Login system
ISOwl uses a hardcoded credential store — there is no backend authentication server, identity provider, or token exchange. Credentials are validated entirely in the browser against fixed values in the application state. This design makes ISOwl suitable as a self-contained demo or internal tool without any infrastructure dependencies.Demo accounts
| Account | Password | Role | Workspace | |
|---|---|---|---|---|
| Agency Admin | admin@agencia.com | admin123 | CISO | Agency + all client tenants |
| Client Owner | owner@cliente.com | cliente123 | OWNER | CLIENT_A only |
Role-based access control
Every authenticated session has one of three roles. The role determines what actions a user can perform across all modules.- CISO
- AUDITOR
- OWNER
The CISO role has full administrative access.
The Agency Admin account (
| Capability | Access |
|---|---|
| View all modules and dashboards | Yes |
| Mark clause requirements as implemented | Yes |
| Evaluate and update Annex A controls | Yes |
| Add, edit, and delete assets | Yes |
| Create and update risks | Yes |
| Upload and delete evidence | Yes |
| Manage findings and improvement actions | Yes |
| Switch between client tenants | Yes |
| Access Clients Admin page | Yes |
| Export PDF reports | Yes |
admin@agencia.com) is always assigned the CISO role.Multi-tenant workspaces
ISOwl supports multiple isolated workspaces called tenants. Each tenant has its own ISMS data — clauses, controls, assets, risks, and evidence are completely separate between tenants. There are two types of tenants:- Agency workspace (
AGENCY) — the consulting firm’s own internal ISMS. The Agency Admin lands here by default after login. - Client workspaces (
CLIENT_A, and any dynamically created clients) — one isolated workspace per managed client.
How to switch tenants
Switching tenants is available only to users with the CISO role.Open the Clients Admin page
Navigate to Clients (
/clients) in the sidebar. This page lists all client workspaces created in the agency.Select a client
Click on the client you want to manage. ISOwl switches the active tenant to that client’s workspace. The sidebar and all module data now reflect that client’s ISMS.
The current active tenant is shown in the application header. Always verify the active tenant before making changes to avoid editing the wrong workspace.
How to log out
Click your user profile or the logout option in the application navigation. On logout, the session is cleared:isAuthenticatedis set tofalse- The active user and role are removed from state
- The active tenant resets to
AGENCY
localStorage is not deleted on logout — it persists for the next session.
localStorage persistence
All ISMS data and session state is stored inlocalStorage under the key sgsi-storage.
What persists after logout?
What persists after logout?
Workspace data (clauses, controls, assets, risks, evidence) persists across logout and browser restarts. Only the active session (authenticated user, current role) is cleared on logout.
What happens if I clear browser storage?
What happens if I clear browser storage?
Clearing
localStorage — via browser developer tools, a browser reset, or a privacy-clearing extension — permanently deletes all ISOwl data. This action cannot be undone. Export PDF reports regularly to preserve a record of your ISMS state.Is data shared between browsers or devices?
Is data shared between browsers or devices?
Can I inspect the raw data?
Can I inspect the raw data?
Yes. Open your browser’s developer tools, go to Application > Local Storage, and find the
sgsi-storage key. The value is a JSON object containing the full Zustand state tree.