For CIOs, CDOs & IT Leaders
OpsGrid reads from Business Central using your existing BC credentials and permission model. Nothing is extracted to an external data store. QHub Wiki AI runs entirely on your own server. Both products are designed for organisations where data sovereignty is non-negotiable.
Data architecture
OpsGrid connects to your BC tenant using the BC API and the service account credentials you provide. It reads from the operational tables you configure — nothing more. Data is retrieved at query time to generate a decision or answer, then released. There is no persistent data copy, no ETL, and no external warehouse.
Write operations are strictly bounded. OpsGrid can only write to the specific action types you explicitly enable — and every write requires a human approval event in Teams before anything is committed to BC.
Integration model
OpsGrid is not a generic ERP middleware layer. It was built specifically for the BC schema and permission model, and connects to Teams using standard webhook infrastructure.
OpsGrid is built for the BC schema — not a generic ERP abstraction. It uses BC's API, respects your existing permission model, and works with the table structure BC already uses. No schema mapping, no custom connectors, no middleware.
Decision cards and approval requests are delivered via Teams webhook. No new Teams apps, no additional licences, no changes to your Teams tenant configuration. Uses the notification and approval mechanisms Teams already provides.
QHub Wiki AI is fully self-hosted: WikiJS, Qdrant vector store, and the LLM connector all run on your own server. Apache 2.0 licence. Auditable codebase. No vendor-managed infrastructure involved in document retrieval or query answering.
What you control
OpsGrid is not a black box. You define the scope, the permission boundaries, the routing logic, and what gets logged. Your security team can audit every layer.
You provision the service account OpsGrid uses. You set the BC permissions. OpsGrid operates only within the scope you define — it cannot escalate its own access.
You configure which operational events trigger a decision card, which Teams channels receive them, and which users or roles see each type. No decisions surface outside the channels you specify.
High-value decisions can be routed to senior approvers. Routine decisions can be delegated. Escalation paths are defined in configuration, not hardcoded.
Every decision surfaced, every approval or rejection, every BC write — logged to the audit channel you designate. Exportable. Retainable under your own data retention policies.
Compliance and sovereignty
For organisations where a CIO or CDO must sign off on any AI deployment, these are the guarantees that matter.
$0 in BC writes without explicit human approval. The approval event is a prerequisite, not a courtesy — the write pathway is blocked until a named user approves in Teams.
The language model receives only the specific data chunks retrieved to answer a query. It has no persistent access to your BC data and does not store or train on your data between sessions.
QHub runs entirely on your infrastructure. If full on-premises deployment is a requirement for OpsGrid, talk to us — we can scope an architecture that keeps everything inside your perimeter.
QHub is Apache 2.0. The full codebase is auditable by your security team. No proprietary black boxes in the document retrieval or query answering pipeline.
Common questions
We walk through your BC environment, data governance constraints, and Teams setup — and map exactly what deployment looks like for your organisation.
Request an architecture overview →