Access Control Levels
Twenty provides multiple layers of access control:Object-Level Permissions
Control default access to objects:Configuring Object Access
Permission Examples by Object
- Companies
- Opportunities
- Tasks
- Contracts
Common configuration:
Record-Level Sharing
Share specific records with users:Sharing a Record
Users receive notification when a record is shared with them.
Sharing Options
View Only
User can:
- See the record
- View all fields
- See related records
- Edit any fields
- Delete record
- Share with others
Can Edit
User can:
- View record
- Edit fields
- Add comments
- Update related records
- Delete record
- Change owner
- Modify sharing
Can Delete
User can:
- Everything in “Can Edit”
- Delete record
- Change owner
- Modify sharing settings
Owner
Automatic for creator:
- All permissions
- Cannot be removed
- Can transfer ownership
- Sees record even if private
Sharing Patterns
Share with team
Share with team
Share for visibility
Share for visibility
Share for handoff
Share for handoff
Share cross-functionally
Share cross-functionally
Field-Level Security
Control access to sensitive fields:Configuring Field Security
Sensitive Fields Examples
- Financial Data
- Personal Information
- Strategic Information
Restrict revenue and cost:
Ownership
Record ownership determines primary responsibility:Record Owner
Owner has:- Full access to record (view, edit, delete)
- Ability to share record
- Ability to transfer ownership
- Appears as “Owner” on record
Changing Ownership
New owner receives notification of ownership transfer.
Auto-Assignment Rules
Automate ownership:Team-Based Access
Organize users into teams for easier sharing:Creating Teams
Team Hierarchies
Create organizational structure:Access Control Best Practices
Start restrictive, open as needed
Start restrictive, open as needed
Begin with private access:
- Set objects to private by default
- Limit role permissions initially
- Add access when users need it
- Better to add than remove access
Use teams for automatic sharing
Use teams for automatic sharing
Instead of sharing individually:
- Create teams (Sales, Support, etc.)
- Configure team sharing rules
- Add users to teams
- Sharing happens automatically
Protect sensitive data
Protect sensitive data
Use field-level security for:
- Financial information
- Personal data
- Strategic plans
- Competitive intelligence
Review access regularly
Review access regularly
Quarterly access audit:
- Review who has access to what
- Remove unnecessary sharing
- Adjust role permissions
- Clean up team memberships
Document access policies
Document access policies
Create clear guidelines:
- Who should see what
- When to share records
- How to request access
- Escalation for exceptions
Troubleshooting Access Issues
User Cannot See Record
Check in order:-
Role permissions
- Does role allow viewing this object?
- Does role allow viewing records they don’t own?
-
Object settings
- Is object visibility restricted?
- Is default access too restrictive?
-
Record sharing
- Is record shared with user?
- Is user part of team with access?
-
Record ownership
- Does user own the record?
- Can they see records they own?
User Cannot Edit Field
Check:-
Field-level security
- Is field hidden for user’s role?
- Is field read-only for role?
-
Record access
- Does user have edit access to record?
- Sharing might be view-only
-
Field type
- Some fields are always read-only (ID, Created At)
- Calculated fields cannot be edited
-
Workflow locks
- Workflow may lock fields in certain stages
- Check workflow rules
Next Steps
User Roles
Learn about role-based permissions
Workspace Setup
Manage workspace members and teams
