Skip to main content
All CollectionsActive PlatformAdministrator Guides
Understanding permission controls in Active
Understanding permission controls in Active

To assist users in navigating the Active Platform to set up and manage user permissions for clients and binders.

Updated this week

Overview: Active provides flexibility in managing user access to clients and binders through office assignments and client group restrictions. This article explains the different methods available to control user permissions.

Please refer to the Glossary for definitions of key terms used in this article.


Understanding permission controls in Active

By default, all users in Active have access to all binders. However, there are two primary methods to restrict access:

  1. Office-based restrictions

  2. Client Group restrictions

Method 1: Creating multiple offices

Creating separate offices allows you to control access based on office assignment. Here's how it works:

  1. Navigate to the Admin Centre

  2. Select Offices from the menu

  3. Click Add Office to create a new office (e.g., Office B)

  4. Assign specific clients to the new office

  5. Only users assigned to Office B will be able to access clients and binders linked to that office

Note: Users must be explicitly assigned to an office to access its clients and binders.

Method 2: Restricting Client Groups

The second method involves using the Client Group restriction feature:

  1. Go to the Clients section

  2. Select the Client Group you want to restrict

  3. Click Edit Client Group

  4. Enable the Restrict access to client option

  5. Use the Whitelisted Users field to specify which users should have access

  6. The Partner and/or Manager (if specified) of the Client Group will automatically have access

WARNING: Once you restrict a Client Group, only whitelisted users and designated Partners/Managers will have access to all child entities under that group.

Best practices for managing permissions

  • Start with the least privileged access model

  • Regularly review user permissions

  • Document your permission structure

  • Test access after making changes

  • Maintain a list of restricted Client Groups

Did this answer your question?