Wonderful
DocsPricing
Log inGet started
ApprovalsAutomationWorkflow OverviewTasks & Projects

Need Help?

Join our community or contact support

Get Support →

On This Page

🏓

Ready to streamline?

Stop ping-ponging between tools.

Get started free

Product

  • Workflow
  • Nova AI
  • Asset Management
  • Pricing

Company

  • About
  • Careers
  • Blog
  • Contact

Legal

  • Privacy Policy
  • Terms of Service
© 2026 Wonderful Inc.
Wonderful

    Account Security

    Secure your account with proper security settings and practices.

    On This Page

    Wonderful takes account security seriously. All users and collaborators are authenticated and authorized using a fine-grained, role-based access model that ensures only the right people can view or modify content.

    Authentication

    • Secure Login: Users sign in using email and password or organization-approved authentication providers.
    • Session Security: Sessions are managed securely, and idle sessions may expire automatically.
    • Protected Resources: Any attempt to access private content requires a valid, authenticated session.
    • Public Resources: Certain tasks, brands, or assets may be made viewable via secure public links (see Asset Sharing).

    Authorization

    • Wonderful uses a resource-based access model (ReBAC) rather than simple role hierarchies.
    • Access is determined per resource — for example, a workspace, team, brand, task, or item.
    • Permissions cascade downward — if you have edit rights at the workspace level, you also have edit rights on teams, tasks, and assets inside it.
    • Each resource has roles such as Admin, Editor, Reviewer, or Viewer, defining what actions you can perform.

    Recommended Practices

    • Use strong, unique passwords or SSO where possible.
    • Review your workspace members regularly.
    • Do not share login credentials—use invitations for new users instead.
    • When sharing public links, confirm you’re using the correct privacy level (see below).