Modules
Security Module
Protect your business data with enterprise-grade access control built directly into Rently. Restrict access by IP, by device, and by role, and add a second layer of identity verification with two-factor authentication.

Admin-Controlled
Every new login attempt can require administrator approval before access is granted. Review pending requests by email or from the Security panel, and approve or reject them instantly.

Device Management
See every device that has ever accessed your Rently system. Assign users to specific devices, define allowed IPs per device, and decide whether any given device can connect from unrestricted locations.

IP-based Access Control
Lock down access to your office network, your VPN, or any specific IP range. Users on restricted roles simply can't log in from unauthorized locations; no exceptions.

Role-based Security Settings
Security rules are defined at the role level. Configure connection permissions independently for each role, giving your team exactly the access they need, and nothing more.

Two-Factor Authentication
Add a second verification step at login, via SMS code or authenticator app. Even if a password is compromised, unauthorized users can't get in without the second factor.
Your system, your rules. Enforced automatically.
The Security Module puts your administrator in full control of who can access Rently, from which device, and from which location. When a user tries to log in from an unauthorized device or IP, the system blocks them, and notifies the admin.
No manual monitoring required. No relying on trust alone. Just clear, configurable rules that enforce themselves, so your sensitive data stays protected even as your team grows or works remotely.
Complete Access Security for Car Rental Operations

Access Request Workflow
New users can't just walk in. When access request approval is enabled for a role, every login attempt triggers an admin notification approve or reject from your inbox or directly from the Security panel.

Device Registry
Every device that connects to Rently is logged and visible. Assign nicknames, link users, and define allowed IPs per device. Know exactly what's touching your system at all times.

IP Whitelisting
Restrict specific roles to approved IP addresses only. Ideal for front-desk staff, branch managers, or any user who should only ever access the system from a known location.

Per-role Configuration
Security settings are applied role by role. Toggle whether a role can connect from any device or any IP, giving you surgical control over who gets what level of access.

Two-Factor Authentication
Require users to verify their identity with a second factor at every login, either through an SMS code sent to their phone or a time-based code from an authenticator app.

Managed in Minutes
No IT department required. The entire security configuration lives inside Rently's admin panel and can be set up and adjusted in just a few clicks. Built for operations teams, not engineers.
Schedule a Live Demo
See how the Security Module protects your system, your data, and your team — without getting in the way of the work.