User Types & Access Privileges

Our cloud-hosted, multi-tenant digital twin platform for civil road management supports different user types with specific privileges and access levels.

User Type Privileges
Platform Admin (Trace Intercept)
  • Full access to all tenants, settings, and user management
  • Can create, modify, and delete tenant (survey company) accounts
  • Can configure platform-wide settings and security policies
  • Cannot access road survey data unless explicitly invited by a survey company
Survey Company Admin (e.g. XAIS)
  • Full access to all road survey data under their company's management
  • Can create, modify, and delete user accounts for their company and municipalities
  • Can assign roles within their company and manage municipal user access
  • Can upload, edit, and delete digital twins of surveyed roads
  • Can generate reports and billing records for municipalities
Survey Company Staff
  • Can upload 3D stills and videos of surveyed roads
  • Can view and interact with digital twins of roads they have surveyed
  • Can update metadata and documentation for assets
  • Cannot delete assets or manage user accounts
Municipal Admin
  • Full access to view all road survey data for their municipality
  • Can create, modify, and delete user accounts within their municipal account
  • Can assign roles within their municipality
  • Cannot delete or modify survey data
Municipal Staff
  • Can view and interact with digital twins of roads within their municipality
  • Read-only access (cannot upload, edit, or delete any data)
Contractor (e.g. Adam)
  • Can upload 3D stills and videos of surveyed roads
  • Can view only the assets they have been granted access to
  • Cannot modify, delete, or manage other users
Municipal Auditor
  • Read-only access to municipal-specific records and user actions
  • Can view logs and audit data for compliance purposes
  • Cannot modify, upload, or delete assets
Access Management

All user access is managed through secure enterprise authentication systems, ensuring that users can only access data and functions appropriate to their role and organization.