Spinner logo QXQA

Did You Know?


What Clients Can Access

The Client Dashboard is intentionally structured to provide visibility without operational control. Clients can monitor quality progress and release status — while internal execution tools remain protected.

Within the AXQA Execution Intelligence Platform, client access is intentionally restricted to read-only reporting views. This ensures full transparency without exposing operational workflows or internal execution controls.


Access philosophy

Clients receive read-only visibility into approved projects. They do not manage, modify, or execute testing activities.


Campaign visibility

  • Test Campaign status and progress.
  • Start and end timelines (when defined).
  • High-level execution completion rates.
  • Overall campaign health indicators.

Execution summaries

  • Pass / Fail distribution.
  • Total executed test cases.
  • Pending or in-progress items (if shared).
  • Historical campaign comparisons.

Reports & history

  • Structured Test Campaign Reports.
  • Execution trend summaries.
  • Performance insights over time.

What clients cannot access

  • Test case editing.
  • Automation configuration.
  • Smart Agent execution controls.
  • Internal team dashboards.
  • Other client projects.
Note
AXQA enforces strict project-level isolation. Client users can only view authorized projects, ensuring no cross-client or cross-project exposure under any circumstance.

Data boundaries

Client access is restricted to authorized projects only. No cross-project or cross-client data is exposed.


How access is granted

  1. An administrator defines the client user.
  2. Specific projects are assigned for visibility.
  3. The dashboard reflects only approved data.

Best practices

  • Grant access only to finalized or approved projects.
  • Review visibility settings before client onboarding.
  • Keep campaign naming structured for clarity.
  • Regularly audit client permissions.

Security & isolation

  • Client users operate in read-only mode.
  • Permissions are validated at every access point.
  • Internal data and user activity remain protected.

Related documentation

  • Client Dashboard Overview
  • Shared Access & Visibility Control
  • Security & Execution Permissions

Tools

A+ A-

Version

1