Documentation Index
Fetch the complete documentation index at: https://docs.wede.pt/llms.txt
Use this file to discover all available pages before exploring further.
Data Privacy
Wede operates on a strict data opacity principle: your payload is yours. Wede transports events but never reads, stores, or processes the contents of your payload. You control encryption at the application layer.Encryption
All communication between your systems and the Wede platform is encrypted in transit using TLS 1.3. API keys and tokens are never logged.Access Control
Wede uses a role-based access control system with nine permission levels — from global platform administrators to field operators. Every action is logged in an immutable audit trail.| Role | Description |
|---|---|
| Company Admin | Full control over your tenant |
| Company Tech | API keys, webhooks, technical integration |
| Operational Supervisor | Event monitoring and dispatch |
| Field Operator | Receive and execute dispatched events |
| Corporate Client | Read-only access to reports and events |