T
TimeWatch Office · Admin

Sign in

Enter your admin credentials.

Privacy notice

Change your password

You must set a new password before continuing.

Dashboard

Open shifts
Flagged events
Corrections
Failed PIN tries

Open shifts

employees who clocked in but didn't clock out
EmployeeSinceOpen hours

Attendance summary

Export CSV
EmployeeInOutHours

Employees

Add employee

All employees

NameEmailBadgeStatus

Kiosks

Add kiosk

All kiosks

NameOfficeSessionsStatusLast seen

Device sessions

Pick a kiosk above to see its device sessions.

LabelIPCreatedLast seenStatus

Events

Export CSV
TimeEmployeeEventOfficeKioskConfFlags

Suspicious activity

Flagged events
Very short gaps
Outside office hours
Locked out now

Flagged events

TimeEmployeeEventConfFlags

Currently locked out

EmployeeFailed (last 10 min)Locked until

Repeated failed PIN attempts

EmployeeAttemptsLast attempt

Recent failed attempts

TimeEmployeeIPReason

Yards (geofence)

Add yard

A yard is a circular geofence around the office. Clock-ins outside the circle are flagged.

Existing yards

OfficeNameLat,LonRadius (m)Active

Identity review

Correction proposals

Propose a correction

Any manager+ can propose. A different admin or owner must approve.

Pending

CreatedEmployeeTypeProposed timeByReason

Recently decided

DecidedEmployeeStatusByNote

Users

Add user

Only owners can add users.

New users must change their password on first login.

All users

EmailRoleStatusPW

Backup & export

Exports

All exports are filtered by the date range above.

Daily ledger checksums (preview)

Publish these to make tampering with past events detectable: anyone who keeps a copy can re-verify the chain later.

DateEventsSHA-256HMAC

Database backup

The application stores all attendance data in PostgreSQL. To back up:

  1. Take a logical dump with pg_dump:
    pg_dump "$DATABASE_URL" --no-owner --no-privileges \
      --file=backup-$(date +%F).sql
  2. Store the dump in encrypted off-site storage (S3 SSE, GCS CMEK, etc.).
  3. Schedule daily: cron / managed service / hosting provider's backup tool.
  4. Quarterly: verify a restore into a staging database and run /api/admin/verify-ledger/:employeeId on a few employees to confirm the hash-chain is intact.
  5. Also export the daily ledger checksums (button at left) and store them separately from the dump — that way a tampered restore can't quietly rewrite history.

The APP_SECRET / LEDGER_SECRET / BADGE_SECRET are not in the database. Back them up via your secrets manager.

Audit log

TimeUserActionEntityIP