M1

Foundations (Security, Users, Locations)

The base layer of the JEB Asset Tracking & Management Platform, providing secure multi-tenant authentication, granular user and role management, and a hierarchical location model. Every action in the platform depends on this module for identity, permissions, and spatial context — from knowing who did what, to knowing exactly where every asset sits.

Process Steps

🔐
01

Authenticate

Users log in via SSO or email/password with MFA. The system resolves their tenant, roles, and permissions.

👥
02

Provision Users & Roles

Administrators create users, assign RBAC roles, and configure permission sets per module.

🏢
03

Define Locations

Set up the hierarchical location tree — sites, buildings, floors, areas, and zones — with optional floorplan attachments.

⚙️
04

Configure Platform

Establish condition scoring scales, asset status lists, product categories, and tenant-level settings.

System Flow

Loading diagram...

Key Features

🏢

Multi-Tenant Isolation

Each client operates in a fully isolated data space with row-level security ensuring zero cross-tenant visibility.

🔒

Role-Based Access Control

Granular RBAC with configurable roles and permissions — from platform admin to read-only viewer — applied per module.

📍

Location Hierarchy

Flexible tree structure from site down to individual zone, with optional floorplan overlays for spatial context.

📜

Full Audit Trail

Every authentication event, permission change, and configuration update is immutably logged with user, timestamp, and context.

Application Screens

1

Login & SSO

Branded login page with SSO provider selection, email/password fallback, and MFA prompt

2

User Management Console

Admin view for creating, editing, and deactivating users with role assignment and invitation workflow

3

Location Tree Editor

Hierarchical tree view to create and manage sites, buildings, floors, and zones with floorplan upload

4

Platform Settings

Configuration panel for condition scoring scales, status lists, product categories, and notification preferences

5

Audit Log Viewer

Searchable, filterable log of all authentication events, permission changes, and system configuration actions

Benefits

  • Secure, isolated environments for every client with enterprise-grade authentication
  • Fine-grained access control ensures users only see and do what their role permits
  • Standardised location hierarchy provides consistent spatial context across all modules
  • Complete audit trail satisfies compliance requirements and supports incident investigation