TL;DR: Custom Tables let you store tabular data against a customer record.
Why Are Custom Tables Useful?
Custom Tables are designed to give administrators and end users the tools to tailor their data storage needs on The Layer. From secure password management to bespoke data structures, this feature is a game-changer for businesses aiming to streamline processes while maintaining top-tier security standards.
Custom-created table of TeamViewer connections for a customer, complete with auto-connect link
Custom-created UI for the data, auto-detecting URL and connection types
What Are Custom Tables?
Put simply, custom Tables are essentially collections of custom fields, allowing you to create and manage unique data sets tailored to your business needs. Whether you’re organising sensitive information, like passwords, or creating data structures for niche requirements, Custom Tables provide a robust solution.
Here are just a few use cases for Custom Tables 💡
Password Management: Use encrypted custom fields, and securely store customer credentials.
Specialised Data Storage: Capture and organise information that doesn’t fit into traditional CRM fields.
Process Tracking: Manage workflows, compliance records, or other operational data in one place.
Getting Started with Custom Tables
Setting up Custom Tables is straightforward and intuitive:
Navigate to Custom Tables: Locate the feature under the "Custom Fields" tab in your admin dashboard.
Create Your Table: Use the custom field editor to define your table’s structure, including fields for specific data types like passwords, text, or dates. Then create the custom tables in the custom tables manager.
Set Permissions: Control visibility and access for each field to ensure sensitive information is only accessible to authorised users. This can be done using the role option for custom fields, as pictured below.
Start Using Your Table: Populate your custom table with data and integrate it into your workflows seamlessly.
Access via API: You can even access these fields via the API to include in other applications if needed.
Security Highlights
Custom Tables aren’t just about flexibility—they’re designed with security in mind:
100% Secure Password Storage: Every password adheres to AES 256-bit encryption and uses a unique key.
Auditable Access: All access to password fields is logged, ensuring full visibility for administrators.
Controlled Visibility: Granular permission settings allow you to limit who can view or edit sensitive fields.
SSL Compliance: All connections to "The Layer" are SSL-encrypted, ensuring secure data transmission.
Success Metrics
Our goal is to ensure your data management processes are both efficient and secure. Here’s how we measure success:
Goal | Metric |
Secure Password Storage | 100% of passwords stored with AES 256-bit encryption and unique keys. |
Auditable Access | 100% of access to password fields audited and recorded. |
Controlled Visibility | 100% compliance with visibility restrictions for password fields. |
SSL Compliance | 100% of connections using SSL encryption. |
Why Choose Custom Tables?
Custom Tables combine adaptability with best-in-class security, making them the ideal choice for:
Businesses managing complex data requirements.
Administrators seeking secure, auditable solutions for sensitive data.
End users who need a simple, intuitive way to organize and access critical information.
Ready to take control of your data? Start using Custom Tables today and experience the difference.