The Key to Your Buildings
After a user enters the platform with their Business Privilege (Tier 1), the next layer of security determines what they can interact with. This is Item Access Management.
Item Access Control
The granular permission system that controls who can view, use, edit, or manage a specific “Item” (like a
Function
or Dashboard
).What is an “Item”?
This is a critical distinction. In the context of Item Access Management, an “Item” is a high-level, structural component of your system, not the individual🧊 Objects
(like tasks or deals) that your team works on day-to-day. Access to those is handled by Tier 3: Permission Schemes.
Item Access Management gives you contextual control over the containers, blueprints, and shared resources that define your workspaces.
📋 Functions
⏹️ Spaces
📂 Areas
👥 Groups
(Controlling who can manage the group’s membership)Dashboards
Saved Filters
Item Permission Levels
When you grant a User or Group access to an Item, you assign them one of three permission levels.Crucial Distinction: These Item-level roles (
Admin
, Manager
, Member
) are assigned per Item and are completely separate from a user’s system-wide Business Privilege
. For example, a user can be a Member
of the system but an Admin
of a specific Dashboard
.- Admin: Full control over the Item. An
Admin
can manage the Item’s content, settings, and its access controls (i.e., they can add or remove other Admins, Managers, and Members). - Manager: Can manage the Item’s content and settings but cannot change its access controls. For example, a
Manager
of aDashboard
can add or remove charts, but cannot change who is allowed to see thatDashboard
. - Member: Can view or use the Item but cannot change its content or settings. This is the standard “read-only” or “user-level” access.
How to Manage Item Access
As a best practice, we recommend assigning access to
Groups
whenever possible, rather than to individual Users
. If a team member’s role changes, you only need to update their Group membership, and all their Item Access permissions will update automatically.What’s Next?
Now that you can control access to the “buildings” on your campus, it’s time to manage the rules inside them.- Proceed to the final tier: Tier 3: Granular Control with Permission Schemes
- Review the first tier: Tier 1: System Access with Business Privileges
- Go back to the overview: Return to the Permissions Overview