SOC 2 · ISO 27001 · audit live
TenantMeridianEnterprise plan
Seats184/25073% used
Pending approvals32 high risk
Integrations11 / 121 failed
Guardrails7 active73 breaches/7d
Audit events 24h14.2k1 high risk
Policy postureA+all enforced
Tenant Users RBAC Matrix Integrations Guardrails Approvals Audit Log Sandboxes Notifications Access Policies
RBAC matrix
8 roles × 22 permissions · click cell to edit| Role \ Permission | Dashboards | Recommendations | Autonomous | Models | Data | Admin | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| view | export | view | accept | override | bulk-accept | view | configure | execute | rollback | view | promote | rollback | train | view | edit-source | export | users | billing | audit | policies | |
| Tenant Admin | F | F | F | F | F | F | F | F | F | F | F | F | F | F | F | F | F | F | F | F | F |
| Logistics Director | F | F | F | F | F | A | F | A | A | F | F | A | A | · | F | · | F | V | · | V | V |
| Finance Analyst | F | F | F | · | · | · | V | · | · | · | V | · | · | · | F | · | F | · | V | V | · |
| Transportation Planner | F | V | F | F | F | · | V | · | · | · | V | · | · | · | V | · | · | · | · | · | · |
| Network Strategist | F | F | F | A | A | · | F | A | · | A | V | · | · | · | F | · | V | · | · | V | · |
| ML Engineer | V | V | V | · | · | · | F | F | A | F | F | F | F | F | F | F | F | · | · | V | V |
| Auditor (read-only) | V | · | V | · | · | · | V | · | · | · | V | · | · | · | V | · | · | V | V | F | V |
| External Carrier Ops | V | · | V | · | · | · | · | · | · | · | · | · | · | · | V | · | · | · | · | · | · |
Full Approve-only View None
Role inheritance
parent → child propagation Tenant Admin
Logistics DirectorML Engineer
Logistics Director
Transportation PlannerNetwork Strategist
ML Engineer
Finance Analyst
Auditor (read-only)
External Carrier Ops
Effective permissions check
simulate access for any userALLOWED · Fullevaluated in 4ms
Granted by role "Transportation Planner" → inherited from "Logistics Director". No deny-overrides match.
Policy evaluation trace: role.grant → inheritance → tenant.allow → user.deny[none] → ✓ allow