Master the granular permission system that controls what users can access and do within your Devdraft application. Permissions provide fine-grained access control for maintaining security while enabling productivity.

What are Permissions?

Individual atomic capabilities that control access to specific features and data within Devdraft. Permissions are the building blocks used to create custom roles, allowing precise control over what team members can see and do.

Quick Setup

Understand permissions in under 5 minutes:
1

Access Permission Overview

Navigate to App Settings → Members → Create Role to see permissions
2

Explore Permission Categories

Review the organized permission groups
3

Understand Dependencies

Learn how permissions relate to each other
4

Apply to Roles

Use permissions to build effective role configurations

Permission Categories

Company and Configuration Management:
  • View Business Information: Access company details and settings
  • Edit Business Details: Modify company information and branding
  • Manage Business Verification: Handle KYC and compliance processes
  • Configure Business Settings: Update operational configurations
Use Cases:
  • Admin roles managing company information
  • Finance teams handling verification
  • Operations staff updating settings

Permission Dependencies

Permission Levels and Scope

View-Only Access:
  • Safe for stakeholders and auditors
  • No risk of data modification
  • Good for reporting and analysis roles
  • Compliance-friendly access level
Examples:
  • View Customers
  • View Transactions
  • View Products
  • View Team Members

Permission Best Practices

1

Apply Principle of Least Privilege

Minimal Access Strategy:
  • Grant only permissions needed for specific job functions
  • Start with basic permissions and add as needed
  • Regular review and adjustment of permission sets
  • Document permission justifications
It’s easier to add permissions later than to remove excessive permissions that users have become accustomed to.
2

Group Related Permissions

Logical Permission Sets:
  • Bundle related permissions in roles
  • Consider workflow requirements
  • Maintain functional coherence
  • Plan for permission evolution
Grouping related permissions makes role management easier and reduces the chance of missing critical access rights.
3

Monitor Permission Usage

Track Permission Effectiveness:
  • Monitor which permissions are actually used
  • Identify unused or overused permissions
  • Adjust roles based on usage patterns
  • Optimize permission assignments
Unused permissions may indicate over-privileged roles or changed business processes that require role updates.

Common Permission Patterns

Read-Only Analyst

View permissions for customers, transactions, products, and reports without modification rights

Customer Service Rep

View and edit customers, view transactions, process refunds, but no system configuration

Product Manager

Full product management, view customers and transactions, no financial operations

Finance Specialist

Transaction management, refunds, financial reports, customer view access

Permission Validation Rules

Permission Categories Deep Dive

Money and Transaction Control:

Advanced Permission Concepts

1

Permission Inheritance

Role-Based Inheritance:
  • Permissions flow from roles to users
  • Multiple role assignments combine permissions
  • Inheritance follows additive principle
  • No permission conflicts in inheritance
Users with multiple roles receive the union of all permissions from their assigned roles.
2

Contextual Permissions

Situation-Aware Access:
  • Some permissions may have contextual limitations
  • Business rules can modify permission effectiveness
  • Time-based or condition-based restrictions possible
  • Dynamic permission evaluation for complex scenarios
3

Permission Auditing

Access Tracking:
  • All permission usage is logged
  • Permission changes are tracked
  • Usage patterns are monitored
  • Compliance reporting is generated
Permission auditing helps maintain security and provides evidence for compliance requirements.

Troubleshooting Permissions

Understanding permissions is crucial for effective team management and security. Use permissions strategically to balance access needs with security requirements.