Roles & Permissions
Control access with precision. Define custom roles, set granular permissions, and ensure users only see and do what they need to. Built on the principle of least privilege.
Comprehensive Access Control
Everything you need to manage who can access what across your organisation.
Custom Roles
Create roles that match your organisational structure. Define permissions once, assign to users as needed. No limit on the number of custom roles.
Granular Permissions
Control access at the field level. Determine who can view, create, edit, or delete specific data types across any Hykmah product.
Role Inheritance
Build role hierarchies where child roles inherit permissions from parents. Simplify management at scale without duplicating permission sets.
Team-Based Access
Organise users into teams with shared permissions. Assign by department, project, geographic region, or any organisational grouping.
Data-Level Security
Restrict access to specific records based on attributes. Users only see data relevant to their role — own records, team records, or organisation-wide, configurable per entity.
Time-Based Access
Grant temporary permissions that automatically expire. Perfect for contractors, auditors, or seasonal staff.
Setting Up Access Control
Our intuitive interface makes it easy to configure even complex permission structures.
Define Your Roles
Create roles that reflect your organisation. Use pre-built templates for common roles (Admin, Manager, Staff, Field Technician, Read-Only Viewer) or create custom roles from scratch.
Configure Permissions
For each role, specify what actions users can perform. The permission matrix shows access across all features and data types in one view — click to grant or revoke.
Assign Users
Add users to roles individually or in bulk. Users can have multiple roles, and permissions combine automatically using the most permissive setting.
Review & Monitor
Use access reports to review who has access to what. Identify over-privileged users, detect orphaned permissions, and run access certification campaigns for compliance.
Access Control Architecture
Permission Types
- Create - Add new records
- Read - View existing data
- Update - Modify records
- Delete - Remove data
- Execute - Run actions and workflows
- Share - Grant access to others
Scope Controls
- Global - Access all records
- Organisation - own organisation's records only
- Team - Assigned team records
- Owner - Own records only
- Custom - Attribute-based rules
Advanced Features
- Attribute-based access control (ABAC)
- Conditional permissions triggered by data values
- IP-based access restrictions
- Time-bound access grants
- Approval workflows for sensitive actions
Management Tools
- Bulk user role assignment
- Role cloning and templates
- Permission comparison tool (side-by-side role diff)
- Access certification campaigns
- Orphan permission detection
Pre-Built Role Templates
Start quickly with roles designed for common business functions.
System Administrator
Full access to all features, settings, and data. Can manage users, configure integrations, and access all reports.
- Full system configuration
- User and role management
- All data access
Account Manager
Manage customer accounts and relationships. Access to customer data, orders, and communication history.
- Customer record management
- Order and invoice access
- Communication logging
Finance User
Manage financial operations including invoicing, payments, and revenue reporting. No access to system configuration or user management.
- Invoice and payment processing
- Financial reporting
- Revenue data access
Operations Manager
Manage day-to-day operations including jobs, scheduling, and resource allocation.
- Job and task management
- Schedule configuration
- Resource assignment
Field Technician
Mobile-focused role for field staff. Access to assigned jobs, customer details, and time tracking.
- Assigned job access only
- Time and expense entry
- Communication logging
Read-Only Viewer
View-only access to records and reports. Cannot create, edit, or delete any data across the platform.
- Read-only data access
- Report viewing
- No configuration access
Access Control Across All Products
Unified permission management across your entire Hykmah deployment.
Control technician access to jobs, customer data, and pricing. Restrict based on territory, skill level, or assignment.
Isolate franchise data by location while giving corporate users visibility across the network. Role hierarchies mirror franchise structure.
Manage member data access for staff, volunteers, and board members with appropriate visibility levels per organisational role.
Works Best With
Roles & Permissions integrates with these platform capabilities for end-to-end access governance.
Audit Trail & Data Governance
Complete visibility into every action taken in your system. Tamper-proof logging for compliance and investigations.
Workflow Orchestration
Build automated workflows with approval steps that respect role-based permissions — ensuring the right people approve sensitive actions.
Document & Template Management
Centralised document storage with access controls inherited from the roles and permissions model.
Ready to Control Your Access?
Talk to our team about setting up role-based access control for your organisation.
Book a Technical Discussion