Configuring User Permissions
Overview
User permissions determine the data a user can access and how they can interact with events and actions.
Permissions are managed by Organization Administrators in Settings → Organization.
Managing User Permissions
User permissions can be edited by selecting the edit icon next to a user in the user grid.
The following permissions can be configured per user:
Confidential Access
Determines whether the user can:
View events marked as Confidential
Mark events as Confidential
Confidential Event Attachments Access
Determines whether the user can:
View event attachments marked as Confidential
Mark event attachments as Confidential
Email Integration Review Access
Determines whether the user can review all email integration events that are pending initial review.
By default, only the user who forwarded the email can view and perform the initial review.
Enabling this permission allows the user to review any pending email integration event.
Event Roles
Each user is assigned an Event Role, which controls their overall level of access to event data and settings.
Administrator
Can add, edit, and delete all event data
Can manage event-related settings
Editor
Can add and edit all event data
Can manage most event-related settings
Contributor
Can view and edit only events where they are involved
A user is considered involved when they are:
Tagged in the event description, or
Tagged in event comments, or
Assigned to an event or action
Viewer
Can view event data
Cannot create or edit events
Event Category Permissions
In addition to event roles, permissions can be configured at the event category level.
Category permissions apply regardless of the user’s event role.
Enabling Can view for a category allows the user to:
View events in that category
Create events in that category
Edit events in that category
Important Notes
Event category permissions are evaluated in addition to event roles.
If a user does not have access to a category, events in that category will not be visible to them, even if their role would otherwise allow access.