The Rules Inside the Building
This is the final and most granular tier of Luklak’s security model. You have your campus ID (Business Privilege) and the key to a specific building (Item Access). Now, Permission Schemes define the rules inside that building. They control who can perform specific actions on the individual 🧊 Objects within a ⏹️ Space.
Permission & Notification
Defines your governance tier. Permission Schemes ensure the right people always have the right access to the data they work with, scaling with confidence.
📋 Function, that automatically apply to all ⏹️ Spaces created from that Function. This ensures that your business processes are executed consistently and securely.
The Anatomy of a Permission Scheme
Every rule within a Permission Scheme answers the fundamental question: “Who can do what?” It achieves this by connecting a specific Recipient (the “who”) to a specific Action (the “what”).Available Actions
These are the operations that users can perform on🧊 Objects and ⏹️ Spaces which you can grant or deny permission for:
- Space Actions: View Space
- Object Actions: View, Create, Delete, Edit, Transition Status
- Assignment Actions: Assign Users, Set Dates, Link Objects
- Communication Actions: Send Messages, Delete Messages, Add/Remove Attachments
Available Recipients
These are the different ways you can define “who” gets the permission. This flexibility allows for incredibly powerful and dynamic security models.- Roles: The most flexible method. Grant permission to an abstract
Rolelike “Project Manager” or “Approver”. You then map actual users to that Role in each⏹️ Space. - Specific Users & Groups: The most direct method. Grant permission to a named person or a predefined
Group(e.g., “Finance Department”). - Dynamic User & Group Fields: The most powerful method for object-level security. Grant permission to the user(s) or group(s) listed in a field on the Object itself. For example, only the person listed in the
Assigneefield can edit theObject. - Special Recipients: Includes the
Creatorof theObjectandAll membersof the business.
Built-in Schemes for Quick Setup
For common scenarios, Luklak provides four pre-configured Permission Schemes you can apply to any📋 Function for rapid setup.
- Fully open: All business members can view the
Spaceand allObjectsinside. Only people directly assigned to anObjectcan update it. - Broad access: All
Roleswithin theSpacecan view theSpaceand allObjectsinside. Only direct assignees can update anObject. - Moderate restriction: All
Rolescan view theSpace, but only people directly assigned to anObjectcan view or update it. - Strict access: All
Rolescan view theSpace, but only direct assignees can view anObject, and only key assignees can update it.
Creating a Custom Permission Scheme
When the built-in options aren’t enough, you can design your own scheme with precise rules.What’s Next?
You have now mastered all three layers of permission control. The final piece of the governance puzzle is managing how your team is notified of actions.- Complete your governance setup: Managing Alerts with Notification Schemes
- Review the role of Roles: Managing People: Users, Groups, and Roles
- Go back to the overview: Return to the Permissions Overview