Holibob Docs

Security

Security

Info: > Note: Last updated on 23 Oct 2025 Our Security Features are designed to ensure that access to the platform is controlled, appropriate, and aligned with the needs of different users and teams. Whether someone is signing in to manage bookings, access reporting, or support consumers, our system ensures that each user only sees and interacts with the information relevant to their role. Users access the platform through secure login methods and are granted permissions that reflect their responsibilities, whether they are part of your consumer service team, sales team, or technical team.

Key Benefits

  • Role-Based Access: Each user is granted access only to the data and tools necessary for their responsibilities, reducing risk and supporting compliance.

  • Secure Authentication: All users access the platform through secure login methods, ensuring that only authorised individuals can access sensitive information.

  • Customisable Permissions: We work with you to define user roles and configure permissions to match your operational needs.

  • Impersonation for Support: Authorised users can temporarily act on behalf of others for support and testing, streamlining troubleshooting while maintaining security.

  • Scalable Controls: Our approach supports both small teams and large organisations, ensuring access remains structured and secure as you grow.

How It Works

  1. User Role Definition: We collaborate with you to define the types of users (personas) who need access or need a change.

  2. Impersonation Feature: Certain users, with the right permissions, can temporarily act on behalf of others for support or testing purposes, without compromising security.

  3. Ongoing Support: We help you manage user access as your organisation evolves, ensuring your teams can work efficiently and securely.

Partner Actions

  • Assign and Create Users: If you have the appropriate permissions, you can assign roles and create user accounts for members of your organisation directly within the platform. This allows you to manage access efficiently and ensure your team members have the correct permissions for their responsibilities.

  • Identify Team Members: Let us know which team members need access and what actions they need to perform, especially if you require our assistance with user setup or permissions.

  • Review & Approve Roles: Validate the assigned roles and permissions to ensure they align with your operational requirements.

  • Keep User List Updated: Notify us of any changes in your team so we can update access and permissions as needed, or update them directly if you have the necessary permissions.

Additional Notes

  • Feature Availability: Most security features are enabled by default, but advanced configurations or custom roles may require additional setup.

  • Customisation: Access controls and permissions can be tailored to your operational needs and organisational structure.

  • Compliance: Our security approach is designed to support compliance with relevant data protection and privacy regulations.