Security

Built for controlled operational workflows

FSM.TEAM is designed for dispatch operations, driver coordination, customer intake, and customer-facing workflow steps that need clear access boundaries, reliable operational history, and workspace-level control.

Security principles

The goal is controlled operations, not generic checkbox language

Protect the workflow, not just the login

Security matters most when real operational decisions are happening quickly. FSM.TEAM is designed so dispatchers, drivers, admins, and customers do not all share the same access surface or the same capabilities.

Keep control close to the workspace

Business-level settings, role boundaries, service-area controls, and admin-managed integrations keep operational ownership close to the people actually responsible for the service.

Prefer traceable operational behavior

High-accountability workflows need visible status history, explicit transitions, and a clearer record of who changed what, not just a loosely connected set of notifications.

Control areas

Where security shows up in the product

Role-based access

Separate admin, office, driver, and customer experiences reduce accidental exposure and keep access scoped to the right workflow.

Email OTP and phone OTP sign-in routes are used to match how different teams actually work. That reduces password sprawl while keeping the access path explicit for each user group.
OTP-based authentication

Passwordless sign-in flows support email and phone-based one-time verification without shared credentials.

Admins, office staff, drivers, and customer-facing links are handled through different surfaces so users do not need broad access just to complete one part of the workflow.
Operational auditability

Track status changes, role activity, and workflow events to support accountability in high-touch service environments.

Service areas, city access, and workspace-scoped configuration help teams limit what each person can see and act on during normal operations.
Controlled integrations

Workspace-level external API controls help administrators manage credentials, features, and downstream connectivity.

External API access is configured at the workspace level so teams can decide which remote capabilities are enabled and who is responsible for connected systems.
Operational security

Questions worth answering before deployment

Which sign-in paths different teams will use in practice.
How customer data enters the platform and which system is the source of truth.
Whether external API features should be enabled immediately or phased in later.
What kinds of workflow changes need explicit oversight or auditability.
How service areas, cities, and role boundaries should be organized from day one.
Why this matters

Field operations fail when access and accountability are fuzzy

Most operational risk is not about exotic attacks. It is about the wrong person changing the wrong thing, teams not understanding current status, or customer-facing actions being handled from tools that were never designed for accountability.

FSM.TEAM tries to reduce that risk by giving each role a narrower surface, keeping customer-facing flows constrained, and making the workspace itself the center of operational control.

FAQ

Security questions teams commonly ask

What does security mean in a field-service context?

It means the right team sees the right information at the right moment, customer links stay constrained to customer tasks, and operational changes remain understandable when things move quickly.

Is this a compliance-claims page?

No. This page is meant to explain the practical control model of the product: authentication, role scoping, workspace governance, and operational traceability.

When should we talk to the team about security?

Talk to the team when your rollout depends on role design, integration boundaries, customer communications, or any workflow where accountability and safe access are operationally important.