Documentation Index Fetch the complete documentation index at: https://docs.figr.design/llms.txt
Use this file to discover all available pages before exploring further.
Permissions Management
Set up comprehensive permission systems that align with your team structure and project requirements. Control who can access, edit, and share designs while maintaining security and workflow efficiency.
Permission Hierarchy
Organization Level
Top-level access control: Organization permissions: Owner permissions :
- Full organization control
- Billing and subscription management
- User invitation and removal
- Security policy configuration
- Data export and deletion
Admin permissions :
- User role management
- Project creation and deletion
- Team structure organization
- Integration configuration
- Security setting management
Member permissions :
- Project participation
- Design creation and editing
- Team collaboration
- Asset usage and sharing
- Limited administrative tasks
Team Level
Department and group access control: Design Team
Product Team
Engineering Team
Design team structure :
Design Lead :
- Full design project access
- Design system management
- Team member oversight
- Client communication
- Quality assurance control
Senior Designer :
- Project leadership capabilities
- Mentoring permissions
- Design system contributions
- Cross-team collaboration
- Advanced tool access
Designer :
- Design creation and editing
- Team project participation
- Asset library access
- Feedback and review
- Standard tool features
Design Intern :
- Supervised design access
- Learning project participation
- Feedback submission
- Basic tool functionality
- Mentorship program access
Product team integration :
Product Manager :
- Requirements documentation
- Design review and approval
- Stakeholder communication
- Project priority setting
- Cross-functional coordination
Product Owner :
- Feature specification access
- User story management
- Acceptance criteria definition
- Sprint planning participation
- Design validation
Business Analyst :
- Requirements analysis
- Design impact assessment
- Stakeholder feedback collection
- Process documentation
- Compliance verification
Development team access :
Tech Lead :
- Technical feasibility review
- Implementation planning
- Resource estimation
- Team coordination
- Architecture decisions
Senior Developer :
- Design specification access
- Component implementation
- Technical feedback provision
- Code review participation
- Mentoring responsibilities
Developer :
- Implementation-focused access
- Asset download capabilities
- Specification viewing
- Bug reporting access
- Code generation tools
Project Level
Granular project access control:
Project-specific permissions :
Project Owner :
- Full project control
- Permission management
- External sharing control
- Archive and deletion rights
- Budget and resource allocation
Project Manager :
- Timeline and milestone management
- Team coordination
- Stakeholder communication
- Progress tracking
- Resource request capabilities
Lead Contributor :
- Design direction setting
- Quality standard enforcement
- Team guidance provision
- Client interaction
- Final approval authority
Contributor :
- Active design participation
- Collaborative editing
- Feedback and review
- Asset creation and modification
- Documentation contributions
Reviewer :
- Design review and approval
- Feedback provision
- Comment and annotation
- Version comparison
- Quality assurance participation
Viewer :
- Read-only project access
- Design viewing and navigation
- Basic commenting (if enabled)
- Export capabilities (if enabled)
- Progress monitoring
Content-specific access :
Design Files :
- Create, edit, delete designs
- Version control access
- Duplication and templating
- Cross-project copying
- Archive management
Asset Libraries :
- Asset upload and management
- Library organization
- Usage tracking and analytics
- License management
- Quality control
Design Systems :
- Component creation and editing
- Token management
- Pattern library maintenance
- Documentation updates
- Distribution control
Documentation :
- Specification writing
- Process documentation
- Guidelines creation
- Training material development
- Knowledge base maintenance
Advanced Permission Features
Conditional Permissions
Dynamic Permissions
Permission Templates
Context-aware access control:
Time-Based Access Temporal permission control:
Business hours restrictions
Project phase limitations
Deadline-driven access
Seasonal adjustments
Emergency override protocols
Location-Based Access Geographic permission control:
Office network requirements
Regional access restrictions
Remote work policies
Client site limitations
Compliance zone enforcement
Conditional access examples: Project phase access :
Discovery phase : Broad team access
Design phase : Design team focus
Review phase : Stakeholder inclusion
Implementation phase : Developer priority
Launch phase : Limited access
Content sensitivity :
Public designs : Open team access
Client confidential : Restricted access
Internal only : Employee limitation
Executive review : Leadership access
Legal review : Compliance team access
Automated permission adjustments: Automation triggers: Project lifecycle automation :
- Automatic role assignments
- Permission escalation rules
- Access removal triggers
- Review cycle permissions
- Archive access management
User behavior adaptation :
- Activity-based access expansion
- Inactivity-triggered restrictions
- Quality-based privilege adjustments
- Collaboration-driven permissions
- Performance-linked access levels
Integration-driven changes :
- Calendar-based access windows
- Task management integration
- Approval workflow triggers
- Notification-driven permissions
- External tool synchronization
Standardized permission sets:
Pre-configured role permissions :
Design Director Template :
- Full design system access
- All project oversight
- Team management capabilities
- Client communication rights
- Strategic planning access
Junior Designer Template :
- Supervised design access
- Learning project participation
- Peer review capabilities
- Asset library usage
- Mentorship program inclusion
Client Reviewer Template :
- Project-specific viewing
- Commenting capabilities
- Approval workflow participation
- Export limitations
- Time-bounded access
Project-specific permission sets :
Client Project Template :
- Restricted external sharing
- Enhanced security measures
- Audit trail requirements
- Confidentiality controls
- Limited download permissions
Internal Project Template :
- Open team collaboration
- Broad sharing capabilities
- Flexible access controls
- Standard security measures
- Enhanced creative freedom
Open Source Template :
- Public viewing capabilities
- Community contribution features
- Attribution requirements
- License compliance
- Version control integration
Permission Management Workflows
User Onboarding
Streamlined permission assignment: Automated Assignment
Manual Verification
Onboarding automation :
Role detection :
- Email domain analysis
- Department identification
- Seniority level assessment
- Team structure mapping
- Historical pattern matching
Permission application :
- Template-based assignment
- Gradual access provision
- Probationary limitations
- Mentorship pairings
- Training requirement integration
Human oversight process :
Identity verification :
- Manager approval requirements
- HR department confirmation
- Security clearance validation
- Contract status verification
- Compliance training completion
Access validation :
- Permission level appropriateness
- Project relevance assessment
- Security requirement compliance
- Business need justification
- Timeline limitation setting
Permission Reviews
Regular access auditing:
Automated Reviews Systematic permission auditing:
Quarterly access reviews
Unused permission detection
Over-privileged user identification
Compliance violation flagging
Risk assessment automation
Manual Reviews Human-driven validation:
Manager-led team reviews
Project-based access audits
Security team assessments
Compliance officer reviews
Executive oversight processes
Permission Changes
Managed access modifications:
Permission increase process :
Request initiation :
- Self-service request forms
- Business justification requirements
- Timeline specification
- Risk assessment inclusion
- Alternative consideration
Approval workflow :
- Manager authorization
- Security team review
- Business owner approval
- Risk assessment validation
- Implementation scheduling
Permission removal triggers :
Immediate revocation :
- Employment termination
- Security policy violations
- Project completion
- Role changes
- Compliance requirements
Gradual reduction :
- Project phase transitions
- Responsibility changes
- Performance-based adjustments
- Seasonal access patterns
- Cost optimization measures
Security and Compliance
Enterprise Security
Compliance Frameworks
Advanced security features: Security measures: Access control :
- Multi-factor authentication
- Single sign-on integration
- Session management
- Device registration
- Network restrictions
Monitoring and logging :
- Real-time access monitoring
- Permission change tracking
- Suspicious activity detection
- Compliance violation alerting
- Incident response automation
Data protection :
- Encryption at rest and transit
- Data loss prevention
- Backup and recovery
- Geographic restrictions
- Retention policy enforcement
Industry standard compliance:
SOC 2 Type II requirements :
- Security principle implementation
- Availability assurance measures
- Processing integrity controls
- Confidentiality protection
- Privacy safeguard implementation
Control implementation :
- Access control procedures
- Change management processes
- Monitoring and logging systems
- Incident response protocols
- Risk assessment frameworks
GDPR requirement fulfillment :
- Lawful basis documentation
- Consent management systems
- Data subject rights implementation
- Privacy by design principles
- Data breach notification procedures
Technical measures :
- Data minimization practices
- Purpose limitation enforcement
- Storage limitation controls
- Accuracy maintenance procedures
- Security of processing measures
Sector compliance :
Healthcare (HIPAA) :
- PHI protection measures
- Access control requirements
- Audit log maintenance
- Business associate agreements
- Risk assessment procedures
Financial (SOX) :
- Internal control documentation
- Financial reporting accuracy
- Change management procedures
- Access control reviews
- Segregation of duties
Government (FedRAMP) :
- Security control implementation
- Continuous monitoring
- Incident response procedures
- Configuration management
- System and information integrity
Permission Analytics
Usage Analytics Permission utilization insights:
Access frequency patterns
Permission utilization rates
User activity correlations
Resource usage optimization
Cost-benefit analysis
Security Metrics Security posture monitoring:
Permission violation tracking
Access anomaly detection
Compliance score monitoring
Risk exposure assessment
Incident response metrics
Best Practices
Principle of Least Privilege
Minimal necessary access: ✅ Grant minimum required permissions
✅ Regular permission reviews and cleanup
✅ Time-limited access for temporary needs
✅ Role-based rather than individual permissions
✅ Clear documentation of permission rationale
Permission Governance
Systematic permission management: ✅ Clear permission policies and procedures
✅ Regular training on permission best practices
✅ Automated permission monitoring and alerting
✅ Integration with HR and IT systems
✅ Documentation of permission decisions
User Experience Balance
Security without friction: ✅ Intuitive permission request processes
✅ Clear communication of access limitations
✅ Self-service options where appropriate
✅ Transparent approval workflows
✅ Helpful error messages and guidance
Enable Real-Time Collaboration Learn how to set up live co-editing and real-time collaboration features for seamless teamwork. Co-Editing Live →