Permissions
Configure role-based access control. Define what each team member can see and do within your workspaces.
Overview
WallJobs AI uses role-based access control (RBAC) to manage what users can see and do. Permissions are granted through roles at both organization and workspace levels, providing flexible control over your recruiting operations.
Key principles:
- Least Privilege - Users get only the access they need
- Role-Based - Permissions assigned through predefined roles
- Hierarchical - Organization roles cascade to workspaces
- Auditable - All access and actions are logged
Permission Model
Permissions flow from organization to workspace:
Organization-Level Permissions
Control access to organization-wide resources:
- Billing and subscription management
- Member invitations and management
- Workspace creation and deletion
- Organization settings and security
- Credit allocation and monitoring
Workspace-Level Permissions
Control access within specific workspaces:
- Contact viewing and editing
- Search execution
- Shortlist management
- Sequence creation and execution
- Workspace settings and templates
Feature Permissions
Different roles have access to different features:
Search
| Permission | Viewer | Recruiter | Admin |
|---|---|---|---|
| View search results | Yes | Yes | Yes |
| Execute searches | - | Yes | Yes |
| Save searches | - | Yes | Yes |
| Delete saved searches | - | Own only | Yes |
Contacts
| Permission | Viewer | Recruiter | Admin |
|---|---|---|---|
| View contacts | Yes | Yes | Yes |
| Create contacts | - | Yes | Yes |
| Edit contacts | - | Yes | Yes |
| Delete contacts | - | - | Yes |
| Enrich contacts | - | Yes | Yes |
| Export contacts | - | Yes | Yes |
Shortlists & Sequences
| Permission | Viewer | Recruiter | Admin |
|---|---|---|---|
| View shortlists | Yes | Yes | Yes |
| Create/manage shortlists | - | Yes | Yes |
| View sequences | Yes | Yes | Yes |
| Create/manage sequences | - | Yes | Yes |
| Delete sequences | - | Own only | Yes |
Data Visibility
Beyond permissions, visibility rules control what data users can see:
- Workspace Isolation - Users only see data from workspaces they have access to.
- Contact Privacy - Email and phone numbers can be restricted to admins only (configurable).
- Activity Attribution - All actions show who performed them.
Custom Roles (Enterprise)
Enterprise customers can create custom roles with granular permissions:
- Go to Settings → Organization → Roles
- Click Create Custom Role
- Name the role and add a description
- Select individual permissions from the list
- Save the role
Custom roles can combine any permissions, allowing you to create roles like:
- Sourcer - Can search and add to shortlist, but not send sequences
- Hiring Manager - Can view shortlists and notes, but not edit contacts
- Data Analyst - Can export data and view reports, but not take actions
Audit Logs
Track all permission-related activities in the audit log:
- Member additions and removals
- Role changes
- Workspace access grants and revocations
- Login attempts (successful and failed)
- Sensitive data access (contact details, exports)
Accessing Audit Logs
- Go to Settings → Organization → Audit Log
- Filter by date, user, action type, or resource
- Click any entry to see full details
- Export logs for compliance or analysis