Common RBAC Scenarios
This guide provides real-world examples of how to set up and manage RBAC for different organizational needs and situations you'll encounter.
Team Onboarding Scenarios
Scenario 1: Onboarding a New Software Developer
Situation: Sarah is joining your development team as a mid-level developer.
Requirements:
- Access to development projects
- Ability to create and modify workflows
- Collaboration with the development team
- No access to production deployment or billing
Implementation:
-
Assign Base Roles
✅ Project Developer (for assigned projects)
✅ Team Member (for Development Team)
❌ Project Admin (no deployment access needed) -
Set Up Team Access
- Add Sarah to "Development Team"
- Team automatically provides collaboration permissions
- Team Lead can manage her day-to-day access needs
-
Project-Specific Setup
- Assign Project Developer role for "Mobile App" project
- Assign Project Developer role for "API Integration" project
- Leave out access to "Legacy Migration" project until needed
Result: Sarah can work on assigned projects, collaborate with team, but can't accidentally affect production systems.
Scenario 2: Promoting a Team Member to Team Lead
Situation: Mike has been promoted from Developer to Team Lead for the Frontend Team.
Before:
Current Roles: Project Developer, Team Member
After Promotion:
New Roles: Project Admin, Team Lead, Team Member (keep for continuity)
Implementation Steps:
-
Add Management Permissions
- Assign Team Lead role for Frontend Team
- Add Project Admin role for team's main projects
- Keep Team Member role for continued collaboration
-
Grant Additional Access
- Deploy permissions for staging environments
- Manage Team Members for the Frontend Team
- Create Projects (for new frontend initiatives)
-
Gradual Transition
- Week 1-2: Add new permissions, keep old ones
- Week 3-4: Mike practices with new responsibilities
- Week 4+: Remove Project Developer from projects where he's now Project Admin
Result: Mike can manage his team and deploy to staging, while maintaining his technical access during the transition.
External Collaboration Scenarios
Scenario 3: Working with External Contractors
Situation: You're hiring a design agency to help with UI/UX for 3 months.
Requirements:
- Access to design-related projects only
- Ability to view and modify design assets
- No access to code, deployments, or billing
- Time-limited access that expires automatically
Implementation:
-
Create Custom Role: "Design Contractor"
- Project: Read, Write (for design projects only)
- Workflow: Read (to understand user flows)
- Knowledge Base: Read, Write (for design documentation)
- Team: Read (to see team members)
-
Set Up Contractor Users
- Invite contractors with Design Contractor role
- Expiration Date: Set to end of contract (3 months from now)
- Project Scope: Only assign to "Web App Redesign" project
-
Create Isolated Project
- Set up "Web App Redesign" project
- Visibility: Private (only visible to assigned team members)
- Add contractors and internal design team members
Result: Contractors have exactly the access they need, with automatic expiration and no risk to other projects.
Scenario 4: Client Access for Project Review
Situation: Your client wants to review project progress and provide feedback.
Requirements:
- View project status and documentation
- Comment on workflows and provide feedback
- No ability to modify or deploy anything
- Access only to their specific project
Implementation:
-
Create Custom Role: "Client Reviewer"
- Project: Read only
- Workflow: Read only
- Bot: Read only (to test interactions)
- Knowledge Base: Read, Write (for feedback and comments)
-
Set Up Client Access
- Create user account for client contact
- Assign Client Reviewer role for their project only
- Set 6-month expiration (renewable)
-
Configure Project Visibility
- Set project visibility to "Private"
- Add client user to project member list
- Create dedicated "Client Feedback" knowledge base
Result: Client can review progress and provide feedback without risk of accidental changes.
Organizational Structure Scenarios
Scenario 5: Multi-Department Company Setup
Situation: You have Marketing, Sales, Engineering, and Operations departments, each needing different access patterns.
Department Structures:
Engineering Department
👑 Engineering Manager: Workspace Manager + Team Lead
💻 Senior Developers: Project Admin + Team Member
👨💻 Developers: Project Developer + Team Member
🆕 Junior Developers: Project Developer (limited projects) + Team Member
Marketing Department
📈 Marketing Director: Workspace Manager + Team Lead
🎯 Campaign Managers: Project Admin (marketing projects) + Team Member
✍️ Content Creators: Project Developer (content projects) + Team Member
📊 Analysts: Project Viewer (all projects) + Export permissions
Operations Department
⚙️ Operations Manager: Workspace Manager + Project Viewer (all)
🔧 DevOps Engineers: Project Admin + Deploy permissions
📋 Process Managers: Project Developer + Team Lead (process teams)
Implementation:
-
Create Department Teams
- Engineering Team, Marketing Team, Operations Team, Sales Team
- Each team has appropriate Team Lead and Team Members
-
Department-Specific Roles
Engineering: Focus on technical project access
Marketing: Campaign and content management focus
Operations: Process optimization and deployment access
Sales: Customer project visibility and reporting -
Cross-Department Projects
- Create projects with mixed team access
- Example: "Product Launch" project with Marketing + Engineering access
- Use project-specific role assignments
Result: Each department has appropriate access while enabling cross-functional collaboration.
Scenario 6: Scaling Startup (10 to 100+ employees)
Situation: Your startup is rapidly growing and you need to formalize access control.
Growth Phases:
Phase 1: Small Team (10-20 people)
🔧 Founders: Workspace Admin
👑 Department Heads: Workspace Manager + Team Lead
👥 Everyone Else: Project Developer + Team Member
Phase 2: Medium Team (20-50 people)
🔧 C-Level: Workspace Admin
👑 VPs/Directors: Workspace Manager + Team Lead
📋 Managers: Team Lead + Project Admin
👥 Individual Contributors: Project Developer + Team Member
Phase 3: Large Team (50+ people)
🔧 Executive Team: Workspace Admin (limited)
🏢 Department VPs: Workspace Manager (department scope)
👑 Directors: Team Lead + Project Admin (multiple projects)
📋 Managers: Team Lead + Project Admin (specific projects)
👨💼 Senior ICs: Project Admin (individual projects)
👥 ICs: Project Developer + Team Member
🆕 New Hires: Project Viewer + Team Member (temporary)
Implementation Strategy:
-
Start Simple (Phase 1)
- Use mostly default roles
- Focus on basic separation between admins and contributors
-
Add Structure (Phase 2)
- Create department-based teams
- Introduce management hierarchy in roles
- Add approval processes for sensitive operations
-
Formalize Governance (Phase 3)
- Regular access reviews
- Formal onboarding/offboarding processes
- Compliance and audit preparation
Project Lifecycle Scenarios
Scenario 7: Project Development to Production
Situation: Managing access as a project moves from development through staging to production.
Project Stages:
Development Stage
👨💻 Developers: Project Developer (full access)
👀 Stakeholders: Project Viewer
🧪 QA Team: Project Developer (test workflows)
Staging Stage
👨💻 Developers: Project Developer (continued development)
🚀 Tech Leads: Project Admin + Deploy (staging)
👀 Stakeholders: Project Viewer
✅ QA Team: Project Developer + Execute (run tests)
📋 Product Managers: Project Viewer + Export (data analysis)
Production Stage
🔒 Production Team: Project Admin + Deploy (production)
📊 Monitoring Team: Project Viewer + Execute (monitoring workflows)
🆘 On-Call Engineers: Project Admin (incident response)
🚫 Developers: Project Viewer (read-only)
Implementation:
-
Environment-Based Roles
- Create separate roles for each environment
- Example: "Staging Deployer", "Production Operator"
-
Progressive Permission Removal
- Developers lose write access to production
- Only specialized roles can deploy to production
- Maintain read access for troubleshooting
-
Incident Response Access
- Emergency procedures to grant temporary production access
- Time-limited elevated permissions during incidents
- Audit trail of emergency access grants
Scenario 8: Temporary Project Access
Situation: Setting up access for time-limited projects like marketing campaigns or seasonal initiatives.
Project: "Black Friday Campaign" (November 1 - December 15)
Team Structure:
📈 Campaign Manager: Project Admin (until Dec 15)
🎨 Design Team: Project Developer (until Nov 30)
📊 Analytics Team: Project Viewer + Export (until Dec 31)
🛍️ E-commerce Team: Project Developer (until Dec 15)
Implementation:
-
Time-Limited Role Assignments
- Set expiration dates on all role assignments
- Stagger expirations based on team involvement
- Plan for access extension if project continues
-
Resource Cleanup
- Schedule project archival after campaign ends
- Transfer important assets to permanent storage
- Remove temporary users from workspace
-
Knowledge Transfer
- Document lessons learned before access expires
- Export important data and configurations
- Plan for future similar campaigns
Security and Compliance Scenarios
Scenario 9: Compliance-Heavy Environment
Situation: You're in a regulated industry requiring strict access controls and audit trails.
Compliance Requirements:
- Segregation of duties
- Regular access reviews
- Approval workflows for sensitive operations
- Complete audit trails
Implementation:
-
Segregation of Duties
🚫 No single person can:
- Create and approve workflows
- Deploy and monitor production systems
- Access billing and deploy systems -
Approval Workflows
- Production Deployment: Requires approval from different team
- Data Export: Needs data protection officer approval
- User Role Changes: Manager approval required
-
Regular Reviews
- Monthly: Review all role assignments
- Quarterly: Full permission audit
- Annually: Role definition review
-
Audit Features
- Enable detailed logging for all permission checks
- Regular reports on access patterns
- Documentation of all role changes
Scenario 10: Security Incident Response
Situation: A security incident requires immediate access changes and investigation.
Incident Response Plan:
-
Immediate Actions
⚠️ Suspend affected user accounts
🔒 Remove sensitive permissions from potentially compromised roles
📋 Grant temporary investigator access to security team
📊 Enable enhanced logging and monitoring -
Investigation Access
- Create temporary "Security Investigator" role
- Grant read access to all projects and audit logs
- Time-limited (48-72 hours) with approval for extensions
-
Recovery Process
- Review and restore legitimate user access
- Update role definitions based on lessons learned
- Implement additional controls if necessary
-
Post-Incident
- Full review of access patterns before incident
- Update security procedures and role definitions
- Enhanced monitoring for similar patterns
Integration and Automation Scenarios
Scenario 11: HR System Integration
Situation: Automatically managing user access based on HR system data.
Integration Goals:
- Automatic role assignment based on job title
- Access updates when employees change roles
- Automatic access removal when employees leave
Implementation:
-
Role Mapping
HR Job Title → Workspace Platform Roles
"Software Engineer" → Project Developer + Team Member
"Engineering Manager" → Project Admin + Team Lead
"Product Manager" → Project Viewer + Export permissions -
Automation Rules
- New hire: Automatically assign roles based on department/title
- Role change: Update permissions to match new position
- Termination: Immediate access removal with resource transfer
-
Exception Handling
- Manual override capability for special cases
- Approval workflow for non-standard role assignments
- Regular audit of automated assignments
Best Practices from These Scenarios
1. Start Conservative
- Begin with minimal permissions and add as needed
- Use time-limited access for new or temporary situations
- Regular reviews to ensure access is still appropriate
2. Plan for Growth
- Design role structure that scales with your organization
- Use team-based permissions to simplify management
- Create templates for common scenarios
3. Document Everything
- Keep records of why specific permissions were granted
- Document role definitions clearly
- Maintain an audit trail of access changes
4. Regular Reviews
- Monthly reviews for active projects
- Quarterly reviews for all user access
- Annual reviews of role structure and policies
5. Automate Where Possible
- Use bulk operations for similar users
- Implement automated expiration for temporary access
- Integrate with HR systems for lifecycle management
Next Steps: If you're facing a situation not covered here, check our troubleshooting guide or contact support. For technical implementation of these scenarios, see the SDK documentation.