Prisme.ai implements a comprehensive, multi-layered authorization system that ensures secure access control across the platform. This guide explains how permissions work at each level and provides instructions for effective permission management.

Understanding the Authorization Model

Prisme.ai’s authorization system operates at four distinct layers:

Super Admins

Technical or management users with platform-wide access configured at the infrastructure level

Workspace Roles

Developer and manager permissions assigned on a workspace-by-workspace basis

SSO Access

End-user access controls configured for each workspace with SSO integration

Product Roles

Fine-grained permissions assigned to user groups within individual products

Key Concepts and Terminology

Before diving into permission details, it’s important to understand the distinction between two fundamental concepts:

Workspaces are dedicated environments where you can build, manage, and run agents, as well as implement all custom or project-specific logic.

  • Accessible via the AI Builder section in the left-hand menu
  • Similar to software management projects or team workspaces in traditional environments
  • Designed for tech teams to create, configure, and maintain AI-powered applications
  • Contain automations, blocks, pages, and other reusable development resources
  • Centralize all activity: end-user interactions, audit logs, and execution traces

Workspaces are the foundation of Prisme.ai’s AI Builder. They empower teams to design, test, and deploy custom AI solutions tailored to their unique business needs.

Understanding this distinction is crucial because permissions are applied differently at the workspace level versus the product level.

Super Admins

Super Admins have the highest level of access across the entire Prisme.ai platform.

Workspace Roles

Workspace roles control who can access and modify specific workspaces in Prisme.ai.

SSO Access

SSO (Single Sign-On) access controls which end users can access product pages when authenticating through your identity provider.

While SSO rules typically only grant access to user-facing pages, they can be configured to provide full workspace access, similar to owner roles, if needed.

Product Roles

Product roles provide fine-grained control over what users can do within specific Prisme.ai products.

Permission Management Best Practices

Least Privilege Principle

Assign only the minimum permissions needed

  • Grant users only the access they need to perform their jobs
  • Regularly review and revoke unnecessary permissions
  • Use time-limited access when possible for temporary needs

Role-Based Access Control

Organize permissions by role, not individual users

  • Create roles that align with job functions
  • Assign users to appropriate roles
  • Modify role definitions rather than creating one-off permissions

Regular Audits

Review permissions periodically

  • Schedule regular permission reviews
  • Check for outdated access after role changes
  • Audit Super Admin accounts especially carefully

Document Access Policies

Create clear permission guidelines

  • Document which roles have access to what resources
  • Establish approval processes for elevated access
  • Provide clear procedures for requesting access changes

Understanding Permission Interactions

When a user attempts to perform an action in Prisme.ai, their permissions are evaluated across multiple layers:

1

Authentication Validation

First, the system verifies the user is properly authenticated, either through:

  • Local username/password
  • SSO provider credentials
  • API key or token validation
2

Super Admin Check

If the user is a Super Admin, they generally have full access to all workspaces but might still need specific product roles.

3

Workspace Permission Evaluation

For workspace access:

  • The system checks if the user has been explicitly granted a role
  • It evaluates any SSO-based role assignments
  • It determines the specific capabilities based on the assigned role
4

Product Permission Evaluation

For product features:

  • The system verifies product-specific roles assigned in AI Governance
  • It checks any group memberships that might grant additional permissions
  • It enforces feature and data access based on these roles

Remember that workspace access and product access are separate layers. A user might have admin rights to a product without having access to its underlying workspace, or vice versa.

Common Permission Scenarios

Troubleshooting Permission Issues