Admin Dashboard Overview & Authentication
Overview
The Sampo Admin Dashboard provides comprehensive monitoring and management capabilities for the multi-deployment job board platform. This guide covers all major features, navigation patterns, and operational procedures.
Key Features
- System Health Monitoring: Real-time status of all system components
- Performance Analytics: Metrics, error tracking, and performance trends
- User Analytics: User behavior, engagement, and deployment-specific insights
- CI/CD Monitoring: Build status, accessibility compliance, and deployment tracking
- Feature Flag Management: Toggle features across deployments
- Multi-Deployment Support: Unified management of BlueLine, BrassKey, and Demo environments
Getting Started
Prerequisites
Before accessing the admin dashboard, ensure you have:
- Admin User Account: Account with admin role permissions
- Two-Factor Authentication: 2FA must be enabled on your account
- Admin Monitoring Permissions: AdminMonitoringGuard validation
- VPN Access: Required for production environment access (if applicable)
Initial Access
- Login: Navigate to `/auth/login` and authenticate with your admin credentials
- 2FA Verification: Complete two-factor authentication when prompted
- Dashboard Access: Navigate to `/admin` to access the admin panel
Authentication & Security
Required Authentication
All admin endpoints require three levels of security:
1. JWT Authentication
- Valid bearer token must be present in Authorization header
- Tokens expire after configured duration (typically 15 minutes)
- Refresh tokens used for seamless re-authentication
2. Role-Based Access Control (RBAC)
- User account must have `admin` role
- Role verification happens on every request
- Insufficient permissions result in 403 Forbidden errors
3. Two-Factor Authentication (2FA)
- 2FA verification required for all admin operations
- Time-based one-time passwords (TOTP) support
- Backup codes available for recovery
Security Headers
All admin requests include security headers:
```http Authorization: Bearer <jwt-token> X-Deployment-ID: <deployment-id> # Optional for deployment-specific operations ```
Session Management
- Auto-refresh: JWT tokens refresh automatically before expiration
- Session timeout: Inactive sessions expire after 30 minutes
- Multi-tab support: Sessions maintained across multiple browser tabs
- Secure logout: Proper token invalidation on logout