Settings
Configure organization-wide defaults, manage your team, customize notifications, and set up security policies. All settings are scoped to your organization and require Admin role access.
On this page
Organization profile
Navigate to Agency → Settings → Organization to manage:
- Company name — appears on vendor notifications and exported documents.
- Country of registration — used for legal and compliance references.
- Primary contact email — the default reply-to address for platform emails.
- Company logo — PNG or SVG, max 2 MB. Displayed on emails and exported PDFs.
Users & roles
Invite team members from Settings → Users & Roles. PortTask uses strict Role-Based Access Control (RBAC):
Full access: billing, organization settings, user management, and all operational features.
Can create and manage port calls, service orders, and vendor relationships. Cannot change billing or org settings.
Can view all records but cannot create or modify anything. Useful for auditors or management oversight.
To invite a new user, click Invite User, enter their email, select a role, and send. They will receive an invitation email to create their account.
Notification preferences
Configure which events trigger notifications from Settings → Notifications. Options include:
Email notifications
Port call status changes, vendor responses, SLA breaches, and new service requests.
In-app notifications
Real-time bell icon alerts for all platform activity. Customizable per event type.
Each user can also customize their personal notification preferences from their profile settings, overriding the organization defaults.
Port directory
Manage the ports your organization operates in from Settings → Ports. For each port, you can configure:
- Port name, UN/LOCODE, and country
- Default vendors for each service type at that port
- Port-specific compliance requirements
- Local timezone (used for scheduling calculations)
Security settings
From Settings → Security, administrators can manage:
- Password policy — minimum length, complexity requirements, and expiration period.
- Two-factor authentication (MFA) — enforce MFA for all users or specific roles.
- Session management — configure idle timeout and maximum session duration.
- Audit log — view a complete history of all security-relevant events (logins, role changes, data exports).
Was this page helpful?