Scaling Role-Based Access Control at PTC
Expanding access and empowering PTC teams to manage roles at scale.

Role
Lead Designer, PTC Atlas Team
Key Collaborators
Product, Engineering, Design, Tech Writing
Project Timeframe
June 2025 - October 2025
Challenge
PTC’s Operator Center is a core internal application used to manage customer organizations, licenses, and users across our SaaS platform.
Until recently, only a small group of Super Admins had full access — meaning that every support request, license lookup, or account fix had to flow through them.
This created bottlenecks, slow customer response times, and heavy dependency on a few technical users. At the same time, expanding access wasn’t as simple as flipping a switch — we needed a solution that balanced efficiency and security, giving more people visibility without compromising data integrity.
How can we safely expand access across PTC’s support and operations teams without introducing risk or administrative chaos?
Results
Authorized PTC Support can now access and leverage a subset of the features within PTC Operator Center without relying on a select few Super Admins.
The success of this project manifested into three key areas:
New support admin role with a role-specific UI
Operator management tool
Super admin activity audit log page
Super Admin Bottlenecks and Visibility Gaps
The Legacy Workflow
Only a small group of Super Admins could view or edit customer data across PTC’s SaaS environments, creating major bottlenecks for day-to-day support. Routine issues like resending invitations or checking account status had to go through these few users. The lack of visibility made customer response times slow and inconsistent. Our challenge was to expand access without compromising platform integrity or security.

Meet the Operators Who Needed Access
To address these gaps, we expanded Operator Center access to new personas across PTC, empowering each to act within the principle of least privilege.
I conducted seven semi-structured interviews with internal PTC teams - Support, Order Fulfillment, Product Management, and Cloud Services—to map their workflows and pain points. Each had different data needs but similar frustrations with dependency and visibility.
From this research, I defined four key personas and proposed tiered access levels aligned to their responsibilities. The insight: access should empower support, not endanger systems.
Support Operator
Role Summary:
Front-line technical support, responding to customer access and login issues.
Key Needs:
Quickly verify customer account and organization data
Resend activation emails or handle minor account tasks
Log activity in audit trail
Provisioning Operator
Role Summary:
Responsible for managing and provisioning specific customer organizations.
Key Needs:
Add or modify organizational configurations
Assign support access to team members
Track changes in audit logs
Super Admin
Role Summary:
Top-level operator managing platform governance and auditing all operator activity.
Key Needs:
Delegate responsibilities to other operators
Review operator activity and access levels
Maintain platform security and compliance
Product / Cloud Services Support
Role Summary:
Internal teams providing monitoring, product-specific support, and operational oversight.
Key Needs:
View account-level metrics and system logs
Identify performance or licensing issues
Provide customer guidance without Super Admin escalation
Learning from Industry Leaders
To ground our approach, I analyzed how Microsoft Azure, Google Cloud, and other enterprise tools manage role-based access. Their best practices emphasized clear role hierarchies, permission transparency, and auditable change histories. These insights helped us frame access management around visibility, accountability, and least privilege. It ensured our design aligned with enterprise security expectations while staying user-friendly.

Sketching, Testing, and Iterating
I mapped workflows for assigning, viewing, and auditing operator roles, then created low-fidelity wireframes to visualize potential flows. Working with stakeholders and engineers, I validated each step for feasibility and clarity. Early feedback highlighted the need for inline role descriptions and simplified navigation. Through multiple iterations, I refined the designs into a clean, scalable interface aligned with the PTC Design System.
Early expanded user management wireframing explorations with internal annotations and team feedback captured directly in Miro.

Giving the Right People the Right Access
The final solution introduced a clear role-based model: Support Access (read-only, limited actions), Provisioning Access (org-level control), and Super Admin Access (full management).
Added functionality and changes:
The existing pages would be modified to give appropriate permissions to these new, less privileged user base.
Support Admin role primarily gives users view-only privileges, which still allow them to view crucial organizational, user, and license details, all without the need of heavy modification.
Example Design Additions:
1. Organization Management
Organization management is a set of features only delegated to Super Admins, as any changes would drastically affect customer organizations' metadata.

2. License Management
License management is a set of features only delegated to Super Admins, as any changes would drastically affect customer organizations' product ownership.

3. Single Sign-on
Support Operators only receive view-only access when looking at the feature for setting up customer SSO capabilities, since customer authorization into PTC projects affects thousands of customers at once.

Managing Roles Without Losing Context
Previously, Super Admins relied on engineering to update operator access, creating bottlenecks and risk. I introduced a Role Management Table where admins can view all operators, roles, and metadata in one place. Each action—add, edit, or remove—opens a focused modal dialog, keeping users in context and reducing errors. This streamlined flow balances visibility, control, and security.

Building Trust Through Transparency
To support accountability and security, I designed an Audit Log Page that records every role or access change made by Super Admins. The table offers filters by user, date, and action type, giving teams a clear, traceable view of platform activity. Subtle visual hierarchy, timestamps, and status indicators make dense data easy to scan and interpret.
Each entry clearly shows:
What action was taken
Who performed it
Which user or role was affected
Whether the action succeeded or failed
This visibility reinforces confidence in delegated access and ensures alignment with enterprise compliance standards.

Measuring Success: Faster, Smarter, and Safer Support
With role-based access in place, support teams can now act immediately on customer issues without escalating to Super Admins. Administrative overhead dropped significantly, and response times improved. The audit trail feature strengthened compliance and accountability across internal users.
Early feedback from Super Admins and Support Operators confirmed that the new design improved visibility, reduced bottlenecks, and increased confidence in managing operator roles. Below are highlights from internal users describing the impact of these changes:
Reduced Turnaround Time
"Common support tasks can now be completed without waiting for a Super Admin."
Clearer Access Visibility
“I can immediately see who has which role and when changes were made.”
Improved Operator Management
"Assigning and managing access for new operators is now so simple. I can do it in seconds without leaving the table."
Laying the Foundation for Future Growth
This project established a scalable framework for role-based access across PTC’s applications. The next phase includes dynamic permissioning tied to backend APIs and eventual customer-led role management. By combining research-driven UX with technical alignment, we built a foundation for secure, flexible access that grows with the platform. It’s a long-term step toward a unified, democratized operations ecosystem.
Final Takeaways
This project reinforced the value of balancing flexibility, security, and visibility in internal tools. Close collaboration with engineering and iterative validation were essential for success. By empowering teams with clear role management and auditability, we improved operational efficiency and set a foundation for future role-based experiences across the platform.

Other projects

Single Sign-on Connection Manager
Streamlining customer SSO setup via the PTC Operator Center application.
Read More
OAuth 2.0 Client Integration Manager
Integrating customer 3rd-Party applications with PTC products through the PTC Admin Center application.
Read More
PTC Operator Center
Managing PTC customer organizations and licenses through an internal web application.
Read More
