security Role-based Access Control
Keep your business information safe and organized with smart permissions that ensure everyone sees exactly what they need to see - nothing more, nothing less.
verified_user Your Business, Your Rules
Think of access control like the keys to different rooms in your office building. Some people get keys to everything, others only to their department, and some just to their own workspace. It's that simple, but much more powerful.
Keep Secrets Safe
Salary information, client contracts, and strategic plans stay with the people who need to know
Reduce Information Overload
Show people only what's relevant to their job, so they can focus on what matters
Stay Compliant
Meet industry regulations and audit requirements with proper data access controls
group User Roles in Your Organization
Mynix recognizes that different people need different levels of access to get their work done. Here's how our role hierarchy works:
admin_panel_settings Admin (Organization Owner)
The organization admin has full control over the entire Mynix workspace, including all departments, users, and system settings.
What they can do:
- check_circle Access all departments and data
- check_circle Create and delete departments
- check_circle Manage all user accounts
- check_circle See company-wide analytics
- check_circle Change system settings
supervisor_account Department Admin
Department heads who oversee their specific department's operations, workflows, and team members.
What they can do:
- check_circle Manage their department's workflows
- check_circle Add and remove department team members
- check_circle View department analytics
- check_circle Create department processes
- remove_circle Limited access to other departments
dashboard Board/Project Admin
Project managers and team leads who manage specific boards, projects, or workflows within their department.
What they can do:
- check_circle Manage their assigned projects
- check_circle Assign tasks to team members
- check_circle View project performance
- remove_circle Limited to their project scope
- remove_circle Cannot change department settings
person Normal User
Regular team members who work on assigned tasks and contribute to projects within their department or team.
What they can do:
- check_circle Work on assigned tasks
- check_circle Update their work status
- check_circle Collaborate with teammates
- check_circle View relevant project information
- remove_circle No administrative privileges
person_outline Guest (Coming Soon)
External collaborators like clients, contractors, or partners who need limited access to specific projects.
What they will be able to do:
- visibility View shared projects only
- comment Add comments and feedback
- timer Time-limited access
- remove_circle No internal system access
- remove_circle Cannot see other guests' work
visibility Three Levels of Business Privacy
Not all business information is created equal. Some things should be public knowledge, others need to be restricted, and some should stay completely private. Here's how Mynix handles it:
public Public Information
Everyone in your organization can see this information. Think company announcements, general policies, or shared resources.
Perfect for:
- campaign Company newsletters
- event Team events and meetings
- policy General policies and guidelines
- library_books Training materials and resources
group Private to Team
Only people in specific departments or teams can access this. Most of your day-to-day work falls into this category.
Perfect for:
- task Project workflows and tasks
- people Client contact information
- trending_up Department performance data
- schedule Team schedules and deadlines
lock Confidential
Only specific individuals can see this information. Usually sensitive business data that requires special authorization.
Perfect for:
- attach_money Salary and compensation data
- description Legal contracts and agreements
- analytics Financial reports and forecasts
- psychology Strategic planning documents
person_add When You Need to Include Outsiders
Sometimes you need to collaborate with people who aren't full-time employees - clients, consultants, contractors, or partners. Guest access lets you include them safely.
how_to_reg How Guest Access Works
Invite by Email
Send a simple invitation to their email address
Time-Limited Access
Set expiration dates for guest accounts
Limited View
They only see what you specifically share with them
Easy Revocation
Remove access instantly when the project ends
people_outline Common Guest Scenarios
scenarios Real-World Access Control Scenarios
Here's how different types of businesses typically set up their access controls to protect what matters most:
Marketing Agency
Each client's campaigns and data stay completely separate, while account managers can oversee multiple client accounts.
- Account Managers: See all their clients' projects
- Designers: Only see projects they're assigned to
- Clients: Guest access to their own campaigns only
- CEO: Overview of all accounts and performance
Healthcare Practice
Patient privacy is critical, so access is strictly controlled based on who needs to see what information.
- Doctors: Access to their patients' complete records
- Nurses: View current patients they're caring for
- Front Desk: Scheduling and basic contact info only
- Billing: Insurance and payment information only
Software Company
Development teams work on different products, but everyone shares company resources and knowledge base.
- Developers: Full access to their product's codebase
- Product Managers: Cross-team visibility for planning
- QA Team: Access to multiple products for testing
- Sales: Product demos and feature information only
Financial Services
Strict compliance requirements mean access is carefully controlled and everything is tracked for auditing.
- Advisors: Their clients' portfolios and planning data
- Compliance: Read-only access to all client interactions
- Support: Basic account info and service history
- Management: Aggregated performance and risk data
checklist Setting Up Access Control That Actually Works
The best access control system is one that people actually follow. Here's how to set it up so it helps rather than hinders your team's work:
start Phase 1: Planning
- Map your organization: List all departments, teams, and key roles
- Identify sensitive information: What data needs special protection?
- Define access needs: Who needs to see what to do their job?
- Consider external needs: Will you have guests, contractors, or clients?
build Phase 2: Implementation
- Start simple: Begin with basic roles and expand later
- Test with a small group: Make sure it works before rolling out
- Train your team: Explain why access control matters
- Monitor and adjust: Fine-tune based on real-world usage
explore Next Steps in Securing Your Business
Department Setup
Organize your teams and departments effectively
Organize arrow_forward