LogoLogo
  • Welcome to Cyphor
  • .NET Code Obfuscation
    • Getting Started
    • How to Obfuscate
    • Basic Code Obfuscation
      • Symbol Renaming
      • Body Mutation
      • Control Flow
      • Constant Encryption
      • Call Hiding
      • Debug Protection
      • Integrity Checks
      • Self Healing
    • Advanced Obfuscation
      • Attribute-Based Obfuscation
      • Guide to obfuscation
      • Code Inlining
      • What is RASP?
      • Protections that protect each other
      • Program not working after obfuscation
      • Keeping performance with obfuscation
      • Virtualization
  • Dashboard
    • Files
    • Billing
      • Pay as you go
      • Examples
    • Projects
      • Code Guard Tasks
      • Permissions
        • Roles
      • Files
      • SAML and SSO
  • Code Guard
    • Introduction
    • Implement with your licensing system
      • Setting up a gateway
      • Setting up the SDK
    • Secured values
      • Dynamic values
      • Code Encryption
        • Page 1
    • Preventing analysis
    • Enhanced visibility
      • Disabling tracing on production
      • Logging external methods
      • Optimizing Memory Usage
    • Edge connectivity
    • Preventing modifications
      • Preventing assembly load
      • Allowing partial tampering
      • Enterprise EDRs and XDRs
      • Dynamic Hook protection
      • Thread hijacking
      • Guard Checksums
      • DLL Injection
      • Handling complex RE attacks
        • Custom payload detection
    • Granular Integrity Checks
    • Virtualized Environments
    • Troubleshooting
    • Threat database
    • Real time alerts
      • Alert Insights
  • CLI Tool
    • Introduction
    • Global options
    • Profiles
    • Projects
    • Obfuscator
      • Obfuscation Schemes
      • Task templates
      • Protecting files
        • Global obfuscation flags
        • Using templates to obfuscate files
        • Quick obfuscation
      • Monitoring obfuscation jobs
    • Securing local storage
Powered by GitBook
On this page

Was this helpful?

  1. Dashboard
  2. Projects

Permissions

Permissions and roles are an important aspect of our SaaS platform as they allow users to have granular control over who has access to certain features and tools. This ensures that only authorized users have access to sensitive information and functionality, enhancing the security and overall management of projects.

Permissions refer to the specific actions and abilities that a user is allowed to perform within a project. These can include things like managing files, accessing certain logs, or utilizing specific tools.

Roles, on the other hand, are a group of permissions that are assigned to a user or group of users. This allows users to easily manage and assign permissions to multiple users at once.

It is important to have good granular control over permissions and roles as it allows users to tailor the access of different users or groups to fit their specific needs and requirements. This ensures that only authorized users have access to sensitive information and functionality, enhancing the security and overall management of projects.

Some example roles that our SaaS platform offers are:

  • Administrator: This role has access to all features and tools within a project and is responsible for managing and assigning permissions to other users.

  • Accounting: This role has access to financial information and tools within a project, such as usage logs and billing information.

  • Engineer: This role has access to core functionality such as obfuscation, tamper protection, and security-related logs. This role is responsible for implementing and managing these tools within a project.

PreviousCode Guard TasksNextRoles

Last updated 1 year ago

Was this helpful?