Skip to main content

Introduction to Roles and Permissions


Collaboration of multi-role users is indispensable in enterprise applications. Each role has different operating permissions on enterprise data. The permission configuration in application is already very fine-grained and can also be customized.

Logic of Permission Configuration

User's permissions are associated with roles, where operation permissions are configured for a role, then the role is assigned to the user, and the user gets the permissions by becoming a member of the role. Such a permission design (RBAC design) is clear and easy to manage.

By configuring role permissions, you can realize the following:

  1. There are multiple worksheets in the application, but the user can only view a certain worksheet.

  2. There are multiple views in the worksheet, but the user can only see a certain view.

  3. There is a lot of data in the view, but the user can only view the data created by himself.

  4. Users can view all the data, but can only modify or delete their own relevant data.

  5. Some fields are hidden when the user views a row of record.

  6. When editing records, some fields can be edited, some fields can not.

  7. Users can only fill in a few fields when adding a new record.

  8. Users can't share or print when viewing records.


Have questions about this article? Send us feedback