Empower Your Team, Control Access
Invite team members, assign roles, and manage permissions from one secure dashboard. Collaborate safely with granular access control.
User
Limited access for basic tasks
Editor
Modify content, manage bookings
Admin
Full access to everything
Invite unlimited team members via email
Assign roles with precise permission control
Track all user activity with audit logs
Enterprise-grade security with 2FA
3 Roles
Access Levels
2FA
Security
Instant
Invites
Team Members
John Doe
Sarah Miller
Mike Thompson
Enterprise Security
2FA • Audit Logs • Role-Based Access Control
Invite Team Member
User
Limited
Editor
Selected
Admin
Full access
Email Sent!
Invitation link valid for 7 days. They can accept anytime.
Add Team Members in Seconds
Invite colleagues via email with one-click invitations. They receive a secure link, accept the invitation, and start collaborating immediately—no complex setup required.
Simple Process:
Email Invitations
Enter email, select role, send—done in 10 seconds
Secure Acceptance Link
Unique token-based URL, valid for 7 days
Unlimited Team Members
No limits on how many people you can invite
Resend or Revoke Anytime
Resend expired invites or cancel pending ones
What They Receive:
1. Professional Email
"You've been invited to join [Business Name]"
2. Secure Link
Click to accept and create account
3. Instant Access
Login and start working with assigned role
Bulk Invitations
Adding multiple team members? Upload a CSV with emails and roles, send 50 invitations at once. Perfect for onboarding entire teams or departments.
Three Roles, Perfect Control
Assign the right level of access with three clearly-defined roles. From view-only users to full administrators, control exactly what each team member can do.
Role Types:
User
Limited Access
View-only access for front-desk staff or assistants who need to check bookings but shouldn't modify business settings.
View appointments
View client list
Modify bookings
Access settings
Editor
Operational Access
Manage day-to-day operations. Create/edit bookings, manage clients and services, but can't change critical business settings or invite users.
Create/edit appointments
Manage clients
Manage services
Invite users
Change billing
Admin
Full Access
Complete control over everything. Manage users, modify settings, handle billing, access all features. Reserved for business owners and managers.
Everything Editors can do
Invite/remove users
Change business settings
Manage billing
View audit logs
When to Use Each Role:
• User: Receptionist checking today's schedule
• Editor: Service provider managing their bookings
• Admin: Business owner with full control
Permission Matrix
Granular Control
Each role has precisely defined permissions—no surprises, no ambiguity.
User Management
8
Active
2
Pending
3
Inactive
John Doe
Sarah Miller
Mike Thompson
Lisa Jones
Centralized Team Control
See all team members at a glance. Edit roles, deactivate users, resend invitations—manage your entire team from one powerful dashboard.
Management Tools:
Edit Roles On-The-Fly
Change someone's role instantly—takes 2 clicks
Activate/Deactivate Users
Temporarily disable access without deleting accounts
Filter & Search
Find users by role, status, location, or name
Remove Team Members
Permanently remove users and revoke all access
User States:
Active: Active: Full access with assigned role
Pending: Pending: Invited, waiting for acceptance
Inactive: Inactive: Temporarily disabled, can be reactivated
Removed: Removed: Permanently deleted, all access revoked
No Spreadsheets Needed
Forget tracking team members in Excel. Every user, every status, every role visible in one clean interface. Changes take effect instantly across the entire system.
Know Who Did What, When
Track all user activity with comprehensive audit logs. See who made changes, when they did it, and what they modified—perfect for accountability and compliance.
What Gets Tracked:
All User Actions
Logins, logouts, bookings created/modified/deleted
Setting Changes
Business settings, user roles, permissions modified
Data Modifications
Client info changes, service updates, pricing edits
Export for Compliance
Download logs for HIPAA, SOC 2, legal requirements
Real-World Uses:
Mistake Investigation
Appointment deleted by accident? See who did it and restore.
Security Monitoring
Unusual login from new location? Audit logs show the alert.
Compliance Audits
Medical/legal practice? Export logs for regulatory compliance.
Performance Review
See team member activity for performance evaluations.
90-Day Retention
Logs stored for 90 days automatically. For longer retention (365 days, indefinite), enable extended storage. Export anytime for your own records.
Activity Log
Sarah Miller
2 min ago
Created appointment for client "John Smith"
Dec 30, 2025 at 2:45 PM
John Doe
15 min ago
Updated user role for "Mike Thompson" from User to Editor
Dec 30, 2025 at 2:30 PM
Sarah Miller
1 hour ago
Modified business hours for "Downtown Location"
Dec 30, 2025 at 1:45 PM
John Doe
3 hours ago
Invited new user "Lisa Jones" with Editor role
Dec 30, 2025 at 11:45 AM
Mike Thompson
Yesterday
Deleted appointment #4523 for "Jane Doe"
Dec 29, 2025 at 4:15 PM
Showing last 5 events • Filter by user, action type, or date range
Security Settings
Two-Factor Authentication
Add extra security layer
Require authentication code from mobile app or SMS
Password Requirements
Enforce strong passwords
Session Timeout
Auto-logout after inactivity
Failed Login Limit
Prevent brute force attacks
IP Restrictions
Allow only specific IPs (optional)
Disabled • Enterprise feature for restricting access by location
Enterprise-Grade Protection
Protect your business data with bank-level security. Two-factor authentication, password policies, session controls—configure security exactly how you need it.
Security Layers:
Two-Factor Authentication
SMS or app-based codes for login verification
Password Policies
Enforce minimum length, complexity requirements
Session Management
Auto-logout after inactivity, prevent session hijacking
Brute Force Protection
Lock accounts after failed login attempts
Compliance Ready:
HIPAA-compliant for medical practices
SOC 2 Type II security standards
GDPR data protection requirements
ISO 27001 information security
Balance Security & Usability
Choose the right level for your business. Small teams can start with basic password requirements. Medical/legal practices can enable full 2FA, IP restrictions, and aggressive session timeouts.
Collaborate Securely Today
Invite your team, assign roles with precision, and manage access from one secure dashboard. Enterprise-grade security meets simple team collaboration.