User Permissions
Role-based access and configurable permissions that protect sensitive data while enabling secure collaboration across your funding programs.
User permissions and access control
Tactiv’s platform provides robust user permission controls to ensure the right people have the right level of access at every stage of the funding lifecycle. From internal teams to external assessors and program partners, user access is structured, governed and fully auditable.
User permissions are designed to support complex program environments where multiple stakeholders interact with sensitive data. Access can be defined by role, responsibility or program involvement, ensuring users only see and interact with the information relevant to them.
Each access layer follows a controlled security framework, ensuring:
-
Users can only access the data and functions appropriate to their role
-
Sensitive information is restricted to authorised personnel
-
Actions performed by each user are recorded and traceable
-
Permissions can be managed centrally across programs and workflows
The Result:
A secure, role-based access framework that protects sensitive information, strengthens governance, and ensures every action within the platform is accountable and traceable.
Email domain integration
Streamline user access and onboarding with email domain integration. Tactiv can recognise approved organisational domains, allowing administrators to automatically associate users with their organisation and apply relevant access rules.
This simplifies account management while ensuring users from trusted organisations are granted the appropriate permissions without manual configuration.
Roles and permissions
Define user roles that reflect how teams interact with the platform. Roles can be configured for administrators, program managers, assessors, finance teams and external stakeholders—each with clearly defined capabilities.
Role-based permissions ensure users can perform the tasks required for their responsibilities while maintaining strong control over system access and sensitive information.
Learn more about Team Management and Delegations >
Custom security permissions
Extend standard roles with highly configurable security controls. Tactiv allows organisations to tailor permissions down to specific modules, actions or data elements, supporting complex governance and compliance requirements.
Administrators can adjust permissions as programs evolve, ensuring security settings remain aligned with organisational policies and operational needs.
You’re in good company