Role types
WeavePulse includes four built-in roles designed around how intermediary grantee teams actually work. Each role has a defined set of permissions that controls what the user can see, edit, and administer.
Admin
Full access to all features, settings, and data. Can manage users, configure sub-grantees, run reports, and manage corrective actions. Typically the grant director or program manager.
Fiscal
Access to financial reports, budget data, and fiscal compliance. Can view and edit financial submissions, generate SF-425 reports, and review budget variances. Cannot modify program data or user settings.
Program
Access to programmatic data, performance measures, and service delivery metrics. Can enter data on behalf of sub-grantees, send reminders, and review completeness dashboards. Cannot access financial data or modify settings.
Read-only
View access to dashboards, reports, and sub-grantee data. Cannot edit, enter, or submit anything. Useful for board members, external monitors, or leadership who need visibility without the ability to modify.
Permission matrix
Permissions are additive — each role includes a defined set of capabilities. The admin role includes all permissions. Other roles include only what's relevant to their function. This prevents accidental edits, limits exposure of sensitive financial data, and satisfies the separation-of-duties requirements common in federal grant programs.
Audit trail
Every action in WeavePulse is logged with the user who performed it, the timestamp, and the specific change made. This applies to data entry, report generation, settings changes, and user management. The audit trail is immutable and available to admin users at any time.
During monitoring visits or audits, you can produce a complete record of who did what and when. This is especially important for “enter on behalf of” entries, corrective action assignments, and report submissions where accountability needs to be traceable to a specific individual.
Invitation flow
Adding a new user takes seconds. Enter their email, select a role, and optionally scope their access to specific sub-grantees or programs. They receive an email invitation with a link to set up their account. No IT department needed, no complex provisioning process.
When someone leaves or changes roles, admins can deactivate their account or modify their permissions immediately. Deactivated accounts retain their audit trail — you never lose the record of what they did while active.