This system incorporated a robust user access control model, featuring multiple, distinct user roles with granular permissions, ensuring data security and operational integrity. User authentication was multifaceted and highly secure, supporting email and password login, social authentication, phone number verification via OTP, and robust two-factor authentication using TOTP generated by authenticator applications, alongside provisions for one-click authentication.