Controlled access

How scoped access and admin control work.

This page goes deeper on invite-only access, role scope, lifecycle changes, and audit history for teams reviewing how governed operations scale beyond the first site.

Invite-only baseline

Roles and permission boundaries stay deliberate from the start

The access model is invite-first, role-based, and scoped to the org, site, and device level so broader rollout stays intentional and governed.

Invite users into known roles with clear operating boundaries.
Assign only the site and device visibility each role actually needs.
Track account, scope, and role changes as auditable admin events.
Diagram of Edgentik multi-user access model from admin roles through site scope and audit.

Admin roles, scoped views, and audit stay tied together inside one access model.

Mockup of user access panel for invite, role assignment, deactivation, and audit history.

Invite, assign, disable, and audit account changes in one admin view.

Scoped visibility

Limit who can see what across org, site, and device scope

Access control defines which role can see which site, which device set, and which actions belong to that role as more teams and facilities come online.

Scope visibility by org, site, and device with clear operating boundaries.
Change role or scope without breaking the audit trail behind those decisions.
Use one admin view for invite, assignment, deactivation, and audit history.
User lifecycle

Manage access changes without losing context

A usable admin baseline should support the full lifecycle: invite, activate, change role, deactivate, reactivate, reset access, and keep the reason trail intact.

Invite and activateAdd named users intentionally with clear role assignment.
Change role or scopeAdjust permissions without losing who changed what and why.
Disable and recoverRemove or restore access while preserving the audit context.
Diagram showing Edgentik admin lifecycle from invite through access recovery and audit.

Invite-only access with lifecycle changes and audited account controls.

Access summary

Roles, lifecycle, and audit

Invite-only access, permission boundaries, lifecycle controls, and the audit trail around access changes.