⌘K
Live Alerts
criticalLane US-WEST-204 margin -4.8% vs forecast· 12s agohighCarrier ARX detention spike (+27% 24h)· 1m agomedFuel surcharge drift detected — EU corridor· 3m agohighContract #4821 nearing margin floor (2.1%)· 6m agolowModel v3.2 latency p95 above 180ms· 11m agocriticalAnomaly: unbilled accessorials +$182K (7d)· 14m agomedDrift on volume-forecast model lane-cluster 12· 22m agocriticalLane US-WEST-204 margin -4.8% vs forecast· 12s agohighCarrier ARX detention spike (+27% 24h)· 1m agomedFuel surcharge drift detected — EU corridor· 3m agohighContract #4821 nearing margin floor (2.1%)· 6m agolowModel v3.2 latency p95 above 180ms· 11m agocriticalAnomaly: unbilled accessorials +$182K (7d)· 14m agomedDrift on volume-forecast model lane-cluster 12· 22m ago
SOC 2 · ISO 27001 · audit live
TenantMeridianEnterprise plan
Seats184/25073% used
Pending approvals32 high risk
Integrations11 / 121 failed
Guardrails7 active73 breaches/7d
Audit events 24h14.2k1 high risk
Policy postureA+all enforced

RBAC matrix

8 roles × 22 permissions · click cell to edit
Role \ PermissionDashboardsRecommendationsAutonomousModelsDataAdmin
viewexportviewacceptoverridebulk-acceptviewconfigureexecuterollbackviewpromoterollbacktrainviewedit-sourceexportusersbillingauditpolicies
Tenant Admin
F
F
F
F
F
F
F
F
F
F
F
F
F
F
F
F
F
F
F
F
F
Logistics Director
F
F
F
F
F
A
F
A
A
F
F
A
A
·
F
·
F
V
·
V
V
Finance Analyst
F
F
F
·
·
·
V
·
·
·
V
·
·
·
F
·
F
·
V
V
·
Transportation Planner
F
V
F
F
F
·
V
·
·
·
V
·
·
·
V
·
·
·
·
·
·
Network Strategist
F
F
F
A
A
·
F
A
·
A
V
·
·
·
F
·
V
·
·
V
·
ML Engineer
V
V
V
·
·
·
F
F
A
F
F
F
F
F
F
F
F
·
·
V
V
Auditor (read-only)
V
·
V
·
·
·
V
·
·
·
V
·
·
·
V
·
·
V
V
F
V
External Carrier Ops
V
·
V
·
·
·
·
·
·
·
·
·
·
·
V
·
·
·
·
·
·
Full Approve-only View None

Role inheritance

parent → child propagation
Tenant Admin
Logistics DirectorML Engineer
Logistics Director
Transportation PlannerNetwork Strategist
ML Engineer
Finance Analyst
Auditor (read-only)
External Carrier Ops

Effective permissions check

simulate access for any user
ALLOWED · Fullevaluated in 4ms
Granted by role "Transportation Planner" → inherited from "Logistics Director". No deny-overrides match.
Policy evaluation trace: role.grant → inheritance → tenant.allow → user.deny[none] → ✓ allow