Identity and access control
Secure access, role-based permissions and minors protection. Each actor sees only what they need—with traceability.
Overview
Control who can see and do what at every step. Clear roles, identity verification and enhanced safeguards for sensitive data.
Problems we solve
Unclear permissions
Too much access (or too little) and no one knows why.
Security risk
Shared accounts and weak access hygiene.
Minors handling
Consents and access require special treatment.
Integration safety
Connecting systems without losing control.
Key capabilities
Accounts & profiles
Unified profile with personal data, roles and preferences.
Identity verification
Email, phone and identity document validation.
Minors
Legal guardian consent for students under 18.
Secure sign-in
Modern secure sessions with token rotation.
Integration keys
API keys to connect external systems safely.
Role-based permissions
Granular permissions per resource and action—no default overexposure.
How it works
Create accounts
The school creates users and assigns roles with specific permissions per resource.
CentroIdentity verification
Email, phone and documents are validated. For minors, legal guardian consent is managed.
AdminControlled access
Each user accesses only what they need, with secure sessions and full traceability.
AdminEvidence & compliance
Identity verification record per user
Role and permission change history
Session log with IP, device and duration
Minor consents with legal guardian signature
Permission matrix export for audit
Before and after
Shared accounts, unclear permissions and no special handling for minors' data.
Granular roles, identity verification and enhanced protection for minors.
Related modules
Who’s involved
Schools
Assign users and roles by responsibility.
Companies
Manage tutor access for their placements.
Administration
Accesses review/audit based on permissions.
Want to see this module in action?
We’ll show you how it works with your real workflow and regional annexes.