Skip to main content
< All Topics

Permissions – builder, container

The concept of Permissions in Axonator, specifically for Builder and Container access, is a crucial aspect of application management and data security. This feature allows administrators to control user access at the application level, ensuring that only authorized personnel can interact with specific components of the Axonator platform.

Key Aspects of the Permissions Concept:

  1. Application-Level Control: Permissions are configurable at the application level, allowing for granular control over user access within each specific app created in Axonator.
  2. Builder Access: Administrators can determine which users have access to the Builder component. This controls who can modify the application structure, forms, and workflows.
  3. Container Access: Permissions can be set to regulate who can access the Container, which typically includes viewing data, records, and web dashboards associated with the application.
  4. User-Specific Configuration: The system allows for user-specific permission settings, enabling administrators to tailor access based on individual roles and responsibilities within the organization.
  5. Data Visibility Control: By configuring Container permissions, administrators can manage which users can view collected data, records, and web dashboards, ensuring data visibility aligns with organizational policies.
  6. Separation of Duties: This permission system supports the principle of separation of duties, allowing organizations to distinguish between users who can build and modify applications (Builder access) and those who can view and analyze data (Container access).
  7. Security Enhancement: By restricting access to Builder and Container components, the permission system enhances overall application security, reducing the risk of unauthorized changes or data breaches.

The Permissions concept for Builder and Container access in Axonator provides a flexible and robust method for managing user rights within the platform. It enables organizations to implement proper access controls, ensuring that users have the appropriate level of access to perform their duties while maintaining data security and application integrity.

Table of Contents