Governance & Insights

Roles & Permissions

Control access with precision. Define custom roles, set granular permissions, and ensure users only see and do what they need to. Built on the principle of least privilege.

Roles and Permissions platform
By Business Need

Comprehensive Access Control

Everything you need to manage who can access what across your organisation.

Custom Roles

Create roles that match your organisational structure. Define permissions once, assign to users as needed. No limit on the number of custom roles.

Granular Permissions

Control access at the field level. Determine who can view, create, edit, or delete specific data types across any Hykmah product.

Role Inheritance

Build role hierarchies where child roles inherit permissions from parents. Simplify management at scale without duplicating permission sets.

Team-Based Access

Organise users into teams with shared permissions. Assign by department, project, geographic region, or any organisational grouping.

Data-Level Security

Restrict access to specific records based on attributes. Users only see data relevant to their role — own records, team records, or organisation-wide, configurable per entity.

Time-Based Access

Grant temporary permissions that automatically expire. Perfect for contractors, auditors, or seasonal staff.

How It Works

Setting Up Access Control

Our intuitive interface makes it easy to configure even complex permission structures.

Step 1

Define Your Roles

Create roles that reflect your organisation. Use pre-built templates for common roles (Admin, Manager, Staff, Field Technician, Read-Only Viewer) or create custom roles from scratch.

Step 2

Configure Permissions

For each role, specify what actions users can perform. The permission matrix shows access across all features and data types in one view — click to grant or revoke.

Step 3

Assign Users

Add users to roles individually or in bulk. Users can have multiple roles, and permissions combine automatically using the most permissive setting.

Step 4

Review & Monitor

Use access reports to review who has access to what. Identify over-privileged users, detect orphaned permissions, and run access certification campaigns for compliance.

Technical Details

Access Control Architecture

Permission Types

  • Create - Add new records
  • Read - View existing data
  • Update - Modify records
  • Delete - Remove data
  • Execute - Run actions and workflows
  • Share - Grant access to others

Scope Controls

  • Global - Access all records
  • Organisation - own organisation's records only
  • Team - Assigned team records
  • Owner - Own records only
  • Custom - Attribute-based rules

Advanced Features

  • Attribute-based access control (ABAC)
  • Conditional permissions triggered by data values
  • IP-based access restrictions
  • Time-bound access grants
  • Approval workflows for sensitive actions

Management Tools

  • Bulk user role assignment
  • Role cloning and templates
  • Permission comparison tool (side-by-side role diff)
  • Access certification campaigns
  • Orphan permission detection

Pre-Built Role Templates

Start quickly with roles designed for common business functions.

System Administrator

Full access to all features, settings, and data. Can manage users, configure integrations, and access all reports.

  • Full system configuration
  • User and role management
  • All data access

Account Manager

Manage customer accounts and relationships. Access to customer data, orders, and communication history.

  • Customer record management
  • Order and invoice access
  • Communication logging

Finance User

Manage financial operations including invoicing, payments, and revenue reporting. No access to system configuration or user management.

  • Invoice and payment processing
  • Financial reporting
  • Revenue data access

Operations Manager

Manage day-to-day operations including jobs, scheduling, and resource allocation.

  • Job and task management
  • Schedule configuration
  • Resource assignment

Field Technician

Mobile-focused role for field staff. Access to assigned jobs, customer details, and time tracking.

  • Assigned job access only
  • Time and expense entry
  • Communication logging

Read-Only Viewer

View-only access to records and reports. Cannot create, edit, or delete any data across the platform.

  • Read-only data access
  • Report viewing
  • No configuration access
Products

Access Control Across All Products

Unified permission management across your entire Hykmah deployment.

Control technician access to jobs, customer data, and pricing. Restrict based on territory, skill level, or assignment.

View Operon

Isolate franchise data by location while giving corporate users visibility across the network. Role hierarchies mirror franchise structure.

View Franchex

Manage member data access for staff, volunteers, and board members with appropriate visibility levels per organisational role.

View Membrify
Related Capabilities

Works Best With

Roles & Permissions integrates with these platform capabilities for end-to-end access governance.

Audit Trail & Data Governance

Complete visibility into every action taken in your system. Tamper-proof logging for compliance and investigations.

Learn More →

Workflow Orchestration

Build automated workflows with approval steps that respect role-based permissions — ensuring the right people approve sensitive actions.

Learn More →

Document & Template Management

Centralised document storage with access controls inherited from the roles and permissions model.

Learn More →

Ready to Control Your Access?

Talk to our team about setting up role-based access control for your organisation.

Book a Technical Discussion