Live Demo Guide

This is an interactive demo of a powerful multi-tenant RBAC system. The database is seeded with a complex hierarchy of organizations, users, and permissions. Log in as the different personas below to explore what they can see and do.

Demo Personas

Use the credentials below to explore different roles and permissions.
Universal Password: password123

Organization Admin

global_admin@test.com

Top-level admin for the "TechCorp" enterprise. Can see and manage all subsidiary companies, teams, and projects within the organization.

ENTERPRISE

Company Admin

cloud_services_admin@test.com

Admin for the "Cloud Services" company inside TechCorp. Can manage their own company and its teams, but cannot see the sibling "Analytics Inc." company.

ENTERPRISE

Team Admin

devops_admin@test.com

Admin of just the "DevOps" team. Can manage projects and members within their team, but has no special rights over the parent company or other teams.

ENTERPRISE

Cross-Company Manager

cross_company_manager@test.com

A user with surgical permissions across company lines. They are an EDITOR of the "Compute" team (in Cloud Services) and a READER of the "BI" team (in Analytics Inc.).

COMPLEX

Lead Designer

lead_designer@test.com

Demonstrates flexible permissions. They are an ADMIN of the "E-Commerce" team, but only a READER of its parent company, "Web UX". They also have EDITOR access to a project in a completely different company.

FLEXIBLE

Multi-Role Developer

multirole_dev@test.com

A developer in the "SoloDev" organization who is an EDITOR on both the "Mobile" and "Game Dev" teams, and a READER of a project in the "API" team.

STANDARD

External Auditor

external_auditor@test.com

A third-party user who has been granted read-only access to two specific companies ("Analytics Inc." and "Mobile UI") across two different organizations.

MULTI-ORG

Guest Client

guest_client@test.com

The most restricted user. Has read-only access to a single project ("E-Commerce Project 1") and nothing else. Perfect for demonstrating granular guest access.

GUEST