Skip to content

Roles & Permissions

Flowstate uses role-based access control (RBAC) to govern what users can see and do across the platform. Users are assigned roles, and each role contains a set of permissions that determine access to specific features and data.

Overview

The RBAC model has three layers:

LayerScope
Organization RolesAssigned to a user at the organization level via a Role
Team-Level AccessLine managers receive implicit permissions for their teams
Direct User GrantsIndividual permissions granted directly to a user

Permissions are additive -- a user's effective permissions are the union of all permissions from their role, team-level access, and any direct grants.

Roles

A role is a named collection of permissions. Roles are managed in Settings > Roles & Permissions and have the following properties:

FieldDescription
nameDisplay name for the role (e.g., "Admin", "Viewer", "Finance Lead")
descriptionA short explanation of the role's purpose
isSystemWhether this is a built-in system role (cannot be deleted)
isTenantAdminOnlyWhether this role is restricted to tenant administrators
dashboardViewModeDefault dashboard view mode for users with this role (defaults to INSIGHTS)

System Roles

System roles are built into Flowstate and cannot be deleted. They serve as baseline templates and cover the most common access patterns. You can identify them by the isSystem flag.

TIP

Use system roles where they fit your organization's needs. Create custom roles only when you need a permission combination that no system role provides.

Custom Roles

Create custom roles to match specific job functions in your organization. For example, you might create a "Finance Analyst" role with read access to financial details and forecasts but no ability to modify employee records.

  1. Navigate to Settings > Roles & Permissions
  2. Click Create Role
  3. Enter a name and description
  4. Select the permissions for this role (see Permission Reference below)
  5. Click Save

Managing roles requires the SETTINGS_RBAC_* permissions:

ActionPermission
View rolesSETTINGS_RBAC_VIEW
Create rolesSETTINGS_RBAC_CREATE
Update rolesSETTINGS_RBAC_UPDATE
Delete rolesSETTINGS_RBAC_DELETE

WARNING

Deleting a custom role removes it from all users who currently have it assigned. Affected users lose those permissions immediately. Reassign them to a different role before deleting.

Permission Reference

Permissions are organized by functional area. Each permission controls access to a specific action or set of actions within that area.

Settings -- Entity Configuration

Control access to organizational entities such as teams, work types, value streams, cost centres, and other configuration data.

PermissionDescription
SETTINGS_ENTITY_CONFIG_VIEWView entity configuration settings
SETTINGS_ENTITY_CONFIG_CREATECreate new entity configuration entries
SETTINGS_ENTITY_CONFIG_UPDATEModify existing entity configuration
SETTINGS_ENTITY_CONFIG_DELETEDelete entity configuration entries

Settings -- Financial Configuration

Control access to financial settings including currencies, exchange rates, and cost parameters.

PermissionDescription
SETTINGS_FINANCIAL_CONFIG_VIEWView financial configuration settings
SETTINGS_FINANCIAL_CONFIG_CREATECreate financial configuration entries
SETTINGS_FINANCIAL_CONFIG_UPDATEModify financial configuration entries
SETTINGS_FINANCIAL_CONFIG_DELETEDelete financial configuration entries

Settings -- Data Import

PermissionDescription
SETTINGS_DATA_IMPORTImport data from external sources

Settings -- RBAC

Control who can manage roles and permissions themselves.

PermissionDescription
SETTINGS_RBAC_VIEWView roles and their permissions
SETTINGS_RBAC_CREATECreate new roles
SETTINGS_RBAC_UPDATEModify existing roles
SETTINGS_RBAC_DELETEDelete roles

Settings -- User Invitations

PermissionDescription
SETTINGS_USERS_INVITEInvite new users to the organization

Settings -- Integrations

Control access to integration settings including API keys, SCIM provisioning, and SIEM endpoints.

PermissionDescription
SETTINGS_INTEGRATIONS_VIEWView integration configurations
SETTINGS_INTEGRATIONS_CREATECreate new integrations
SETTINGS_INTEGRATIONS_UPDATEModify existing integrations
SETTINGS_INTEGRATIONS_DELETEDelete integrations

Financial Detail

Control the level of financial information visible to the user.

PermissionDescription
FINANCIALS_VIEW_SUMMARYView aggregated financial summaries (team/project level)
FINANCIALS_VIEW_DETAILEDView individual salary, contractor rate, and cost data

WARNING

FINANCIALS_VIEW_DETAILED grants access to individual compensation data. Assign this permission only to users who need it for their role, such as finance leads and HR business partners.

Team Plan -- Employees

PermissionDescription
TEAM_EMPLOYEES_VIEWView employee records and allocations
TEAM_EMPLOYEES_CREATECreate new employee records
TEAM_EMPLOYEES_UPDATEModify employee records and allocations
TEAM_EMPLOYEES_DELETERemove employee records
TEAM_EMPLOYEES_MODIFY_COMPENSATIONChange employee salary and compensation

Team Plan -- Teams

PermissionDescription
TEAM_TEAMS_VIEWView team structure and membership
TEAM_TEAMS_CREATECreate new teams
TEAM_TEAMS_UPDATEModify team details and structure
TEAM_TEAMS_DELETEDelete teams

Team Plan -- Contractors

PermissionDescription
TEAM_CONTRACTORS_VIEWView contractor records
TEAM_CONTRACTORS_CREATECreate new contractor records
TEAM_CONTRACTORS_UPDATEModify contractor records
TEAM_CONTRACTORS_DELETERemove contractor records

Team Plan -- Vacancies

PermissionDescription
TEAM_VACANCIES_VIEWView vacancy records
TEAM_VACANCIES_CREATECreate new vacancy records
TEAM_VACANCIES_UPDATEModify vacancy records
TEAM_VACANCIES_DELETERemove vacancy records

Team Plan -- Skills

PermissionDescription
TEAM_SKILLS_VIEWView skills and competency data
TEAM_SKILLS_CREATECreate new skill definitions
TEAM_SKILLS_UPDATEModify skill definitions
TEAM_SKILLS_DELETEDelete skill definitions

Roadmap -- Projects

PermissionDescription
ROADMAP_PROJECTS_VIEWView projects and project details
ROADMAP_PROJECTS_CREATECreate new projects
ROADMAP_PROJECTS_UPDATEModify project details
ROADMAP_PROJECTS_DELETEDelete projects

Roadmap -- Initiatives

PermissionDescription
ROADMAP_INITIATIVES_VIEWView initiatives
ROADMAP_INITIATIVES_CREATECreate new initiatives
ROADMAP_INITIATIVES_UPDATEModify initiatives
ROADMAP_INITIATIVES_DELETEDelete initiatives

Roadmap -- Drivers

PermissionDescription
ROADMAP_DRIVERS_VIEWView strategic drivers
ROADMAP_DRIVERS_CREATECreate new drivers
ROADMAP_DRIVERS_UPDATEModify drivers
ROADMAP_DRIVERS_DELETEDelete drivers

Cost Forecast

PermissionDescription
FORECAST_VIEWView cost forecasts and financial models

Scenario Plans

PermissionDescription
PLANS_CREATECreate new scenario plans
PLANS_MANAGEManage scenario plans (edit, publish, archive)

Effort Tracking

PermissionDescription
EFFORT_TRACKING_VIEWView effort tracking data and reports
EFFORT_TRACKING_SUBMITSubmit effort entries
EFFORT_TRACKING_OVERRIDEOverride submitted effort entries
EFFORT_TRACKING_APPROVEApprove effort submissions

Audit

PermissionDescription
AUDIT_VIEWView audit logs and activity history
AUDIT_CONFIGUREConfigure audit settings and retention
AUDIT_CONFIRMConfirm and acknowledge audit findings
AUDIT_EXPORTExport audit log data

Assigning Roles to Users

Manual Assignment

  1. Navigate to Settings > Users
  2. Click on the user you want to modify
  3. Under Role, select the desired role from the dropdown
  4. Click Save

Changing a user's role requires the SETTINGS_RBAC_UPDATE permission.

Group-to-Role Mapping (SSO)

When using SAML 2.0 or OAuth 2.0 for authentication, you can map identity provider groups directly to Flowstate roles. This allows you to manage Flowstate access from your IdP rather than configuring roles individually in Flowstate.

IdP Group NameFlowstate RoleEffect
Flowstate-AdminsAdminFull access including all settings
Flowstate-EditorsEditorCreate and modify plans and data
Flowstate-ViewersViewerRead-only access to plans and data

Configure group-to-role mappings in the auth provider settings:

When a user authenticates via SSO, Flowstate evaluates their IdP group memberships against the configured mappings and assigns the appropriate role.

WARNING

If a user belongs to multiple mapped groups, they receive the highest-privilege role. For example, membership in both Flowstate-Viewers and Flowstate-Admins results in the Admin role being assigned.

SCIM Provisioning

When SCIM 2.0 provisioning is enabled, group membership changes in your IdP are automatically synced to Flowstate. Adding a user to a mapped group in your IdP updates their Flowstate role without manual intervention.

See the SCIM group-to-role mapping guide for details.

Team-Level Access

Line managers receive implicit permissions for the teams they manage. This allows managers to view and manage their direct reports without requiring organization-wide permissions.

Team-level access is determined by the team's manager assignment in Flowstate and does not require a separate role configuration.

Best Practices

  1. Follow the principle of least privilege -- Assign users the minimum permissions required for their job function. Start with a restrictive role and add permissions only as needed.
  2. Use system roles where possible -- System roles cover common access patterns and are maintained by Flowstate. Custom roles require ongoing maintenance as new permissions are added.
  3. Create custom roles for specific job functions -- If you have distinct job functions that do not map cleanly to a system role, create a custom role. Name it after the job function (e.g., "Finance Analyst", "Engineering Manager") rather than the permissions it contains.
  4. Use SSO group mapping -- If you use SAML or OAuth, manage role assignments through your IdP groups rather than manually in Flowstate. This ensures role changes follow your existing access governance processes.
  5. Review role assignments periodically -- Audit who has which role at least quarterly. Look for users with overly broad permissions, inactive users who should be deactivated, and roles with permissions that are no longer needed.
  6. Separate financial access carefully -- The FINANCIALS_VIEW_DETAILED and TEAM_EMPLOYEES_MODIFY_COMPENSATION permissions grant access to sensitive compensation data. Restrict these to finance, HR, and executive roles.

Flowstate Documentation