Skip to content

User permissions and access control

Tactiv’s platform provides robust user permission controls to ensure the right people have the right level of access at every stage of the funding lifecycle. From internal teams to external assessors and program partners, user access is structured, governed and fully auditable. 

User permissions are designed to support complex program environments where multiple stakeholders interact with sensitive data. Access can be defined by role, responsibility or program involvement, ensuring users only see and interact with the information relevant to them.

Each access layer follows a controlled security framework, ensuring:

  • Users can only access the data and functions appropriate to their role

  • Sensitive information is restricted to authorised personnel

  • Actions performed by each user are recorded and traceable

  • Permissions can be managed centrally across programs and workflows

The Result:
A secure, role-based access framework that protects sensitive information, strengthens governance, and ensures every action within the platform is accountable and traceable. 

User Permissions and security
Team Management
Team Management
Team Management

Email domain integration

Streamline user access and onboarding with email domain integration. Tactiv can recognise approved organisational domains, allowing administrators to automatically associate users with their organisation and apply relevant access rules.

This simplifies account management while ensuring users from trusted organisations are granted the appropriate permissions without manual configuration.

Roles and permissions 

Define user roles that reflect how teams interact with the platform. Roles can be configured for administrators, program managers, assessors, finance teams and external stakeholders—each with clearly defined capabilities.

Role-based permissions ensure users can perform the tasks required for their responsibilities while maintaining strong control over system access and sensitive information.

Learn more about Team Management and Delegations >

Custom security permissions

Extend standard roles with highly configurable security controls. Tactiv allows organisations to tailor permissions down to specific modules, actions or data elements, supporting complex governance and compliance requirements.

Administrators can adjust permissions as programs evolve, ensuring security settings remain aligned with organisational policies and operational needs.

You’re in good company