Role-Based Security
All users within Velaro are assigned at least one role that dictates what they’re able to access. By assigning roles to users, you’re able to easily configure just who can take chats, who can change settings, who can access configuration tools and who can run reports.