← Back to Documentation

BDM Universal API

User Guide - Sharing & Guest Access

Overview

The BDM Universal API provides two powerful ways to share access to your data:

User-to-User Sharing

Share full module access with team members, employees, or collaborators who have BDM accounts.

  • ✓ Requires BDM account
  • ✓ Full module access
  • ✓ Role-based permissions
  • ✓ Long-term collaboration

Guest Access

Provide secure, limited access to specific documents for customers, vendors, or external parties.

  • ✓ No account required
  • ✓ Single document/resource
  • ✓ Time-limited access
  • ✓ Optional security layers

Important Note

Only module owners can share access. If someone shared a module with you, you cannot re-share it with others.

Sharing Module Access

Share full access to any of your modules with team members. They'll be able to work in the module as if it were their own (based on their role).

1

Navigate to Module Permissions

From any module (Accounting, Stock Control, etc.), click on the Share or Permissions button in the top right corner.

Example location: Share Access
2

Invite User

Click Invite User and enter their email address. They must have a BDM account or will receive an invitation to create one.

3

Select Role

Choose the appropriate role based on what the user needs to do:

A

Admin

Nearly full access. Can do everything except manage who has access to the module.

✓ Create, edit, delete • ✓ Reports • ✗ Share access

M

Manager

Handle daily operations, approvals, and reporting. Cannot delete important records.

✓ Create, edit • ✓ Approve • ✓ Reports • ✗ Delete

S

Staff

Perform operational tasks. Limited creation and editing capabilities.

✓ Create (some) • ✓ Edit (limited) • ✓ View all • ✗ Delete

V

Viewer

Read-only access. Perfect for reporting, auditing, or oversight roles.

✓ View all • ✓ Export • ✗ Edit • ✗ Create • ✗ Delete

4

Confirm and Send

Review the details and send the invitation. The user will receive an email with instructions to accept access.

✓ Success! Invitation sent to colleague@example.com. They'll receive an email with a link to accept access.

Managing Permissions

Viewing Active Permissions

See who has access to your modules at any time:

JD

John Doe

john@example.com

Manager Last active: 2 hours ago
AS

Alice Smith

alice@example.com

Viewer Last active: 1 day ago

Changing Roles

Update a user's role at any time. Click the three-dot menu next to their name and select Change Role.

Revoking Access

Remove access immediately by clicking Revoke Access from the user's menu. They'll lose access instantly.

⚠️ Warning: Revoking access is immediate. The user will be logged out of the module and cannot access it anymore.

Guest Access

Guest Access allows you to share specific documents (invoices, purchase orders, payslips, etc.) with people who don't have BDM accounts.

Perfect For:

📄 Customers

  • • View and pay invoices
  • • Download quotes
  • • Check order status
  • • Access receipts

📦 Vendors/Suppliers

  • • View purchase orders
  • • Acknowledge orders
  • • Update delivery dates
  • • Submit invoices

👔 Employees

  • • View payslips
  • • Download tax documents
  • • Check leave balances
  • • Access benefits info

📊 Partners/Auditors

  • • View reports
  • • Access analytics
  • • Download documents
  • • Temporary access

Key Benefits

  • No Account Required - Recipients don't need to create an account
  • Secure - Multiple security layers (password, verification codes, IP restrictions)
  • Time-Limited - Automatic expiration
  • Usage Tracking - See when and how often accessed
  • Revocable - Disable access anytime

Security Options

Add multiple layers of security to guest access links for sensitive documents.

Password Protection

Require a password to view the document. Share the password separately (phone, SMS, etc.).

When to use: For financial documents, contracts, or sensitive data.

Email Verification Code

Send a 6-digit code to the recipient's email. They must enter it to access the document.

When to use: To confirm recipient's email address is valid.

Usage Limits

Limit how many times the document can be viewed or downloaded.

When to use: For time-sensitive or promotional content.

Expiration Date

Set when the link should stop working. Access is automatically revoked after this date.

When to use: For temporary access or time-bound documents.

IP Address Restrictions (Advanced)

Only allow access from specific IP addresses. Perfect for office-only access.

When to use: For highly sensitive documents requiring office access only.

💡 Tip: You can combine multiple security options for maximum protection. For example: password + verification code + expiration date.

Monitoring Access

View Activity Log

Track every action taken on your guest access links:

Document viewed

October 27, 2025 at 10:30 AM • IP: 41.86.xxx.xxx • Cape Town, ZA

PDF downloaded

October 27, 2025 at 10:32 AM • IP: 41.86.xxx.xxx • Cape Town, ZA

Email opened

October 27, 2025 at 10:15 AM

Usage Statistics

See at a glance how your guest links are being used:

Total Views

7 / 10

Downloads

2 / 3

Last Accessed

2 hours ago

Common Use Cases

📧 Send Invoice to Customer

Scenario: You need to send an invoice to a customer for payment.

Setup:

  • • Permissions: View, Download, Pay
  • • Security: None (just email)
  • • Expiration: 30 days
  • • Email tracking: Enabled

💰 Share Payslip with Employee

Scenario: Monthly payslips need to be securely shared with employees.

Setup:

  • • Permissions: View, Download only
  • • Security: Password protection
  • • Expiration: 90 days
  • • View limit: 10 times

📦 Purchase Order to Vendor

Scenario: Send purchase order to supplier for acknowledgment.

Setup:

  • • Permissions: View, Download, Acknowledge
  • • Security: Verification code
  • • Expiration: 14 days
  • • Notifications: Email on acknowledgment

📊 Temporary Access for Auditor

Scenario: Give external auditor access to specific financial reports.

Setup:

  • • Permissions: View, Download
  • • Security: Password + Verification + IP restriction
  • • Expiration: 7 days
  • • View limit: 20 times

Best Practices

Always Set Expiration Dates

Never create permanent guest links. Set reasonable expiration dates based on document type.

Use Passwords for Sensitive Data

Always protect financial documents, contracts, and personal information with passwords.

Monitor Activity Regularly

Check access logs weekly to ensure there's no suspicious activity.

Revoke When No Longer Needed

Don't wait for expiration. Manually revoke access when the recipient confirms they no longer need it.

Share Passwords Separately

Never send the password in the same email as the guest link. Use phone, SMS, or separate email.

Limit Download Counts

Set reasonable download limits (2-3 times) to prevent excessive sharing.

Use User-to-User Sharing for Team Members

Don't use guest access for internal team members. Share module access instead for better collaboration.

Frequently Asked Questions

Can I share the same module with multiple people?

Yes! You can share each module with as many people as you need. Each person gets their own role and permissions.

What happens if I delete a document with guest access?

The guest link will no longer work. Recipients will see a message that the document is no longer available.

Can guest users forward their access links?

Technically yes, but you can limit this with device limits and IP restrictions. Best practice: use password protection for sensitive documents.

How do I know if someone viewed my shared document?

Check the Activity Log in the guest access section. You'll see every view, download, and action taken.

Can I change permissions after sharing?

Yes! For user-to-user sharing, you can change roles anytime. For guest access, you'll need to revoke and create a new link with updated permissions.

Is there a limit to how many guest links I can create?

No hard limit, but we recommend keeping active links under 100 for easy management.

What's the difference between "Admin" and "Manager" roles?

Admins can do everything except manage who has access to the module. Managers cannot delete critical records. Both can perform daily operations.