Settings & Access Control
Settings and Access Control define how RAX is configured, secured, and governed at the user or organization level.
These controls ensure that risk parameters, permissions, and operational boundaries are clearly defined and enforced.
User and Organization Profiles
RAX supports both individual and organizational usage.
Profiles define:
Connected wallets
Enabled chains and protocols
Default risk preferences
Monitoring and alert settings
Organizational profiles allow multiple users to operate within shared constraints.
Access Roles
Access roles determine what actions a user can perform.
Common roles may include:
Viewer, with read-only access
Operator, with configuration and monitoring access
Administrator, with full control over settings and permissions
Role separation reduces operational risk and supports internal controls.
Wallet Authorization
Wallet connections define which assets and positions are visible and manageable within RAX.
Authorization settings determine:
Which wallets are monitored
Whether allocation suggestions can be generated
Whether execution integrations are enabled
Users retain control over wallet permissions at all times.
Risk Parameter Configuration
Risk parameters allow users to tailor RAX to their risk tolerance.
Configurable parameters may include:
Risk Score thresholds
Exposure limits
Drawdown constraints
Volatility sensitivity
These parameters directly influence alerts and allocation suggestions.
Notification Preferences
Users can configure:
Alert types
Severity thresholds
Notification channels
Frequency of notifications
Careful configuration helps avoid alert fatigue while maintaining awareness.
Security Best Practices
RAX encourages best practices such as:
Principle of least privilege
Role separation
Regular review of permissions
Conservative default settings
Security settings should be reviewed periodically, especially after changes in team structure or strategy.
Summary
Settings and Access Control provide the operational foundation of RAX.
They ensure that risk intelligence and allocation guidance operate within clearly defined boundaries, supporting secure and accountable capital management.
Last updated