Skip to main content

Advanced access control

At a glance

Beyond roles, advanced access control lets you adjust permissions on a per-member basis and restrict access to specific resources (spaces, data sources, documents, spreadsheets, calendars). Use individual overrides to grant or deny one-off permissions, and per-resource ACLs to protect sensitive data.

Practical example: an editor normally has access to all ontology spaces, but you want to block their access to the "Confidential HR" space. Add a deny override on ontology.view for that specific resource.

Before you begin

  • You must have the Owner or Administrator role to manage overrides and ACLs.
  • Roles and permissions must be configured.

Key vocabulary

TermMeaningExample
OverrideA permission adjustment specific to a member (grant or deny).Deny ontology.view for Marie
ACLAccess control list on a specific resource.Space "Finance": read access for Jean
GrantAdd a permission that the role does not provide.Give workflow.execute to a viewer
DenyRemove a permission despite the role.Block agent.execute for an editor
ExpirationDate on which an override automatically ceases.Temporary access until 03/31/2026

Steps

Manage per-member overrides

Overrides let you adjust a member's permissions without changing their role:

  1. Open Settings > Permissions > Members tab.
  2. Click on the relevant member.
  3. Scroll down to the Overrides section.
  4. For each permission, choose:
ActionEffectUse case
GrantThe member gains this permission in addition to their roles.Give temporary access to a module.
DenyThe member loses this permission even if their roles provide it.Block access to a sensitive module.
DefaultThe permission depends solely on assigned roles.Revert to standard behavior.
tip

A deny always takes priority. If a role grants ontology.edit but an override denies this permission, the member will not be able to edit the ontology.

Configure a temporary override

To grant time-limited access:

  1. Add a Grant override on the desired permission.
  2. Enable the Expiration option.
  3. Select the end date.
  4. Upon expiration, the override is automatically removed and the member reverts to their role-based permissions.

Example: an external contractor needs to execute workflows for 2 weeks. Grant workflow.execute with an expiration set to the last day of their assignment.

View effective permissions

The Effective permissions section displays the combined result of all roles and overrides for the member:

  1. Open the member's detail in the Members tab.
  2. Check the Effective permissions matrix at the bottom of the page.
  3. Each cell indicates whether the permission is active (coming from a role or an override).

Manage per-resource access (ACL)

ACLs control access to an individual resource, regardless of global permissions:

  1. Open Settings > Permissions > Data access tab.
  2. Select the resource type:
TypeDescriptionExample
SpacesOntology spaces (canvas).Space "Logistics"
SourcesLive Data data sources.Source "Supplier API"
DocumentsKnowledge base documents.Document "Internal procedures"
SpreadsheetsCollaborative spreadsheets.Spreadsheet "Budget 2026"
CalendarsShared calendars.Calendar "Team schedule"
  1. Enter the resource identifier.
  2. Click Load to see existing access entries.

Add access to a resource

  1. In the resource ACL view, click Add access.
  2. Select the member.
  3. Choose the access level:
LevelDescription
ViewRead-only on this resource.
EditRead and modify.
AdministerRead, modify, and manage access.
  1. Save. Access is applied immediately.

Remove access

  1. In the resource's access list, click the delete icon.
  2. Confirm the removal. The member immediately loses access to this resource.

How permissions are calculated

The priority order is as follows:

  1. Owner: full access (no restriction possible).
  2. Deny overrides: always take priority over roles.
  3. System + custom roles: permissions from all roles are combined.
  4. Grant overrides: add additional permissions.
  5. Per-resource ACLs: restrict access to individual resources.

Expected result

Your access is controlled at two levels: global permissions (roles + overrides) define what a member can do per module, while per-resource ACLs define which specific data they can act on. Every change is traced in the security logs.

Limitations and common errors

SituationSolution
A deny does not applyCheck that the member is not an Owner (owners have unrestricted full access).
The override has disappearedIt may have had an expiration date. Recreate it if necessary.
A member accesses an ACL-protected resourceVerify that the ACL is properly configured on that specific resource.
"Access denied" despite an editor roleCheck overrides: an individual deny takes priority over role permissions.
The ACL does not appearVerify that the resource exists and that the identifier is correct.

Switching workspaces

The workspace selector is located in the left sidebar, just below the logo. It lets you switch between your different workspaces in one click.

When you switch workspaces, the page automatically reloads to display the data from the new workspace. Your choice is remembered: on your next login, you will return to the last selected workspace.

ActionWho can do it?
Switch workspaceAll members
Create a workspaceOwner or Administrator
Manage workspacesOwner or Administrator

When the sidebar is collapsed, the workspace icon remains visible. Hover over it to see the name of the active workspace.

Need help?

Contact us: Support and contact.