Access & Identity

Identity, scope,and trust at every door.

Whether it's a person logging in, a vendor finishing a work order, or a vehicle approaching the gate, CtrlAtlas decides what's allowed in real time. One identity model. Every entry point.

SSORole-ScopedJust-in-TimeAudit-LoggedMulti-Tenant
UUSERVVENDORDDEVICESSERVICE
0
Roles
9 tier model
0%
Scope checks
Every API call
0
Auth methods
SSO, JWT, MFA, biometric
0
Cross-tenant leaks
Structurally impossible
Authentication

Four ways in. One identity.

Whatever the user picks up, the platform sees the same identity, the same role, the same scope.

SSO & SAML

Enterprise single sign-on with SAML 2.0 and OIDC. Provision once, propagate everywhere.

  • Okta, Azure AD, Google Workspace
  • SCIM auto-provisioning
  • JIT account creation
JWT sessions

Signed session tokens carry user, organization, role, and scope through every request end-to-end.

  • Short-lived access tokens
  • Rotating refresh tokens
  • Server-side revocation
Multi-factor

TOTP, WebAuthn, and passkeys for high-tier roles and sensitive mutations.

  • Passkey-first flow
  • Step-up at the action
  • Backup codes
Biometric & device

Mobile biometric unlock and device-bound trust for staff in the field.

  • Face / fingerprint
  • Device attestation
  • Lost-device wipe
Access tiers

9 tiers. Sharply scoped.

Every role lives on one of nine access tiers. The graph decides what a tier can see, what it can change, and where the boundary stops.

Creator
2 roles
Tier 1
Scope
Platform-wide
Perms
Everything
Executive
5 roles
Tier 2
Scope
Full organization
Perms
Org-wide read + write
Regional
4 roles
Tier 3
Scope
Cross-portfolio
Perms
Portfolio cluster ops
Portfolio
6 roles
Tier 4
Scope
Single portfolio
Perms
Buildings within portfolio
Building
12 roles
Tier 5
Scope
Single building
Perms
Floors, units, tenants
FPME
4 roles
Tier 6
Scope
Floor planning
Perms
Plan geometry only
Parking
3 roles
Tier 7
Scope
Parking module
Perms
Spaces & vehicles
Vendor
6 roles
Tier 8
Scope
Assigned work orders
Perms
Own jobs only
Tenant
5 roles
Tier 9
Scope
Own unit only
Perms
Personal portal
Decision flow

Every request, six checkpoints.

Nothing reaches the data layer without passing all six. The flow is uniform across web, mobile, API, and integrations.

Step 1
Identify

Resolve identity from SSO, JWT, passkey, or device attestation.

Step 2
Resolve scope

Walk the DIG to compute where the user sits on the entity hierarchy.

Step 3
Check role

Match the role tier against the action's required permission level.

Step 4
Step up if needed

Escalate to MFA or biometric for sensitive mutations.

Step 5
Allow or deny

Approve the action or refuse with a typed reason code.

Step 6
Log forever

Write the actor, scope, decision, and outcome to the immutable audit log.

Physical access

Doors, visitors, vehicles.

Identity isn't just for software. CtrlAtlas extends the same scope and audit model to every physical entry point on the property.

Door access

HID and Mercury panels integrate directly. Credentials, schedules, and audit trails sync into the graph.

Visitor flow

QR check-in, photo ID capture, host notification, and visitor passes time-boxed to the appointment.

Vehicle access

ALPR cameras tie license plates to tenants and visitors. Gate triggers fire from the same scope checks.

Anomaly response

Atlas watches access events, flags after-hours usage, repeated denials, and credentials seen in the wrong scope.

Compliance posture
SOC 2 AlignedGDPR ReadyPIPEDAISO 27001 AlignedTenant IsolatedEncrypted at RestEncrypted in Transit
Request access

Get your team onboarded.

Tell us about your portfolio and we'll set up the right tier model for your roles. SSO wiring, role mapping, and tenant configuration handled before you sign in.