Skip to content

Admin & Contact Management Technical Overview

This screen allows the user to add and manage contacts that are authorized to receive notifications from the Smarta platform. It provides a secure interface for administrators to configure contact preferences, including email, SMS, and Telegram notifications.

Key Functionalities

Authorized Contacts Management

  • Contact Retrieval:

    • Contacts are securely fetched from the backend service using authenticated requests.
    • The user can pull down to refresh the contact list, ensuring that the displayed data is up to date.

    Contact Management
    Admin screen for managing contacts

  • Adding New Contacts:

    • Administrators can add new contacts by providing a name and an email address.
    • Input validation ensures that all required fields are completed before submission.
    • Upon successful submission, the new contact is registered with the backend and the interface provides immediate feedback.

    Contact Management
    Add a contact to manage the device

  • Contact Deletion:

    • Administrators have the ability to remove contacts from the system.
    • The deletion process involves a secure backend call to ensure that the removal is properly authenticated and logged.

Contact Preferences and Settings

  • Real-Time Configuration:
    • Each contact’s communication preferences can be managed through an interactive modal interface.
    • Preferences include options for receiving notifications via Email, SMS, and Telegram.
  • Toggle Controls:

    • Administrators can quickly enable or disable each communication channel through simple toggle switches.
    • Changes are immediately transmitted to the backend, ensuring that updates are reflected in real time.

    Contact Management
    Configure contact preferences for notifications

  • Feedback and Error Handling:

    • The module provides clear on-screen feedback and alerts for successful actions as well as any encountered errors.
    • Error handling is robust, ensuring that administrators are informed of issues such as failed network requests or invalid input.

Secure Access & Authentication

  • Secure Data Handling:

    • The system uses secure storage mechanisms to retrieve user authentication tokens.
    • All communications with backend endpoints are authenticated, ensuring that only authorized administrators can modify contact settings.
  • Session Management:

    • Administrators have access to a logout option that cleanly terminates their session, maintaining overall system security.