In the game system, it is important to clearly understand: who and what can do with the software and key settings. We offer a reliable access control module that allows you to flexibly differentiate rights, block critical functions, protect the configuration and capture all changes.
The access system works at all levels: from cashiers and operators to technical support and owners, providing only the necessary functions and eliminating the risk of accidental or deliberate changes.
What you can limit and control
| Access area | Control capabilities |
|---|---|
| System settings | Change RTP, limits, machine configurations - only for admins |
| Users and Roles | Create, delete, lock, assign rights |
| Updates and downloads | Installing updates, connecting providers, API changes |
| Financial transactions | Access to shifts, cash, outputs and reports |
| Reports and statistics | Split View, Export, Filter Rights |
How the system works
1. Each user is assigned a role and access level
2. All sensitive actions are only available with elevated rights
3. All attempts to log in, edit and access important functions are logged
4. Administrator can change rights or temporarily block access at any time
5. Two-factor authentication and IP/device restrictions
Advantages for the hall
Protection against accidental or unauthorized changes
Clear rights structure - every employee sees only what they need
Increase process visibility and manageability
Simplify audit and incident investigation
Scalable: access by room, shift, role, region
Where especially important
Distributed management networks with multiple levels of employees
Halls with high volume of cash and administrative operations
Objects with increased data and configuration security requirements
Companies with multiple software technicians
Access control is the basis of the security and stable operation of the hall. You determine who has access to what, and at any time you can control or change everything. Settings are protected, business is under control.