Articles tagged security
Auditing roles periodically
Roles drift. Once a quarter, walk through the role catalog with fresh eyes — what to look for, what to clean up, and the questions that surface real problems.
Giving a tech limited access
Field techs need just enough access to do their work — and not access to pricing, customer payment data, or other techs' jobs. Here's the right permission set, the device considerations, and the safety practices.
The permission catalog
A tour of the major permissions in Suprata: what each one actually controls, the ones people commonly mis-grant, and how to think about them when building roles.