Modules

Security Module

Protect your business data with enterprise-grade access control built directly into Rently. Restrict access by IP, by device, and by role, and add a second layer of identity verification with two-factor authentication.

Request a live demo  
iconadmin.png

Admin-Controlled

Every new login attempt can require administrator approval before access is granted. Review pending requests by email or from the Security panel, and approve or reject them instantly.

iconapp.png

Device Management

See every device that has ever accessed your Rently system. Assign users to specific devices, define allowed IPs per device, and decide whether any given device can connect from unrestricted locations.

iconpracticalblue.png

IP-based Access Control

Lock down access to your office network, your VPN, or any specific IP range. Users on restricted roles simply can't log in from unauthorized locations; no exceptions.

iconflow.png

Role-based Security Settings

Security rules are defined at the role level. Configure connection permissions independently for each role, giving your team exactly the access they need, and nothing more.

iconsecurity2.png

Two-Factor Authentication

Add a second verification step at login, via SMS code or authenticator app. Even if a password is compromised, unauthorized users can't get in without the second factor.

Your system, your rules. Enforced automatically.

The Security Module puts your administrator in full control of who can access Rently, from which device, and from which location. When a user tries to log in from an unauthorized device or IP, the system blocks them, and notifies the admin.

No manual monitoring required. No relying on trust alone. Just clear, configurable rules that enforce themselves, so your sensitive data stays protected even as your team grows or works remotely.

Request a live demo

Complete Access Security for Car Rental Operations

iconflow.png

Access Request Workflow

New users can't just walk in. When access request approval is enabled for a role, every login attempt triggers an admin notification approve or reject from your inbox or directly from the Security panel.

iconmonitor.png

Device Registry

Every device that connects to Rently is logged and visible. Assign nicknames, link users, and define allowed IPs per device. Know exactly what's touching your system at all times.

iconlock.png

IP Whitelisting

Restrict specific roles to approved IP addresses only. Ideal for front-desk staff, branch managers, or any user who should only ever access the system from a known location.

iconadmin1.png

Per-role Configuration

Security settings are applied role by role. Toggle whether a role can connect from any device or any IP, giving you surgical control over who gets what level of access.

iconsecurity2.png

Two-Factor Authentication

Require users to verify their identity with a second factor at every login, either through an SMS code sent to their phone or a time-based code from an authenticator app.

iconfast.png

Managed in Minutes

No IT department required. The entire security configuration lives inside Rently's admin panel and can be set up and adjusted in just a few clicks. Built for operations teams, not engineers.

Schedule a Live Demo

See how the Security Module protects your system, your data, and your team — without getting in the way of the work.

Powered by BuilderDuck [ Rently Soft ]© 2026 | All rights reserved