Skip to content
Sign Out

Getting Started

Getting Started

Here’s how you can get started with Digital Oilfield Portal: digitaloilfield.app

Fundamentals

  1. Learn how to navigate Digital Oilfield Portal
  2. Give mobile and portal access to new users
  3. Customize default variables based on your preferences
  4. Create wells to capture, store, track, and transmit data elements from field operations to off-site supervising and engineering units
  5. Analyze data using our built-in Report solution

Security

The security of your Digital Oilfield account is paramount, ensuring safe access and collaboration across the platform. Each account is unique to an individual user, supporting tailored access to various functionalities.

Account Setup

Every Digital Oilfield account is individual and cannot be shared. This ensures that all activities are securely tied to a specific authorized user, enhancing accountability and security.

Digital Oilfield accounts grant access to leases and roles to collaborate with other Digital Oilfield users.

Access Management

  • Leases: Access to leases allows users to manage and interact with specific segments of the platform pertinent to their role and responsibilities. This targeted access helps in maintaining operational integrity and data accuracy.
  • Roles: Roles are used to define the level of access and permissions a user has within Digital Oilfield. By assigning roles, you can control what each user can view, modify, or manage, ensuring they have the necessary tools and access without compromising security.
  • Profiles: A profile is the combination of features and roles. It determines which functionalities a role has enabled.

Security Layers

To further protect your data and operations, Digital Oilfield employs multiple layers of security:

  • Data Encryption: Ensures that all data transmitted and stored within the platform is encrypted, safeguarding against unauthorized access.
  • Regular Audits: Routine security audits are conducted to identify and rectify any potential vulnerabilities within the system.
  • Authentication Protocols: Strong authentication mechanisms are in place to verify the identity of users and limit access to authenticated individuals.

To deepen your understanding of these features and learn how to implement them:

  • Visit the leases section for detailed guidelines on managing lease-specific access.
  • Explore the roles area to understand different roles and their corresponding access privileges.
  • Check out the profiles segment for instructions on configuring user profiles and security settings.