How data and requests move through the platform: user requests, event-driven flows, and key paths.
User (Browser / App)
│
▼
Portal (Admin / Driver / Employee / Customer / Vendor)
│ HTTPS
▼
API Gateway / Backend Server
│ Auth + RBAC check
▼
Business Logic & Workflow Engine
│
▼
Database (read/write) ──► Audit log (where applicable)
All portal actions that create, update, or delete data go through the backend API. Access is enforced by role and permission checks at route and API level.
Database / Business Event
│
▼
Event Bus (e.g. AWS EventBridge)
│
├──► Notification service (in-app, SMS, email)
├──► Document lifecycle (expiry, reminders, escalations)
└──► Workflow / approval triggers
Sensitive operations are gated by authentication and RBAC. Critical actions can be written to an audit log for traceability. Data in transit uses HTTPS; credentials and secrets are managed outside the application code.