Overview
The permission system provides fine-grained access control across different resources in your organization. It's built around three main concepts:
- Companies: The top-level organization unit
- Resource Groups: Collections of resources that can be managed together
- Users: Individual members with specific permissions
Available Resources
The system controls access to the following resources:
-
Datasources
- Create, read, update, and delete datasources
- Query datasources for information
- Access is restricted by company and resource group
-
Users
- Manage user accounts within your company
- Users can always read and update their own information
- Admin users can manage other users in their company
-
Resource Groups
- Create and manage groups of resources
- Organize permissions and access control
- Restricted to company level
-
Roles
- Define sets of permissions
- Assign roles to users
- Manage at company level
-
Content & Workflows
- Create and manage content and workflows
- Access controlled by company and resource group
- Full CRUD operations available
-
Companies
- View and update company information
- Restricted to company administrators
Permission Types
Each resource supports different types of permissions:
-
Basic Operations
- create: Create new resources
- read: View existing resources
- update: Modify existing resources
- delete: Remove resources
-
Special Operations
- access: General access to specific applications (Statistics)
- query: Special ability to search inside datasources
- export: Export data (for Statistics)
Access Control Rules
-
Company-Level Control
- Users can only access resources within their company
- Company ID is automatically checked for all operations
-
Resource Group Restrictions
- Many resources are further restricted by resource groups
- Users must have appropriate resource group access
-
Self-Management
- Users can always manage their own profile
- Special permissions exist for self-service operations
Best Practices
-
Resource Groups
- Use resource groups to organize related resources
- Assign users to specific resource groups based on their needs
-
Role-Based Access
- Create roles for common permission sets
- Assign users to roles instead of individual permissions
-
Principle of Least Privilege
- Grant minimum necessary permissions
- Regularly review and audit access
Security Notes
- All permissions are enforced server-side
- Access tokens are required for authentication
- Internal service communications use secure headers