-
What are Roles and Permissions in KEBS?
Roles and Permissions in KEBS define what each user can view, edit, and manage within the platform. This role based access control framework ensures that the right people have access to the right data and actions, protecting sensitive business information and enforcing governance across the organization.
To configure them, navigate to .
-
What standard roles are available in KEBS?
KEBS provides a set of predefined roles to address common organizational needs, including:
- Administrator: Full access to all modules and settings.
- Super User: Broad access with some restrictions on global settings.
- Manager: Access to team data, project tracking, and approvals.
- Employee: Access to assigned tasks, timesheets, and personal profile.
- Finance User: Access to billing, invoicing, and financial reports.
- Collaborator: Limited access to assigned projects and shared resources.
-
Can I create custom roles in KEBS?
Yes. Administrators can create custom roles tailored to specific organizational requirements. Navigate to , define the role name, and assign granular permissions across modules. Custom roles can then be applied to users like any predefined role.
-
How granular are KEBS permissions?
KEBS supports granular, field level permissions. Administrators can control access to specific modules, sub modules, actions (view, create, edit, delete, approve, export), and even individual data fields such as salary, billing rate, and contract value. This level of granularity ensures precise governance.
-
How do I assign a role to a user?
Navigate to , select the user, click Edit Profile, and choose the appropriate role from the dropdown. Save the changes, and the new role takes effect immediately. Users may need to refresh their session to see the updated access.
-
Can a user have multiple roles in KEBS?
Yes. KEBS supports multi role assignments where a user can be assigned more than one role to cover different responsibilities. For example, a user could be both a project manager and a finance approver. Effective permissions are determined by combining all assigned roles.
-
How do permissions work across KEBS modules?
Permissions in KEBS span all five core modules: CRM, Deal Management, Resource Management, Project Management, Finance Management, and Ticket Management. Administrators can configure access to each module independently, ensuring users only see data relevant to their role.
-
Can I restrict access to sensitive financial or HR data?
Yes. Administrators can restrict visibility of sensitive fields such as employee compensation, deal value, customer revenue, project margins, and bank details. Only users with the appropriate role permissions can access this information, ensuring confidentiality.
-
Can collaborators manage their own resource allocations?
Yes, if enabled by administrators. Collaborators can be granted permission to view and manage their own allocations under . By default, only administrators and super users perform resource allocation, but this can be customized to meet organizational needs.
-
How does role based access apply to dashboards and reports?
Dashboards and reports respect role based permissions throughout KEBS. Users see only the data they are authorized to view. For example, a project manager sees data for their projects, while a business unit head sees data across their entire business unit. This ensures consistent governance from operational details to executive views.
-
Can I clone an existing role to create a new one?
Yes. To save time, administrators can clone an existing role and modify it as needed. Navigate to , select the role, choose Clone, and update the permissions for the new role. This is especially useful for creating variations of similar roles.
-
How are permissions audited and tracked?
Every permission change in KEBS is logged in the audit trail. Navigate to to view who made what change, when, and to whom. This supports both internal governance and external compliance reviews such as ISO 27001 and SOC 2 Type 2 audits.
-
Can I delegate permission management to other admins?
Yes. KEBS supports multiple administrators within an organization. The primary admin can grant role management permissions to other trusted users, allowing distributed governance while still maintaining oversight through audit logs.
-
What happens when a user’s role is changed?
When a user’s role is changed, their permissions update immediately. Any data, modules, or actions outside the new role’s scope become inaccessible. Historical data they previously created is retained for compliance, but visibility now follows the new role’s permission rules.
-
Can permissions be set for client or customer users?
Yes. KEBS supports external user permissions, allowing customers or partners to access specific modules through controlled views. Permissions can be configured to allow customers to view project status, raise tickets, or interact with shared resources while restricting access to internal data.
-
How do I review existing role configurations?
Navigate to to view a list of all roles defined in your organization. Selecting any role displays its detailed permission matrix across modules, making it easy to review and refine access policies.
-
Can I disable a role without deleting it?
Yes. KEBS allows administrators to disable roles temporarily without losing the configuration. This is useful when a role is being restructured or paused. Disabled roles cannot be assigned to users until they are reactivated.
-
Are KEBS roles compliant with global security standards?
Yes. The KEBS role based access framework is designed to meet global enterprise security standards. KEBS is ISO 27001 certified, AICPA SOC 2 Type 2 compliant, and GDPR aligned, ensuring permission management meets stringent regulatory requirements.
-
How do roles work with SSO and identity providers?
KEBS supports automatic role mapping when SSO is enabled. Administrators can configure mapping rules so that users provisioned through identity providers such as Azure Active Directory, Okta, or Microsoft 365 are automatically assigned the correct KEBS role based on their group membership in the identity provider.
-
How do I get started with Roles and Permissions in KEBS?
Getting started is simple. Request a demo through the KEBS website and our implementation team will guide you through role design, permission mapping, custom role creation, and integration with your identity provider. Most organizations complete role configuration within a few days with ongoing support from the KEBS team.
Roles & Permissions FAQs
7 min read
Updated on May 20, 2026
Powered by BetterDocs



