Permissions

How Permissions Work

Permissions in AcuCheck define what authenticated users and systems are allowed to do within the platform. While authentication establishes identity, permissions determine the scope of access to customers, financial reports, DTI calculations, user management, and configuration settings.

Permissions ensure that actions affecting sensitive financial data and platform behavior are performed only by authorized roles.

Permission Enforcement

AcuCheck enforces permissions at the operation level. Each secured action is evaluated against the permissions associated with the authenticated identity before it is allowed to proceed.

Permission checks apply consistently across all workflows, including customer onboarding, report requests, report retrieval, DTI evaluation, user administration, and settings management. Requests that fail permission validation are rejected, even when authentication is valid.

Permissions Across Platform Workflows

Permissions are applied uniformly across the AcuCheck platform to maintain controlled access to customer data and financial outcomes. Operational workflows such as generating reports, refreshing data, and reviewing DTI results are available only to users with the appropriate access rights.

This consistent enforcement ensures that financial assessments and outcomes are generated and reviewed within defined organizational boundaries.

Permissions and User Management

Permissions govern access to user-related functionality within AcuCheck. This includes viewing users, adding new users, editing existing user details, and removing users from the platform.

By controlling who can manage users, AcuCheck helps organizations align platform access with internal roles, responsibilities, and compliance requirements.

Permissions and Configuration Settings

Permissions also control access to platform configuration areas, such as report link settings, notification templates, and DTI score configuration. Only users with appropriate permissions can modify these settings.

Restricting access to configuration settings helps ensure consistency in how reports are generated, how notifications are triggered, and how DTI outcomes are calculated across the organization.

Permissions in Relation to Authentication

Permissions are evaluated only after successful authentication. Authentication verifies who the user or system is, while permissions define what actions that identity is allowed to perform within AcuCheck.

Together, authentication and permissions form the foundation of AcuCheck’s access control model.

Next Steps After Permissions

Once permissions are applied, users and systems can proceed with authorized AcuCheck operations, including customer management, report generation, and DTI outcome review. The following sections describe AcuCheck’s features and workflows in more detail.