Securing Your Process
Your📋 Function
now has a data model, a workflow, automations, and a user interface. This final design step is one of the most critical: securing the entire process to ensure the right people have the right access—and the right awareness—at all times.
This step involves two distinct activities: first, defining the “cast of characters” (Roles
) specific to your process, and second, assigning them their script (Permission
and Notification Schemes
).
Remember, this step is about applying governance, not building it from scratch. You will be using the
Permission & Notification Schemes
that were designed as a Tier 1 LEGO piece.Phase 1: Defining Function-Specific Roles
While your system hasGlobal Roles
(like Admin, Manager, Member), most business processes have their own unique set of actors. In this phase, you define these process-specific Roles
.
Think of Roles
as the job titles within your Function's
process. For a “Recruitment” Function
, you might create Roles
such as:
Hiring Manager
Recruiter
Interviewer
Compensation Approver
Roles
act as placeholders. You are defining the parts that need to be played. Later, when a ⏹️ Space
is created from this Function
, real Users
or Groups
will be assigned to fill these parts.
This approach makes your
Function
incredibly reusable. The same Function
can be used by different departments, each mapping their own people to the same set of defined Roles
. To refresh your understanding of how Roles
work, see our foundational guide on Users, Groups, and Roles.Phase 2: Applying Permission & Notification Schemes
Once yourRoles
are defined, you apply the rules that govern their behavior. This is done by selecting the appropriate Permission
and Notification Schemes
for your Function
.
Choosing a Permission Scheme
APermission Scheme
defines who can do what. In your Function
’s settings, you will select a scheme (either a built-in one like “Strict Access” or a custom one) from a dropdown. This scheme’s rules will then be mapped to the Roles
you just created.
Example:
- You select the “Strict Access”
Permission Scheme
. - This scheme contains a rule: “Only the
Role
named ‘Approver’ can perform theTransition
‘Approve Offer’.” - In your
Function
, you have created aRole
calledCompensation Approver
. - The system now understands that only the user(s) assigned to the
Compensation Approver
Role
in a liveSpace
will see the “Approve Offer” button.
Choosing a Notification Scheme
Similarly, aNotification Scheme
defines who knows what. You will select a scheme that dictates which actions trigger alerts for which Roles
.
Example:
- You select the “Notify key actions to key assignees”
Notification Scheme
. - This scheme has a rule: “When an
Object
’sStatus
changes, send a notification to theRole
‘Manager’.” - In your
Function
, you’ve defined theHiring Manager
Role
. - Now, every time a
Candidate
Object
changes status, the user mapped to theHiring Manager
Role
will automatically receive a notification.
This guide focuses on applying schemes within a
Function
. If the standard schemes don’t fit and you need to design a complex, custom scheme from the ground up, refer to our detailed guides:What’s Next?
Congratulations, yourFunction
blueprint is now complete! You’ve defined the entire process from data structure to security. The final step is to ensure everything works as expected before launching it to your teams.