Jadenet runs entirely in the cloud, meaning you and your team can securely access your logistics data from any device, at any location, at any time. Access is not simply open — it is gated by a layered set of controls that ensure only the right people can see and act on the right information.Documentation Index
Fetch the complete documentation index at: https://docs.jadenet.id/llms.txt
Use this file to discover all available pages before exploring further.
Jadenet is available 24/7. Whether your operations run across time zones or require after-hours access, the platform is always on and accessible without scheduled maintenance windows.
How platform access works
When you log in to Jadenet, your credentials are validated against your organisation’s account. The platform uses secure authentication to confirm your identity before granting access to any data or module. Every session is tied to your user profile, and activity is logged for audit purposes. Because Jadenet is cloud-based, there is no software to install and no VPN required. You access the platform through a standard web browser, making it straightforward to use from the office, at a port, or while travelling.Role-based access controls
Not every user in your organisation needs access to every part of the platform. Jadenet uses role-based access controls (RBAC) to give administrators precise control over what each user can see and do.Define roles for your organisation
Work with your Jadenet administrator to establish roles that reflect your team structure — for example, operations staff, finance teams, and management.
Assign permissions to each role
Each role is configured with access to specific modules and actions. An operations user may create shipment orders but not access financial reports, while a finance user can view billing data without modifying freight records.
Add users and assign roles
When you add a new team member to Jadenet, assign them one or more roles. Their access is immediately scoped to those permissions.
How data is kept secure during access
Every request you make within Jadenet is transmitted over an encrypted connection. Data in transit is protected so that it cannot be intercepted between your device and the platform’s servers. On the server side, your data is stored with protections that meet enterprise IT security standards. Access controls are enforced at the platform level, not just the interface level. Even if a user navigates directly to a restricted URL or attempts to access data through an integration, the system checks their permissions before returning any information.Best practices for managing user accounts
Use strong, unique passwords
Require all users to set passwords that are not reused from other services. A password manager makes this practical for your whole team.
Deactivate accounts promptly
When a team member leaves or changes roles, deactivate their Jadenet account immediately to prevent unauthorised access.
Review user access periodically
Schedule regular reviews of who has access to what. Remove permissions that are no longer needed and confirm that role assignments are current.
Limit administrator accounts
Restrict administrator-level access to a small number of trusted staff. Most users do not need elevated permissions to do their work.
Common access questions
Can I access Jadenet from a mobile device?
Can I access Jadenet from a mobile device?
Yes. Jadenet is accessible from any modern web browser, including those on smartphones and tablets. There is no separate mobile app required — the platform works through your browser on any device.
What happens if I forget my password?
What happens if I forget my password?
Contact your Jadenet administrator to reset your password. Administrators can manage user credentials through the platform’s user management settings.
Can different users see different modules?
Can different users see different modules?
Yes. Role-based access controls let administrators restrict which modules each user can access. A user assigned only to sea freight operations will not see air freight or accounting modules they are not authorised for.
Is there a limit to how many users I can add?
Is there a limit to how many users I can add?
User limits depend on your Jadenet subscription. Contact the Jadenet team at info@jadenet.id to discuss the right plan for your organisation’s size.
Are login attempts monitored?
Are login attempts monitored?
Yes. The platform logs access activity. Unusual login behaviour can be reviewed by your administrator as part of routine account management.
