Securing Your Process
Your📋 Function now has a data model, a workflow, automations, and a user interface. This final design step is one of the most critical: securing the entire process to ensure the right people have the right access—and the right awareness—at all times.
This step involves two distinct activities: first, defining the “cast of characters” (Roles) specific to your process, and second, assigning them their script (Permission and Notification Schemes).
Remember, this step is about applying governance, not building it from scratch. You will be using the 
Permission & Notification Schemes that were designed as a Tier 1 LEGO piece.Phase 1: Defining Function-Specific Roles
While your system hasGlobal Roles (like Admin, Manager, Member), most business processes have their own unique set of actors. In this phase, you define these process-specific Roles.
Think of Roles as the job titles within your Function's process. For a “Recruitment” Function, you might create Roles such as:
Hiring ManagerRecruiterInterviewerCompensation Approver
Roles act as placeholders. You are defining the parts that need to be played. Later, when a ⏹️ Space is created from this Function, real Users or Groups will be assigned to fill these parts.
This approach makes your 
Function incredibly reusable. The same Function can be used by different departments, each mapping their own people to the same set of defined Roles. To refresh your understanding of how Roles work, see our foundational guide on Users, Groups, and Roles.Phase 2: Applying Permission & Notification Schemes
Once yourRoles are defined, you apply the rules that govern their behavior. This is done by selecting the appropriate Permission and Notification Schemes for your Function.
Choosing a Permission Scheme
APermission Scheme defines who can do what. In your Function’s settings, you will select a scheme (either a built-in one like “Strict Access” or a custom one) from a dropdown. This scheme’s rules will then be mapped to the Roles you just created.
Example:
- You select the “Strict Access” 
Permission Scheme. - This scheme contains a rule: “Only the 
Rolenamed ‘Approver’ can perform theTransition‘Approve Offer’.” - In your 
Function, you have created aRolecalledCompensation Approver. - The system now understands that only the user(s) assigned to the 
Compensation ApproverRolein a liveSpacewill see the “Approve Offer” button. 
Choosing a Notification Scheme
Similarly, aNotification Scheme defines who knows what. You will select a scheme that dictates which actions trigger alerts for which Roles.
Example:
- You select the “Notify key actions to key assignees” 
Notification Scheme. - This scheme has a rule: “When an 
Object’sStatuschanges, send a notification to theRole‘Manager’.” - In your 
Function, you’ve defined theHiring ManagerRole. - Now, every time a 
CandidateObjectchanges status, the user mapped to theHiring ManagerRolewill automatically receive a notification. 
This guide focuses on applying schemes within a 
Function. If the standard schemes don’t fit and you need to design a complex, custom scheme from the ground up, refer to our detailed guides:What’s Next?
Congratulations, yourFunction blueprint is now complete! You’ve defined the entire process from data structure to security. The final step is to ensure everything works as expected before launching it to your teams.