All Marketplace     
Plattform

Dashboard-Berechtigungen

Role-based access control for your OASIS HUB dashboard — give each team member exactly the access they need, nothing more.

Das Problem

Warum gibt es diese Erweiterung?

Not everyone on your team needs access to everything. Your finance team needs billing data but not charger configuration. Your operations team needs charger management but not driver personal data. Without role-based access control, you either give everyone full access (a security risk) or manually manage access (a maintenance nightmare).

Die Lösung

Was Sie erhalten

  • Role-based access control: create custom roles with exactly the permissions you need
  • Pre-built roles: Admin, Operations, Finance, Support, Read-Only — ready to use out of the box
  • Object-level permissions: control access per location, per charger group, or per tenant
  • Action-level permissions: view, create, edit, delete — granular control over every action
  • Audit log: full log of every action taken by every user — who did what, when
  • Multi-tenant isolation: users in one tenant cannot see data from another tenant
  • API key management: create API keys with specific permission scopes for integrations
🎯 Who is this for?

Any CPO or eMSP with multiple team members, operators in regulated industries requiring access control, and businesses preparing for security audits.

Diese Erweiterung aktivierenGesamten Marketplace ansehen
🔌 Modular by design

Pro Mandant aktivieren oder deaktivieren. Zahlen Sie nur, was Sie nutzen. Alle Erweiterungen integrieren sich nahtlos.

Hauptfunktionen

Alles inklusive

Rollenbasierter Zugriff

Create custom roles with exactly the permissions you need. Pre-built roles (Admin, Operations, Finance, Support) ready to use out of the box.

Objektebenen-Berechtigungen

Control access per location, per charger group, or per tenant. A regional manager sees only their region.

Aktionsebenen-Berechtigungen

View, create, edit, delete — granular control over every action. Finance can view invoices but not edit them.

Audit-Protokoll

Full log of every action taken by every user: who did what, when, and from which IP address. Essential for compliance and security.

API-Schlüsselverwaltung

Create API keys with specific permission scopes for integrations. A third-party integration gets only the access it needs.

Multi-Mandanten-Isolation

Users in one tenant cannot see data from another tenant. Complete data isolation for multi-tenant deployments.

Praxisbeispiele

In Aktion sehen

Wie Betreiber weltweit diese Erweiterung nutzen, um echte Probleme zu lösen und ihr Geschäft auszubauen.

Finanzteam erhält nur Abrechnungszugriff
A CPO finance team needs access to invoices, settlements, and revenue reports — but not charger configuration or driver personal data. The Admin creates a Finance role with exactly these permissions. Finance team members log in and see only what they need.
Regionalmanager sieht nur seine Region
A CPO with operations in 3 countries creates regional manager roles: each manager sees only their country locations, chargers, and drivers. The national manager sees everything. Data is automatically filtered by region.
Audit-Protokoll enthüllt unbefugten Zugriffsversuch
The audit log shows that a support agent accessed driver payment data — outside their role permissions. The admin investigates, finds the agent was trying to help a driver but used the wrong tool, and adds a note to their training record. The audit log prevents security incidents from going unnoticed.
Fallstudie

Enterprise-CPO besteht Sicherheitsaudit mit Dashboard-Berechtigungen und Audit-Protokoll

A large CPO managing 500 chargers across 3 countries was preparing for an ISO 27001 security audit. The auditor required evidence of role-based access control and audit logging. After enabling Dashboard Permissions, the CPO created 8 custom roles with granular permissions and enabled the audit log. The security audit passed with zero findings related to access control.

8
Benutzerdefinierte Rollen erstellt
0
Sicherheitsaudit-Ergebnisse
100%
ISO-27001-Konformität
Vollständiger Audit-Trail
Jede Aktion protokolliert

Sichern Sie Ihre Plattform mit rollenbasierter Zugriffskontrolle.

Sprechen Sie mit unserem Team und sehen Sie diese Erweiterung in Aktion mit einer persönlichen Demo.