Roles & Permissions

Stay in complete control of who can view and modify your data

Roles & Permissions
Roles and permissions feature
ACCESS MANAGEMENT

Security & control

Keep your data secure and your team productive with powerful roles and permissions. Easily control who can access, edit and delete your data, and ensure your team has the right level of access to get their job done.
  • Role-based access control

    Create roles that align with your business job titles, and assign permissions to suit your business needs.

  • Workflow integration

    Use roles alongside workflows to ensure the right people play their part in your processes.

  • Granular permissions

    Control who can view, edit, delete, and export records with precision and clarity.

BENEFITS

Roles and permissions enable you to...

Control access and maintain security while keeping your team productive

Align with your business

Create roles that match your organisation's job titles and responsibilities.

Assign clear permissions

Gain clarity on who can do what within your system, preventing confusion and errors.

Control collection access

Decide precisely which roles have access to which collections of data.

Protect sensitive data

Control who can view, edit, delete, and export records to maintain data integrity.

Ensure productivity

Give team members exactly the access they need to perform their jobs efficiently.
Task list
PROCESS SECURITY

Workflow integration

Designed to work seamlessly with your existing workflows, permissions ensure the right people can play their part in your business processes.
  • Stage-based access

    Control who can view and edit records at each stage of your workflow for better process management.

  • Rule enforcement

    Set up rules, approvals, and signatures as part of your processes to maintain compliance.

  • Targeted visibility

    Ensure team members only see records relevant to their role for increased focus and security.

Data Protection

Keep your information secure, and stay compliant

As an administrator, you can set up robust permissions, protecting access to sensitive information while maintaining operational flexibility.

Access control

Restrict who can import, export, or delete data, safeguarding your information from unauthorised access.

Full audit logging

Monitor your team's usage of Kinabase with comprehensive activity logs that track all changes.

Compliance ready

Remain compliant with industry regulations like GDPR, ISO 9001, and ISO 27001 with our secure framework.

Cyber Essentials Plus CertificationISO 9001 Certification
Background image

Ready to take control of your data security?

Start using Kinabase roles and permissions to protect your information
FAQs

Frequently asked questions

How granular are the permissions in Kinabase?

Kinabase offers highly granular permissions that can be configured at multiple levels. You can control access at the collection level, record level, and even field level. For each level, you can specify who can view, create, edit, delete, and export data.

Can I create custom roles that match my organisation structure?

Yes, Kinabase allows you to create custom roles that align with your organisation's specific job titles and responsibilities. Each role can have a unique set of permissions, making it easy to give team members exactly the access they need to perform their jobs effectively.

How do permissions integrate with workflows?

Permissions in Kinabase can be linked to workflow stages, allowing you to control who can access records at different stages of your business processes. For example, you can ensure that only finance team members can see deals in the financial approval stage.

Does Kinabase provide audit logging for security purposes?

Yes, Kinabase includes comprehensive audit logging that tracks all significant actions within the system. This includes who viewed, created, edited, or deleted records, when these actions occurred, and what specific changes were made, helping you maintain compliance and security oversight.