01
Partner and admin capabilities are split by role so routine visibility, billing actions, user management, and higher-risk controls do not all sit behind the same permission level.
Public summary
Admin, partner, and privileged workflow controls with MFA and role boundaries.
Why this matters
Partners need confidence that their staff only see what they are meant to see and that Blacklight keeps higher-risk controls behind stronger authentication. This summary focuses on those boundaries.
Access control summary · Current public summary
Current summary
These points are written to be shareable and review-friendly. They give the reviewer a direct answer in plain language before the conversation turns into a longer procurement or questionnaire exchange.
01
Partner and admin capabilities are split by role so routine visibility, billing actions, user management, and higher-risk controls do not all sit behind the same permission level.
02
Sensitive routes use stronger authentication expectations, especially where account changes, partner-access decisions, or operational overrides are involved.
03
Location-aware and role-aware access boundaries are part of the model so larger organizations can limit what staff see when broader access is not appropriate.
Next review path
Start with this summary. Then move into the packet, appendix, or formal follow-up only when the reviewer needs a broader or more formal response.
Best for a first review share before deeper follow-up starts.
Open trust packetBest for retention windows, provider handling, hashed tokens, and scoped operational controls.
Open technical appendixBest for questionnaire packets, procurement follow-up, or trust-specific requests that need a formal response.
Request access-control follow-up