Skip to main content
Table of Contents

Access Control & Permission Management in August

Access Control & Permission Management in August. Overview. Admins in August control workspace access through the Users and Roles pages. These tools define who can perform which actions, from basic uโ€ฆ

Hayden
Updated by Hayden

Access Control & Permission Management in August

Overview

Admins in August control workspace access through the Users and Roles pages. These tools define who can perform which actions, from basic user privileges to higher level administrative operations. Proper permission management ensures secure and compliant access across your firm.

Users Table

The Users table allows workspace admins to:

  • View every user in the workspace and see their assigned role such as User or Admin
  • See which features each user can access
  • Grant or revoke extra permissions beyond the base role so a user can receive limited elevated access without becoming a full admin
  • Export the user list as a CSV file for audits or record keeping

Filtering Users by Role or Permission

  1. Select Filters
  2. Choose the roles or permissions you want to filter by
  3. The table will update to show only users who match your selections

Granting Permissions to Users

  1. Select one or more users
  2. Select Manage Permissions and then Add Permissions
  3. Choose the permissions to grant. Permissions already held by all selected users will not appear
  4. Confirm your changes

The selected permissions will appear in the Extra Permissions column.

Revoking Permissions from Users

  1. Select the user or users
  2. Select Manage Permissions and then Remove Permissions
  3. Choose the permissions to revoke
  4. Confirm your changes

Modifying a User Role

  1. Select the user
  2. Open the Role dropdown and select a new role
  3. A confirmation dialog will appear. If moving the user to a lower privilege role, choose which extra permissions to keep or remove
  4. Select Update Role. Changes apply immediately

Roles Table

The Roles tab allows admins to manage role definitions.

Default Roles

Every workspace includes at least two roles: User and Admin.

Custom Roles

Admins can create up to five custom roles.

Assigning or Removing Permissions from Roles

  • To assign permissions: check the boxes for the role and select Save. All users in that role inherit the new permissions
  • To remove permissions: uncheck the boxes and save. The change applies to all users with that role

Creating a Custom Role

  1. Select Create Role
  2. Name the role and add a description
  3. Choose whether to base it on existing permissions or start fresh
  4. Select Add. The role becomes available immediately

Renaming a Custom Role

Only custom roles can be renamed.

  1. Select the edit arrow next to the role
  2. Update the name or description
  3. Submit the change

Deleting a Custom Role

  1. Select the role to delete
  2. If users are assigned to it, you will be asked to reassign them
  3. Confirm deletion

The role will be removed and users will be reassigned.

FAQs

Why use Extra Permissions Extra permissions give admins granular control and allow limited elevated access without granting full admin rights.

Can we create unlimited custom roles By default, workspaces support up to five custom roles. If more are needed, contact support or review workspace configuration.

Who can edit permissions or roles Only users with the Edit Permissions capability or equivalent access can modify roles and permissions. This should be limited to a small group of trusted admins.

What happens to extra permissions when a userโ€™s role changes You can choose whether to keep or remove extra permissions during the role change process. This provides flexibility and reduces the chance of accidental privilege increases.

Best Practices for Admins

  • Grant admin permissions only to essential personnel
  • Use role based permissions rather than many individual overrides
  • Use Extra Permissions for temporary or narrow access needs
  • Audit user lists and permissions regularly, especially after staffing changes
  • Export user lists for compliance, security review, or internal audits

How Did We Do?

Workspace Settings in August

Contact