ORG User Experience
ORG stands for the middle platform department. It is located between the front-end and back-end, connecting various business systems, data resources, and services within AfterShip. Through the middle platform architecture, AfterShip can achieve interoperability between different business systems and data resources, avoiding isolation and fragmentation between various products/business systems, and improving business synergy and efficiency.

[fig 3]
During my time in ORG, I have conducted a lot of user experience design work to improve the usability of middle platform components, including refining the SSO process and designing 2FA, as well as developing the product management architecture for the Company-Store provided to enterprise users. These efforts have played a crucial role in the development of the middle platform.
SSO & 2FA
For AfterShip, which has numerous products, requiring users to log in to different products with different account passwords can be inconvenient, including but not limited to increasing the burden of password management for users, reducing work efficiency, and potentially creating security risks. However, adopting SSO can effectively solve these problems, providing a more convenient, efficient, and secure login and work experience.

[fig 4]
SSO (Single Sign-On) is an identity authentication service that allows users to log in to multiple related but independent software systems or applications using a set of credentials such as a username and password. Through SSO, users and user members can achieve unified management and verification of user identity. This means that once users log in through the main system, they can access other related systems without having to re-enter account passwords or other credentials. This helps to reduce the risk of password leakage and abuse, and improves the overall security of the system.

[fig 5]
To ensure the security of user data, providing a more secure two-factor authentication (2FA) method is crucial. In the design, we not only consider a single SSO login, but also focus on the 2FA function. By providing 2FA capability to users, we can further enhance the security of their accounts and ensure that only authorized users can access their accounts. At the same time, we also consider the possibilities of loss or appeal that users may encounter and have included corresponding closed-loop mechanisms in the design to ensure that users can resolve problems promptly and effectively when they occur. Such design not only improves the user experience, but also provides an important guarantee for the security of user data.

[fig 6]
Provide a company-level management platform

[fig 7]
For many companies, leveraging various products from AfterShip to foster business growth is commonplace. Among these firms, major clients such as Dyson, wineshipping, GYMSHACK, and others are prevalent. When navigating between headquarters and various sales nodes, these significant clients may face the challenge of bulk managing numerous AfterShip ORGs. To address this issue, AfterShip has introduced a company-level management platform.

[fig 8]
For many companies, leveraging various products from AfterShip to foster business growth is commonplace. Among these firms, major clients such as Dyson, wineshipping, GYMSHACK, and others are prevalent. When navigating between headquarters and various sales nodes, these significant clients may face the challenge of bulk managing numerous AfterShip ORGs. To address this issue, AfterShip has introduced a company-level management platform.
In addressing cross-ORG management, it's imperative to consider the varied management needs of different types of clients. All clients require access to business and analytical data, encompassing data from individual ORGs as well as aggregated data from all ORGs. However, the configuration requirements for individual ORGs may differ among clients. Thus, offering comprehensive individual ORG configuration options is necessary to meet the diverse needs of different clients.
In implementing cross-ORG management, it is essential to consider data isolation and security to ensure that data from different ORGs does not interfere with each other. At the same time, providing flexible configuration and permission controls is necessary to ensure that only authorized personnel can engage in cross-ORG management. This approach enables us to meet the diverse needs of various clients, offering them comprehensive and customized management services.
To assist users in better understanding their permission levels, we have designed multiple permission levels based on Role-Based Access Control (RBAC). RBAC is a widely used access control strategy in information security management, allowing organizations to manage permissions based on roles assigned to users.