Role-Based Access Control
Define granular permissions with built-in roles or create custom ones for least-privilege access across dashboards, hosts, packages, users, reporting, settings, and notifications. Security-sensitive actions are logged for audit purposes.
- Built-in roles for common patterns plus fully custom roles
- Fine-grained control over hosts, packages, users, reporting, and settings
- Separate controls for elevated operations where needed
- Activity audit trail for security-relevant actions
