Overview
After sign-in, most day-to-day work happens under/home/*.
The dashboard is organized around four main areas:
- CMS for content and project management
- CRM for leads, reservations, inquiries, and campaigns
- IAM for users, modules, and activity history
- Settings for user-specific configuration and security actions
CMS
The CMS area is where you manage public-facing content and structured records. Typical work includes:- managing projects and inventory-linked content
- publishing news or announcements
- maintaining careers or amenity records
- updating SEO-related content fields
CRM
The CRM area helps you work operational customer data. Typical work includes:- triaging inbound leads
- reviewing reservations
- handling inquiries
- managing newsletter or campaign flows
IAM
The IAM area controls who can access the system and what they can do. Typical work includes:- creating and updating users
- assigning module access
- reviewing activity logs
- supporting account recovery and security actions
Settings
Settings usually contains user-level actions such as:- password changes
- 2FA setup or removal
- profile updates
- personal preferences
Operator checklist
Before you change critical data:- Confirm you are in the correct environment
- Confirm your account has the right module access
- Review whether the action triggers email, exports, or audit entries
- Check whether another teammate may be editing the same record
Edge cases
Partial access
Users may have access to only one or two modules. Navigation and feature documentation should assume mixed permissions, not full admin access.Destructive actions
Bulk delete, disable, export, and campaign actions can have wide impact. If the UI supports confirmation steps, use them. If it does not, add them before expanding the feature.Concurrent edits
Two users can sometimes change the same record close together. Document or implement conflict handling where data loss would matter.Side effects
A simple change in CRM or IAM may also:- send email
- write an activity log
- affect reporting
- change what appears on the public site
Best practices
- Use the module that owns the data
- Double-check environment before high-risk actions
- Review side effects before submitting
- Treat IAM and bulk actions as sensitive workflows
Next steps
Authorization
How module access is enforced
Authentication
Sessions, login, and 2FA
Email and notifications
Password reset and operational mail flows
Troubleshooting
Common runtime and access issues
