Settings
Comprehensive configuration options for authentication, permissions, and administrative features.
The Settings section provides comprehensive configuration options for your Axellero Studio applications. Manage authentication, permissions, system configurations, and administrative features.
Settings Categories Overview
| Category | Purpose | Configuration Scope | Security Level |
|---|---|---|---|
| Authentication Providers | Configure login methods and identity providers | Application/Workspace | High - Controls access |
| API Access Tokens | Manage programmatic access to applications | Application/User | High - System access |
| Language Settings | Multi-language support and localization | Application/User | Low - User preference |
| Constants Management | Application-wide configuration values | Application | Medium - System behavior |
| Member Management | User access, roles, and permissions | Organization/Workspace | High - Access control |
Authentication Provider Types
| Provider Type | Description | Configuration Requirements | Use Cases |
|---|---|---|---|
| OAuth 2.0 | Industry standard authorization framework | Client ID, Client Secret, Redirect URLs | Third-party login (Google, GitHub, Microsoft) |
| SAML | Security Assertion Markup Language | IdP metadata, SP settings, certificates | Enterprise SSO, corporate identity systems |
| LDAP | Lightweight Directory Access Protocol | Server URL, bind credentials, search base | Corporate directories, Active Directory |
| OpenID Connect | Authentication layer on top of OAuth 2.0 | Discovery endpoint, client credentials | Modern SSO, identity verification |
| Custom | Custom authentication implementation | API endpoints, validation logic, user mapping | Proprietary systems, legacy authentication |
API Token Management
| Token Type | Scope | Permissions | Expiration Options |
|---|---|---|---|
| Application Tokens | Single application access | Read, write, execute, admin | 30 days, 90 days, 1 year, never |
| User Tokens | User-specific access | Based on user permissions | 7 days, 30 days, 90 days |
| Service Tokens | Service-to-service communication | Specific API endpoints | Based on service requirements |
| Read-Only Tokens | Data retrieval only | Read permissions only | Extended expiration periods |
Overview
Studio settings are organized into logical categories that allow you to:
- Control Access: Manage who can access your applications and what they can do
- Configure Authentication: Set up secure login methods and identity providers
- Manage Integrations: Control API access and external integrations
- Customize Experience: Configure language preferences and application behavior
- Define Constants: Set up reusable configuration values across your application
Settings Hierarchy
Settings in Axellero Studio follow the platform hierarchy:
Organization-Level Settings
Apply across all workspaces and applications:
- Organization-wide authentication providers
- Master user management
- Global security policies
- Billing and subscription settings
Workspace-Level Settings
Apply to all applications within a workspace:
- Workspace authentication configuration
- Shared constants and configurations
- Team member access controls
- Resource sharing policies
Application-Level Settings
Specific to individual applications:
- Application-specific authentication
- API tokens and access controls
- Language and localization settings
- Application constants and variables
Quick Start
Initial Configuration
When setting up a new application:
- Configure Authentication: Set up user login methods
- Add Team Members: Invite users and assign roles
- Set Up Languages: Configure localization if needed
- Define Constants: Add application configuration values
- Generate API Tokens: Create tokens for external access
Regular Management
Ongoing settings management:
- Review Member Access: Regularly audit user permissions
- Rotate API Tokens: Update tokens for security
- Update Languages: Add new localizations as needed
- Manage Constants: Update configuration values as requirements change
- Monitor Authentication: Ensure secure access configurations
Permission Management
Role-Based Access Control
| Role Level | Organization Rights | Workspace Rights | Application Rights | Typical Users |
|---|---|---|---|---|
| Owner | Full admin, billing, member management | Create/delete workspaces, full access | All applications, full configuration | Founders, CTOs |
| Admin | Member management, settings | Workspace admin, member management | Application configuration, deployment | Technical leads, DevOps |
| Developer | View organization info | Development access, testing | Build, test, modify applications | Software engineers |
| Collaborator | View organization info | Limited workspace access | Specific application access | External contractors |
| Viewer | Organization overview only | Read-only workspace access | View applications, execution logs | Stakeholders, managers |
Permission Granularity
| Permission Area | Available Controls | Scope Options | Security Considerations |
|---|---|---|---|
| Application Access | View, edit, execute, deploy, delete | Per-application or bulk assignment | Restrict sensitive applications |
| Data Access | Read, write, delete, schema modification | Table-level or database-level | Protect sensitive data |
| Integration Management | Create, edit, delete, execute connectors | Integration-specific or category-based | Secure external system access |
| Settings Management | Authentication, members, constants, tokens | Setting-specific permissions | Limit configuration changes |
Security Considerations
Access Control
Implement proper security measures:
Role-Based Permissions:
- Assign minimum necessary permissions
- Use predefined roles when possible
- Regularly review and update access rights
- Implement approval processes for sensitive changes
Authentication Security:
- Use strong authentication methods
- Enable multi-factor authentication where available
- Configure secure password policies
- Monitor authentication logs for suspicious activity
API Security
Protect programmatic access:
Token Management:
- Generate unique tokens for each integration
- Set appropriate token expiration periods
- Regularly rotate tokens
- Monitor token usage and access patterns
Access Restrictions:
- Limit API token permissions to necessary operations
- Use IP whitelisting when possible
- Monitor API usage for anomalies
- Implement rate limiting where appropriate
Data Protection
Safeguard sensitive information:
Configuration Security:
- Protect sensitive constants and configuration values
- Use secure storage for credentials and secrets
- Implement proper access controls for settings
- Audit configuration changes
Best Practices
User Management
Effectively manage team access:
Onboarding:
- Create standardized onboarding processes
- Assign appropriate initial permissions
- Provide training on platform usage
- Document role responsibilities
Access Review:
- Regularly audit user permissions
- Remove access for inactive users
- Update permissions as roles change
- Maintain principle of least privilege
Configuration Management
Maintain consistent configurations:
Documentation:
- Document all configuration changes
- Maintain configuration baselines
- Create change management processes
- Keep settings documentation current
Testing:
- Test configuration changes in development environments
- Validate authentication and access controls
- Monitor system behavior after changes
- Have rollback procedures ready
Maintenance
Keep settings current and secure:
Regular Reviews:
- Schedule periodic settings reviews
- Update outdated configurations
- Remove unused API tokens
- Clean up inactive user accounts
Monitoring:
- Monitor settings usage and access
- Track configuration changes
- Alert on suspicious activities
- Maintain audit logs
Common Tasks
Adding New Users
- Navigate to Settings → Members
- Click "Add Member" or "Invite User"
- Enter user email and details
- Assign appropriate roles and permissions
- Send invitation and track acceptance
Creating API Tokens
- Go to Settings → API Access Tokens
- Click "Generate New Token"
- Configure token permissions and expiration
- Copy and securely store the token
- Document token usage and purpose
Configuring Languages
- Open Settings → Language Settings
- Add new language configurations
- Upload translation files or configure localization
- Test language switching functionality
- Update application to use new languages
Managing Constants
- Access Settings → Constants Management
- Add new constants or update existing values
- Organize constants by category or purpose
- Test applications using updated constants
- Document constant purposes and usage
Troubleshooting
Common Issues
Authentication Problems:
- Verify authentication provider configuration
- Check user permissions and role assignments
- Validate authentication settings and credentials
- Review authentication logs for errors
API Access Issues:
- Verify token permissions and expiration
- Check API endpoint configurations
- Validate request formats and authentication headers
- Monitor API usage logs for errors
Language/Localization Problems:
- Verify language configuration settings
- Check translation file formats and content
- Validate language switching functionality
- Test with different browser language settings
Permission Issues:
- Review user role assignments
- Check inherited permissions from organization/workspace
- Validate specific permission configurations
- Audit recent permission changes
Getting Help
Documentation:
- Review specific settings category documentation
- Check troubleshooting guides for detailed solutions
- Consult API documentation for integration issues
- Review best practices guides
Support Resources:
- Contact support for configuration assistance
- Engage with community forums
- Check status page for system-wide issues
- Review release notes for changes and updates
Next Steps
- Review Current Settings: Audit your existing configurations
- Implement Security Best Practices: Enhance authentication and access controls
- Optimize User Management: Streamline member access and permissions
- Configure Integrations: Set up API tokens and external connections
- Plan Maintenance: Schedule regular settings reviews and updates
Each settings category has detailed documentation to help you configure and maintain your Studio applications effectively.