User Management

Empower Your Team, Control Access

Invite team members, assign roles, and manage permissions from one secure dashboard. Collaborate safely with granular access control.

User

Limited access for basic tasks

Editor

Modify content, manage bookings

Admin

Full access to everything

Invite unlimited team members via email

Assign roles with precise permission control

Track all user activity with audit logs

Enterprise-grade security with 2FA

3 Roles

Access Levels

2FA

Security

Instant

Invites

Secure collaboration for teams of all sizes

Team Members

Admin
SM

Sarah Miller

[email protected]

Editor
MT

Mike Thompson

[email protected]

User

Enterprise Security

2FA • Audit Logs • Role-Based Access Control

Secure
Easy Setup

Invite Team Member

User

Limited

Editor

Selected

Admin

Full access

Email Sent!

Invitation link valid for 7 days. They can accept anytime.

Instant
Secure Link

Add Team Members in Seconds

Invite colleagues via email with one-click invitations. They receive a secure link, accept the invitation, and start collaborating immediately—no complex setup required.

Simple Process:

Email Invitations

Enter email, select role, send—done in 10 seconds

Secure Acceptance Link

Unique token-based URL, valid for 7 days

Unlimited Team Members

No limits on how many people you can invite

Resend or Revoke Anytime

Resend expired invites or cancel pending ones

What They Receive:

1. Professional Email

"You've been invited to join [Business Name]"

2. Secure Link

Click to accept and create account

3. Instant Access

Login and start working with assigned role

Bulk Invitations

Adding multiple team members? Upload a CSV with emails and roles, send 50 invitations at once. Perfect for onboarding entire teams or departments.

Three Roles, Perfect Control

Assign the right level of access with three clearly-defined roles. From view-only users to full administrators, control exactly what each team member can do.

Role Types:

User

Limited Access

View-only access for front-desk staff or assistants who need to check bookings but shouldn't modify business settings.

View appointments

View client list

Modify bookings

Access settings

Editor

Operational Access

Manage day-to-day operations. Create/edit bookings, manage clients and services, but can't change critical business settings or invite users.

Create/edit appointments

Manage clients

Manage services

Invite users

Change billing

Admin

Full Access

Complete control over everything. Manage users, modify settings, handle billing, access all features. Reserved for business owners and managers.

Everything Editors can do

Invite/remove users

Change business settings

Manage billing

View audit logs

When to Use Each Role:

User: Receptionist checking today's schedule

Editor: Service provider managing their bookings

Admin: Business owner with full control

Permission Matrix

Permission
User
Editor
Admin
View bookings
Create bookings
Edit bookings
Delete bookings
Manage clients
Manage services
View reports
Invite users
Change settings
Manage billing
View audit logs

Granular Control

Each role has precisely defined permissions—no surprises, no ambiguity.

Clear Rules
3 Roles

User Management

8

Active

2

Pending

3

Inactive

Admin
Active
SM

Sarah Miller

[email protected]

Editor
Active
MT

Mike Thompson

[email protected]

User
Pending
LJ
Inactive
Live Updates
Quick Actions

Centralized Team Control

See all team members at a glance. Edit roles, deactivate users, resend invitations—manage your entire team from one powerful dashboard.

Management Tools:

Edit Roles On-The-Fly

Change someone's role instantly—takes 2 clicks

Activate/Deactivate Users

Temporarily disable access without deleting accounts

Filter & Search

Find users by role, status, location, or name

Remove Team Members

Permanently remove users and revoke all access

User States:

Active: Active: Full access with assigned role

Pending: Pending: Invited, waiting for acceptance

Inactive: Inactive: Temporarily disabled, can be reactivated

Removed: Removed: Permanently deleted, all access revoked

No Spreadsheets Needed

Forget tracking team members in Excel. Every user, every status, every role visible in one clean interface. Changes take effect instantly across the entire system.

Know Who Did What, When

Track all user activity with comprehensive audit logs. See who made changes, when they did it, and what they modified—perfect for accountability and compliance.

What Gets Tracked:

All User Actions

Logins, logouts, bookings created/modified/deleted

Setting Changes

Business settings, user roles, permissions modified

Data Modifications

Client info changes, service updates, pricing edits

Export for Compliance

Download logs for HIPAA, SOC 2, legal requirements

Real-World Uses:

Mistake Investigation

Appointment deleted by accident? See who did it and restore.

Security Monitoring

Unusual login from new location? Audit logs show the alert.

Compliance Audits

Medical/legal practice? Export logs for regulatory compliance.

Performance Review

See team member activity for performance evaluations.

90-Day Retention

Logs stored for 90 days automatically. For longer retention (365 days, indefinite), enable extended storage. Export anytime for your own records.

Activity Log

SM

Sarah Miller

2 min ago

Created appointment for client "John Smith"

Booking Created

Dec 30, 2025 at 2:45 PM

JD

John Doe

15 min ago

Updated user role for "Mike Thompson" from User to Editor

Role Changed

Dec 30, 2025 at 2:30 PM

SM

Sarah Miller

1 hour ago

Modified business hours for "Downtown Location"

Settings Changed

Dec 30, 2025 at 1:45 PM

JD

John Doe

3 hours ago

Invited new user "Lisa Jones" with Editor role

User Invited

Dec 30, 2025 at 11:45 AM

MT

Mike Thompson

Yesterday

Deleted appointment #4523 for "Jane Doe"

Booking Deleted

Dec 29, 2025 at 4:15 PM

Showing last 5 events • Filter by user, action type, or date range

Complete History
Exportable

Security Settings

Two-Factor Authentication

Add extra security layer

Require authentication code from mobile app or SMS

Password Requirements

Enforce strong passwords

Minimum length8 characters
Require numbers
Require special characters

Session Timeout

Auto-logout after inactivity

Failed Login Limit

Prevent brute force attacks

Lock account after5 failed attempts

IP Restrictions

Allow only specific IPs (optional)

Disabled • Enterprise feature for restricting access by location

Protected
Enterprise Grade

Enterprise-Grade Protection

Protect your business data with bank-level security. Two-factor authentication, password policies, session controls—configure security exactly how you need it.

Security Layers:

Two-Factor Authentication

SMS or app-based codes for login verification

Password Policies

Enforce minimum length, complexity requirements

Session Management

Auto-logout after inactivity, prevent session hijacking

Brute Force Protection

Lock accounts after failed login attempts

Compliance Ready:

HIPAA-compliant for medical practices

SOC 2 Type II security standards

GDPR data protection requirements

ISO 27001 information security

Balance Security & Usability

Choose the right level for your business. Small teams can start with basic password requirements. Medical/legal practices can enable full 2FA, IP restrictions, and aggressive session timeouts.

Collaborate Securely Today

Invite your team, assign roles with precision, and manage access from one secure dashboard. Enterprise-grade security meets simple team collaboration.

No credit card required until subscription