Getting Started
Getting Started
Here’s how you can get started with Digital Oilfield Portal: digitaloilfield.app
Fundamentals
- Learn how to navigate Digital Oilfield Portal
- Give mobile and portal access to new users
- Customize default variables based on your preferences
- Create wells to capture, store, track, and transmit data elements from field operations to off-site supervising and engineering units
- Analyze data using our built-in Report solution
Security
The security of your Digital Oilfield account is paramount, ensuring safe access and collaboration across the platform. Each account is unique to an individual user, supporting tailored access to various functionalities.
Account Setup
Every Digital Oilfield account is individual and cannot be shared. This ensures that all activities are securely tied to a specific authorized user, enhancing accountability and security.
Digital Oilfield accounts grant access to leases and roles to collaborate with other Digital Oilfield users.
Access Management
- Leases: Access to leases allows users to manage and interact with specific segments of the platform pertinent to their role and responsibilities. This targeted access helps in maintaining operational integrity and data accuracy.
- Roles: Roles are used to define the level of access and permissions a user has within Digital Oilfield. By assigning roles, you can control what each user can view, modify, or manage, ensuring they have the necessary tools and access without compromising security.
- Profiles: A profile is the combination of features and roles. It determines which functionalities a role has enabled.
Security Layers
To further protect your data and operations, Digital Oilfield employs multiple layers of security:
- Data Encryption: Ensures that all data transmitted and stored within the platform is encrypted, safeguarding against unauthorized access.
- Regular Audits: Routine security audits are conducted to identify and rectify any potential vulnerabilities within the system.
- Authentication Protocols: Strong authentication mechanisms are in place to verify the identity of users and limit access to authenticated individuals.
Related articles
To deepen your understanding of these features and learn how to implement them: