Guides

Permission Management

Managing user permissions in OLAF ensures that users have the appropriate level of access within applications. This guide covers how to add users, assign them to applications, create custom groups and permissions, and configure roles.


1. Adding Users to Your Organization

To manage permissions effectively, you must first add users to OLAF.

  • Navigate to ManagementUsers.
  • Click Add User to invite new users by email.
  • Once invited, users will receive an email to activate their account.

Tip

Users must be added to the system before they can be assigned to specific applications.


2. Assigning Users to Applications

After adding users, they must be assigned to the relevant applications.

  • Navigate to Applications and select the desired application.
  • Open the Users Tab.
  • Click Add Users to assign them to the application.

This ensures that users can authenticate and interact with the assigned application.


3. Creating Custom Groups and Permissions

OLAF allows you to define granular permissions and organize them into groups for better access control.

  • Navigate to Applications and select the desired application.
  • Open the Permissions Tab.
  • Create a Custom Group to organize related permissions.
  • Define specific Custom Permissions within the group.

Warning

Custom permissions must be inside a group before they can be assigned to users.


4. Assigning Roles and Permission Groups

Once permissions and groups are defined, you can assign them to users.

  • Go to ManagementUsers.
  • Click the Edit button next to a user.
  • Open the Permissions Tab.
  • Assign the user a Role (Owner/Member).
  • Select appropriate Permission Groups to grant access.

Users inherit all permissions within their assigned groups, ensuring scalable access management.


Best Practices

  • Follow the Principle of Least Privilege (PoLP) – Assign only the permissions users need to perform their tasks.
  • Use Groups Instead of Individual Permissions – Makes it easier to manage and update access controls.
  • Regularly Audit User Permissions – Periodically review roles and assignments to maintain security.
Previous
Organizations