Policies and Permissions
Learn how to use the advanced policies and permissions system in the CDP to manage roles, access, and security controls.
Policies and Permissions
Our platform provides a comprehensive policies and permissions system that gives you enterprise-grade control over user access and capabilities within your organization. This system includes predefined user roles, custom policy creation, individual user permission management, and robust security controls.
Policy Management
Create and manage custom policies to define specific permission sets for different user groups:
Custom Policy Creation
Define policies with descriptive names and purposes to help identify their intended use cases. Policies can be created to match specific business requirements, compliance needs, or team structures.
Granular Permission Control
Configure individual permissions within each policy, including specific actions like:
allowedEvent:find
- View allowed event detailsallowedEvent:create
- Create new allowed eventsallowedEvent:delete
- Delete allowed eventsallowedEvent:update
- Modify existing allowed eventsallowedEvent:list
- List all allowed events
Permission Categories
Organize permissions by categories and actions to streamline policy configuration and management:
- Event Management: Control access to event creation, viewing, editing, and deletion
- Billing: Manage billing information access and modifications
- Consent Settings: Control consent management and configuration capabilities
- User Management: Manage user invitations, role assignments, and account modifications
- Organization Settings: Control organization-level configuration and management
- Data Access: Manage access to sensitive data and PHI-related information
PHI Access Tracking
Monitor which permissions include access to Protected Health Information (PHI) for compliance and security oversight. This feature helps organizations maintain HIPAA compliance and track access to sensitive healthcare data.
Policy Assignment
Easily assign multiple policies to individual users, providing flexible and comprehensive access control. Users can have multiple policies applied, with permissions being evaluated based on the combined policy set.
User Permission Management
Manage individual user permissions with precision:
Individual User Configuration
Configure permissions for each user independently, allowing for highly customized access control that matches specific job responsibilities and security requirements.
Inline Permission Editing
Modify user permissions directly through an intuitive interface with search and filtering capabilities. The interface provides real-time feedback and clear indicators of permission changes.
Permission Summary
View comprehensive summaries of allowed and denied permissions for each user, including PHI access tracking. This provides clear visibility into what each user can access and helps with compliance audits.
Audit Trail
Track all permission changes with detailed logging for compliance and security purposes. Every permission modification is recorded with timestamp, user, and change details.
Best Practices
Policy Design
- Create policies based on job functions rather than individual users
- Use descriptive names that clearly indicate the policy's purpose
- Regularly review and update policies as organizational needs change
Updated 9 days ago