Security & access

JeraSoft Billing ensures robust security and access control with configurable user roles, ownership-based permissions, and isolated partitions. Features like audit logs, event notifications, SSL encryption, and IP whitelisting provide transparency and protection, safeguarding sensitive data.

  • User roles and permissions

    Precise user roles and permissions configuration to ensure users can only access the features and data they are authorized to use.

  • Ownership-based access

    Controlled visibility to ensure users can access only the customers and data specifically assigned to them.

  • Isolated partitions

    Partitioning capabilities to manage distinct subsets of customers and configurations for operational separation.

  • Audit log

    Comprehensive tracking of user actions within the system to ensure accountability and transparency.

  • Events log and notifications

    System event tracking with automated email notifications for critical actions and changes.

  • Secure communication

    End-to-end SSL encryption for all communication with the system, including the UI and API.

  • IP whitelisting

    Controlled system interaction by restricting access to specific IP ranges.

The Fastest Support in the Industry

JeraSoft engineers are available 24/7 for phone, chat or ticketing support. From simple questions to complicated issues — we always help our customers.
Have a Question?
We will be glad to answer all your questions about our products and provide all necessary commercial and technical information.
Support