Role overview

The Super Admin role covers advanced control: handling registration requests, traceability through logs, supervision of internal data, storage governance, license review and SMTP settings. It represents the highest level of operational responsibility and sovereignty over the CryptPeer instance.

The Super Admin can use all administrator features (users, categories, requests, etc.). For step-by-step guidance on those shared screens, see the Administrator user guide.

Registration requests

The first tab, “Requests”, is where account creation applications are processed. Permanently deleting a user account or rejecting a registration request is reserved for the Super Admin: an administrator may request it; only the Super Admin may execute the action after confirmation in the interface (e.g. Yes / No).

Depending on configuration, sign-ups may be open or disabled.

Super Admin — User account deletion or registration rejection at administrator request
Account deletion or request rejection (Super Admin only)

Good to know

When registration requests are disabled, the interface shows an inactive state; re-enable the feature to accept applications again.

Registration requests — feature disabled
Registration requests inactive

Logs and traceability of administrative actions

The Super Admin “Logs” tab automatically records all operations performed by administrators. This provides complete, timestamped, sovereign traceability of every action that affects system management.

Administration panel — Logs tab
Administration panel — Logs tab

Purpose of the logs

Logs are CryptPeer’s internal memory. They provide:

  • transparency of administrative activity;
  • traceability of decisions by each administrator;
  • verifiability of operations for audit or internal review.

Data sovereignty

Logs are local and inaccessible to any third party. No data is sent outside the system or to the vendor.

Recorded data

Each administrative action is automatically logged with:

  • the exact date and time of the operation;
  • the name of the administrator who performed the action;
  • the nature of the action;
  • the functional scope of the operation.

Each log entry is immutable and cannot be edited, ensuring reliability and integrity of administrative records.

Review and oversight

From this area, the Super Admin can:

  • browse the chronological list of recent actions;
  • filter logs by event type or user;
  • export or archive logs for internal audit when organizational policy allows.

Strategic role of the logs

Logs are not a surveillance tool but a mechanism for internal control and accountability. They help demonstrate compliant use of the system, strengthen internal trust and, where needed, show that no unauthorized action occurred.

Database

The “Database” tab provides non-technical supervision of CryptPeer’s internal entities. The Super Admin can inspect main tables — users, messages, groups, categories, conversations, sessions, etc. — without changing the schema.

This view helps verify data consistency, look up specific entries and monitor internal instance activity. The database remains under the licensee’s exclusive control on their infrastructure.

Administration panel — Database tab
Administration panel — Database tab

Storage

The administration panel provides a clear, concise view of system status. Administrators can monitor disk usage, manage upload folders, and configure upload restrictions.

CryptPeer can also manage additional storage spaces physically connected to the computer (external SSD/HD devices or dedicated volumes), depending on the deployed infrastructure.

Administration panel — Storage management
Administration panel — Storage management

Disk usage

The “Disk usage” section provides a visual and numeric summary:

  • Total capacity: 220.63 GB;
  • Used space: 30.01 GB (14%);
  • Available space: 179.33 GB.

A circular indicator visually shows consumed space, making it easy to quickly assess storage health.

Upload folder

The “Upload folder” section shows:

  • Total size: 1.44 GB;
  • Configured limit: none;
  • Path: /root/crypteer/static/uploads.

Two main actions support granular management:

  • Configure limits — to better control storage usage;
  • Manage files — to directly handle files present on the server.
Configure upload folder limits
Configure upload folder limits

Maximum folder size (GB), to be defined: 5

Leave empty to keep no limit. Size is specified in Gigabytes (GB). When this limit is reached, the oldest files are automatically deleted according to the configured percentage.

Automatic deletion percentage (%), to be defined: 75

Percentage of files to delete automatically when the limit is reached (0-100). Files are deleted starting with the oldest. Leave empty to disable automatic deletion.

Do not forget to save after setting these parameters.

Server file management panel
Manage files — name, type, upload date, and size

In the file management panel, you can view all files on the server (name, file type, upload date, and size). You can delete one or more files as needed.

Upload restrictions

Enable upload restrictions, then define:

  • a maximum file size;
  • allowed or blocked file types.
Enable upload restrictions
Upload restrictions — check to enable restrictions
Upload restrictions — general configuration
Upload restrictions — size and type configuration

You can add a specific file type. Here, files with the .evi extension correspond to files encrypted with Freemindtronic extensions. Then click Add and Save.

Add .evi file type in upload restrictions
The new .evi extension appears in the configured type list

Good to know

The “Refresh” button at the top right of the panel updates storage statistics and lists after a change.

License details

The “License details” tab gathers information about your CryptPeer license: status, validity, functional scope and any limits for your edition.

The Super Admin can confirm the instance stays aligned with purchased rights without leaving the administration panel.

Super Admin panel — License details
License details

SMTP configuration

The “SMTP configuration” tab sets the mail server used for transactional email (notifications, alerts, password resets, etc.) from the instance.

Hosts, ports and authentication remain under your control on your infrastructure.

Super Admin panel — SMTP configuration
SMTP configuration

Sovereignty by Design

The Super Admin scope follows CryptPeer’s Sovereignty by Design doctrine: control, evidence and accountability belong entirely to the licensee, with no unilateral access by a third party.

Requests, logs, data supervision, storage, license and SMTP settings are therefore local, verifiable, sovereign control instruments.