The Rules Inside the Building
This is the final and most granular tier of Luklak’s security model. You have your campus ID (Business Privilege
) and the key to a specific building (Item Access
). Now, Permission Schemes define the rules inside that building. They control who can perform specific actions on the individual 🧊 Objects
within a ⏹️ Space
.
Permission & Notification
Defines your governance tier. Permission Schemes ensure the right people always have the right access to the data they work with, scaling with confidence.
📋 Function
, that automatically apply to all ⏹️ Spaces
created from that Function. This ensures that your business processes are executed consistently and securely.
The Anatomy of a Permission Scheme
Every rule within a Permission Scheme answers the fundamental question: “Who can do what?” It achieves this by connecting a specific Recipient (the “who”) to a specific Action (the “what”).Available Actions
These are the operations that users can perform on🧊 Objects
and ⏹️ Spaces
which you can grant or deny permission for:
- Space Actions: View Space
- Object Actions: View, Create, Delete, Edit, Transition Status
- Assignment Actions: Assign Users, Set Dates, Link Objects
- Communication Actions: Send Messages, Delete Messages, Add/Remove Attachments
Available Recipients
These are the different ways you can define “who” gets the permission. This flexibility allows for incredibly powerful and dynamic security models.- Roles: The most flexible method. Grant permission to an abstract
Role
like “Project Manager” or “Approver”. You then map actual users to that Role in each⏹️ Space
. - Specific Users & Groups: The most direct method. Grant permission to a named person or a predefined
Group
(e.g., “Finance Department”). - Dynamic User & Group Fields: The most powerful method for object-level security. Grant permission to the user(s) or group(s) listed in a field on the Object itself. For example, only the person listed in the
Assignee
field can edit theObject
. - Special Recipients: Includes the
Creator
of theObject
andAll members
of the business.
Built-in Schemes for Quick Setup
For common scenarios, Luklak provides four pre-configured Permission Schemes you can apply to any📋 Function
for rapid setup.
- Fully open: All business members can view the
Space
and allObjects
inside. Only people directly assigned to anObject
can update it. - Broad access: All
Roles
within theSpace
can view theSpace
and allObjects
inside. Only direct assignees can update anObject
. - Moderate restriction: All
Roles
can view theSpace
, but only people directly assigned to anObject
can view or update it. - Strict access: All
Roles
can view theSpace
, but only direct assignees can view anObject
, and only key assignees can update it.
Creating a Custom Permission Scheme
When the built-in options aren’t enough, you can design your own scheme with precise rules.What’s Next?
You have now mastered all three layers of permission control. The final piece of the governance puzzle is managing how your team is notified of actions.- Complete your governance setup: Managing Alerts with Notification Schemes
- Review the role of Roles: Managing People: Users, Groups, and Roles
- Go back to the overview: Return to the Permissions Overview