can be remotely revoked at any time.
Asymmetric signing β private key signs, public key verifies. Access token TTL is role-configurable. Refresh tokens are rotated on every use.
Each authenticated device gets an independent session entry. Administrators can view session metadata (IP, agent, last active) and revoke any session remotely.