Last updated:
Grigory Titov
Control access to software and settings
Click to expand / collapse

In the game system, it is important to clearly understand: who and what can do with the software and key settings. We offer a reliable access control module that allows you to flexibly differentiate rights, block critical functions, protect the configuration and capture all changes.

The access system works at all levels: from cashiers and operators to technical support and owners, providing only the necessary functions and eliminating the risk of accidental or deliberate changes.


What you can limit and control

Access areaControl capabilities
System settingsChange RTP, limits, machine configurations - only for admins
Users and RolesCreate, delete, lock, assign rights
Updates and downloadsInstalling updates, connecting providers, API changes
Financial transactionsAccess to shifts, cash, outputs and reports
Reports and statisticsSplit View, Export, Filter Rights

How the system works

1. Each user is assigned a role and access level

2. All sensitive actions are only available with elevated rights

3. All attempts to log in, edit and access important functions are logged

4. Administrator can change rights or temporarily block access at any time

5. Two-factor authentication and IP/device restrictions


Advantages for the hall

Protection against accidental or unauthorized changes

Clear rights structure - every employee sees only what they need

Increase process visibility and manageability

Simplify audit and incident investigation

Scalable: access by room, shift, role, region


Where especially important

Distributed management networks with multiple levels of employees

Halls with high volume of cash and administrative operations

Objects with increased data and configuration security requirements

Companies with multiple software technicians


Access control is the basis of the security and stable operation of the hall. You determine who has access to what, and at any time you can control or change everything. Settings are protected, business is under control.

Popular topics


Main topics