Security

Security for broadband operations

Security model for ISPAgents: role permissions, approvals, audit trails, connector secrets, change previews, and rollback evidence for ISP operations.

Explore platform

Access changes need proof

Billing-driven suspension, RADIUS policy changes, router updates, and CPE commands affect real subscribers. ISPAgents is designed around approval, evidence, and traceability.

  • Role-based permissions
  • Approval workflows
  • Audit trails
  • Change previews

Connector secrets stay controlled

MikroTik, RADIUS, UISP, Splynx, payment, SMS, and WhatsApp connectors should be managed through scoped credentials and operational health checks.

  • Scoped connector access
  • Secret vault direction
  • Health monitoring
  • Failure visibility