Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Contact Us
Home Implementation & Management Managing Users & Access
In this category
Managing Deployments Managing Users & Access Using The Beacon Dashboard Monitoring Performance Operations Troubleshooting Exporting & Using Data
Related
Managing Deployments Using The Beacon Dashboard Monitoring Performance Operations Troubleshooting Exporting & Using Data

Managing Users & Access

Control user access and permissions to maintain security and operational control.

Updated March 29th, 2026

Overview

Managing user access ensures that the right people can use Begini while maintaining security and control.

Access should be limited based on role, responsibility and operational need.


Why access control matters

Proper access management helps to:

  • Protect sensitive data
  • Prevent unauthorised changes
  • Maintain system integrity
  • Support audit and compliance requirements

Types of access

Within the Beacon Dashboard, access is typically role-based.

Common access levels include:

Admin access

  • Full control over the platform
  • Can manage integrations, deployments and users
  • Can view all data and configurations

Operational access

  • Can view results and monitor activity
  • Can manage deployments and generate links
  • Cannot access sensitive system configurations

Read-only access

  • Can view results and dashboards
  • Cannot make changes

Adding users

To add a new user:

  1. Navigate to user management in Beacon
  2. Add the user’s details
  3. Assign the appropriate role
  4. Grant access

Ensure that access is aligned with the user’s responsibilities.


Managing permissions

You should regularly review:

  • Who has access
  • What level of access they have
  • Whether access is still required

Permissions should be updated as roles change.


Removing access

Access should be removed when:

  • A user leaves the organisation
  • A role changes
  • Access is no longer required

This reduces risk and maintains control.


Best practices

  • Follow the principle of least privilege
  • Only grant access that is necessary
  • Regularly audit user access
  • Use clear role definitions
  • Limit the number of admin users

Common mistakes

  • Granting admin access too broadly
  • Not removing access when users leave
  • Sharing accounts between users
  • Not reviewing permissions regularly

Relationship to other components

Access control supports:

  • Security Overview
  • Managing Deployments
  • Monitoring Performance

Next steps

To complete the section:

  • Operations Troubleshooting

Was this article helpful?

Yes No
Give feedback
Begini Logo_white

SaaS technology that provide character-based credit scores for Banks, Micro Finance, Digital Lenders, Neo Banks, BNPL and Asset Financing.

About

  • About Us
  • Contact Us
  • Privacy Policy

Solutions

  • Device Data
  • Psychometrics

Resources

  • Support
  • Blog
Linkedin Twitter Medium Youtube

© All rights reserved

GPDR compliant white
Expand