Control
Audit logs
Operator actions, overrides, assignment changes, booking state changes, and support interventions are recorded against user, time, and scope.
Security architecture · auditability · controlled access
Core controls
Security is visible in how access is segmented, how support is constrained, and how every operational action can be traced after the fact.
Control
Operator actions, overrides, assignment changes, booking state changes, and support interventions are recorded against user, time, and scope.
Control
Platform, support, dealer admin, sales, and marketing roles do not share the same visibility or control surface.
Control
Store and group boundaries are enforced before application logic is applied, reducing the chance of cross-tenant leakage.
Control
Temporary support access is constrained, audited, and attributable so diagnostics never become invisible privilege.
Role isolation
Platform roles, support roles, and dealer roles operate inside different permission boundaries. That is how support remains accountable and store data remains segmented.
| Role | Access scope | Restriction |
|---|---|---|
| Platform owner | Governance rules, audit review, rollout control, cross-network diagnostics. | No client-side secret exposure. |
| Platform support | Scoped diagnostics, dealer setup, operational support, support-mode access. | No billing control, all support actions logged. |
| Dealer admin | Store users, local policies, reporting, and workflow oversight. | No cross-dealer access. |
| Dealer sales / BDC | Inbox, queue, message actions, bookings, assigned execution flows. | No governance rule changes. |
Support mode tracking
Support access is not treated as invisible privilege. The system records when support enters, what scope is touched, and how that activity relates to later audit review.
Security contact
Security questions, architecture reviews, and incident coordination are handled through the AUTORA team with auditable process and scoped access control.
security@autoraos.company