Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.jadenet.id/llms.txt

Use this file to discover all available pages before exploring further.

Jadenet runs entirely in the cloud, meaning you and your team can securely access your logistics data from any device, at any location, at any time. Access is not simply open — it is gated by a layered set of controls that ensure only the right people can see and act on the right information.
Jadenet is available 24/7. Whether your operations run across time zones or require after-hours access, the platform is always on and accessible without scheduled maintenance windows.

How platform access works

When you log in to Jadenet, your credentials are validated against your organisation’s account. The platform uses secure authentication to confirm your identity before granting access to any data or module. Every session is tied to your user profile, and activity is logged for audit purposes. Because Jadenet is cloud-based, there is no software to install and no VPN required. You access the platform through a standard web browser, making it straightforward to use from the office, at a port, or while travelling.

Role-based access controls

Not every user in your organisation needs access to every part of the platform. Jadenet uses role-based access controls (RBAC) to give administrators precise control over what each user can see and do.
1

Define roles for your organisation

Work with your Jadenet administrator to establish roles that reflect your team structure — for example, operations staff, finance teams, and management.
2

Assign permissions to each role

Each role is configured with access to specific modules and actions. An operations user may create shipment orders but not access financial reports, while a finance user can view billing data without modifying freight records.
3

Add users and assign roles

When you add a new team member to Jadenet, assign them one or more roles. Their access is immediately scoped to those permissions.
4

Review and adjust access regularly

As your team changes, revisit role assignments. Deactivate accounts for staff who have left and update permissions when responsibilities shift.

How data is kept secure during access

Every request you make within Jadenet is transmitted over an encrypted connection. Data in transit is protected so that it cannot be intercepted between your device and the platform’s servers. On the server side, your data is stored with protections that meet enterprise IT security standards. Access controls are enforced at the platform level, not just the interface level. Even if a user navigates directly to a restricted URL or attempts to access data through an integration, the system checks their permissions before returning any information.

Best practices for managing user accounts

Use strong, unique passwords

Require all users to set passwords that are not reused from other services. A password manager makes this practical for your whole team.

Deactivate accounts promptly

When a team member leaves or changes roles, deactivate their Jadenet account immediately to prevent unauthorised access.

Review user access periodically

Schedule regular reviews of who has access to what. Remove permissions that are no longer needed and confirm that role assignments are current.

Limit administrator accounts

Restrict administrator-level access to a small number of trusted staff. Most users do not need elevated permissions to do their work.

Common access questions

Yes. Jadenet is accessible from any modern web browser, including those on smartphones and tablets. There is no separate mobile app required — the platform works through your browser on any device.
Contact your Jadenet administrator to reset your password. Administrators can manage user credentials through the platform’s user management settings.
Yes. Role-based access controls let administrators restrict which modules each user can access. A user assigned only to sea freight operations will not see air freight or accounting modules they are not authorised for.
User limits depend on your Jadenet subscription. Contact the Jadenet team at info@jadenet.id to discuss the right plan for your organisation’s size.
Yes. The platform logs access activity. Unusual login behaviour can be reviewed by your administrator as part of routine account management.