access — permission sets editor

  • Updated

The Permission Set Editor is the core configuration workspace where administrators create, configure, and manage Permission Sets.

It centralizes the full governance structure of a permission set, including name, description, tags, and permission configurations across objects, systems, custom permissions, and assignees.

This editor functions as the operational control center where access rules are defined, adjusted, and maintained.
 

access the permission sets editor

Admins can access the Permission Set Editor in two ways: when creating a new permission set or when editing an existing one.

  • Access when creating a new permission set

To access the editor for a new permission set:

1. Open the Control Center workspace.
2. Click Access.
3. Select Permission Sets.
4. Click + NEW PERMISSION SET button.
5. The Permission Set Editor will open.
 

  • Access when editing an existing permission set

To edit a preexisting permission set:

1. Open the Control Center workspace.
2. Click Access.
3. Click Permission Sets.
4. In the Name column, select a Permission Set.
The Permission Set Editor will open.
 

permission set editor dashboard

The Permission Set Editor dashboard contains the following components:

1. Permission Sets Editor
2. Name field
3. Description field
4. Assign tags button
5. PROJECTS tab
6. SYSTEM tab
7. CUSTOM PERMISSIONS tab
8. ASSIGNEES tab

 

permission set name

The Name field assigns the title of a Permission Set.

It serves as the primary identifier when searching, selecting or managing permission configurations. The selected name determines which governance structure is being edited and loads its associated permissions across all configuration tabs (PROJECTS, SYSTEM, CUSTOM PERMISSIONS, and ASSIGNEES.) Permission set names must be unique in the database.
 

description field

The Description field stores the functional summary of the Permission Set.

This description is visible within the Permission Sets workspace and helps administrators understand the purpose, scope and operational use of the configuration.
 

assign tags button

The Assign Tags button allows administrators to link previously created tags to the Permission Set.

Tagging enhances governance organization by linking permission configurations to operational, organizational, or reporting classifications. This improves filtering, segmentation, and administrative visibility.
 

projects tab

The PROJECTS tab displays only objects that belong to the context of a Project.

In other words, it includes objects that are related to the Project object and are configured to operate within a project-level scope.

Within this tab, administrators configure how users interact with project data (viewing, editing, deleting, creating and conditioning.)
 

system tab

The SYSTEM tab contains system-level objects native to Neostella.

Their access permissions can be governed through Permission Sets. System objects operate transversally across the platform rather than within project context.

Permission configurations may appear as:

  • Binary permissions (Yes / No)
  • Permission level lists

For example, a Reports object may include permissions such as create, view, share, delete, archive, and download, while a Translations object may only allow edit permissions (Yes/ No).
 

custom permissions tab

The CUSTOM PERMISSIONS tab governs field-level access control. Administrators use this tab to configure permissions for predefined system or custom fields. Available actions include:

  • Create new custom permissions.
  • Edit permission levels.

CUSTOM PERMISSIONS extend governance across multiple configuration layers, including: Customizations, Forms, and Views.
 

assignees tab

The ASSIGNEES tab is where users and user groups are linked to the configured Permission Set. Any user or group inherits the access levels defined across PROJECTS, SYSTEM, and CUSTOM PERMISSIONS tabs.

Users and groups can be assigned to multiple Permission Sets simultaneously.

If overlapping permissions occur, Neostella resolves conflicts by applying the Permission Set that grants the highest level of access.