Agent Permissions & Access Control
Control who can view, use, and manage AI agents in your organization using groups and role-based access control.
Overview
Agent permissions in Twig AI enable you to:
Restrict agent access to specific users or groups
Control agent visibility across the organization
Manage who can edit agent configurations
Enforce data access policies through agent restrictions
Permission Model
Access Levels
Agents support three access control models:
Public (Organization)
Available to all users in the organization
Everyone
Group-Restricted
Only specific groups can access
Selected groups only
Private
Only creator and admins can access
Creator + Admins
Role-Based Control
Different roles have different permissions for agents:
Super Admin
All
All
All
All
✅
Admin
All
All
All
All
✅
Manager
Assigned
Assigned
Assigned
❌
Limited
User
Assigned
Assigned
❌
❌
❌
Setting Up Agent Permissions
Step 1: Create Groups
Groups are collections of users that can be assigned permissions together.
To create a group:
Navigate to Administration → Groups
Click Create New Group
Configure the group:
Name: e.g., "Customer Support Team"
Description: "Customer-facing support agents"
Members: Add users to the group
Click Save
Best Practices for Groups:
Organize by department (Sales, Support, Engineering)
Create role-based groups (Managers, Analysts)
Use project-based groups for temporary access
Name groups clearly and descriptively
Step 2: Assign Agents to Groups
Method 1: From Agent Settings
Open the agent you want to restrict
Go to Settings → Permissions
Select Access Type:
Organization-Wide: All users can access
Group-Restricted: Only selected groups
Private: Only you and admins
If Group-Restricted, select groups:
Click Add Group
Select one or more groups
Groups can have different permission levels
Click Save
Method 2: From Group Settings
Navigate to Administration → Groups
Open the group
Go to Agents tab
Click Add Agent
Select agents to add
Choose permission level:
View & Use: Can query the agent
Edit: Can modify agent settings
Click Save
Step 3: Add Users to Groups
To add users to a group:
Navigate to Administration → Groups
Open the group
Go to Members tab
Click Add Members
Select users from the list or search by name/email
Assign role within group (optional):
Member: Standard access
Manager: Can add/remove members
Click Add
Bulk User Assignment:
Import users via CSV: Name, Email, Group
Use API for programmatic assignment
Sync with SSO groups (Enterprise)
Permission Scenarios
Scenario 1: Department-Specific Agents
Use Case: Create agents that only specific departments can use.
Setup:
Create groups:
"Sales Team"
"Support Team"
"Engineering Team"
Create agents:
"Sales Agent" → Assign to "Sales Team" group
"Support Agent" → Assign to "Support Team" group
"Engineering Agent" → Assign to "Engineering Team"
Result:
Sales team only sees and can use Sales Agent
Support team only has access to Support Agent
Engineering team only has access to Engineering Agent
Scenario 2: Multi-Level Access
Use Case: Some users need access to multiple agents.
Setup:
Create groups:
"Tier 1 Support" → Access to Basic Support Agent
"Tier 2 Support" → Access to Basic + Advanced Support Agent
"Support Managers" → Access to all Support Agents + Edit permissions
Assign users:
Junior agents → Tier 1 Support group
Senior agents → Tier 2 Support group
Managers → Support Managers group
Result:
Graduated access based on experience level
Managers can modify agent configurations
Users only see relevant agents
Scenario 3: Project-Based Access
Use Case: Temporary access for project teams.
Setup:
Create group: "Product Launch Q1 2024"
Add cross-functional team members
Assign relevant agents:
Product Documentation Agent
Marketing Content Agent
Sales Enablement Agent
Set expiration date (manual or via API)
After project completion:
Remove users from group
Archive or delete group
Agent access automatically revoked
Scenario 4: Customer Success with Data Restrictions
Use Case: External consultants need limited access.
Setup:
Create group: "External Consultants"
Create agent: "Client-Facing Assistant"
Data Sources: Only public documentation
Private Data: Disabled
Features: No editing, no analytics
Assign group to agent with "View & Use" only
Result:
Consultants can use agent for customer queries
Cannot access internal data
Cannot see organization analytics
Cannot modify agent settings
Advanced Permission Controls
Data Source-Level Permissions
Combine agent permissions with data source restrictions:
Example:
Configuration:
In Agent Settings → Data Sources
For each data source, set access control:
All Agent Users: Anyone who can use agent
Specific Groups Only: Restrict further
Agent will only retrieve from data sources user has access to
Permission Inheritance
Groups can inherit permissions from parent groups:
Setup:
Navigate to Administration → Groups
Create parent group: "Support Department"
Create child groups with parent relationship
Assign agents to parent group
Child groups inherit access automatically
Time-Based Access
Control when agents are available to groups:
Use Cases:
Temporary contractor access
Seasonal team expansion
Trial periods
Configuration:
Agent Settings → Permissions → Advanced
For each group, set:
Start Date: When access begins
End Date: When access expires
Timezone: For scheduled access
Access automatically granted/revoked
Example:
Managing Permissions at Scale
API-Based Management
Automate permission management via API:
Bulk Operations
Via UI:
Administration → Groups → Select multiple
Bulk Actions:
Add agents to multiple groups
Add users to multiple groups
Remove access in bulk
Export permission matrix
Via CSV Import:
SSO Group Sync (Enterprise)
Automatically sync groups from your identity provider:
Supported Providers:
Azure AD / Microsoft Entra
Okta
Google Workspace
OneLogin
Custom SAML providers
Setup:
Navigate to Administration → SSO
Enable Group Sync
Map SSO groups to Twig groups:
Configure sync frequency:
Real-time (on login)
Hourly
Daily
Users automatically added/removed based on SSO groups
Monitoring & Auditing
Permission Audit Logs
Track all permission changes:
View Audit Logs:
Administration → Audit Logs
Filter by:
Event Type: "Permission Change"
Entity: Agent ID or Group ID
User: Who made the change
Date Range
Logged Events:
Agent access type changed
Group added/removed from agent
User added/removed from group
Permission level changed
Data source restrictions modified
Example Log Entry:
Permission Reports
Generate reports on agent access:
Available Reports:
Agent Access Matrix
Which users can access which agents
Export to CSV/Excel
Group Membership Report
Users in each group
Group assignments per user
Permission Coverage
Users with no agent access
Agents with no assigned groups
Compliance Report
Access review status
Certification requirements
Generate Report:
Security Best Practices
1. Principle of Least Privilege
✅ Do:
Grant minimum necessary access
Use group-restricted agents by default
Regular access reviews (quarterly)
Remove access promptly when users change roles
❌ Don't:
Make all agents organization-wide
Grant edit permissions broadly
Skip access reviews
Keep inactive users in groups
2. Separation of Duties
For sensitive agents:
Separate view/use from edit permissions
Require approval for permission changes
Implement maker-checker for sensitive data access
3. Regular Audits
Monthly:
Review group memberships
Check for unused agent assignments
Verify external user access
Quarterly:
Full permission audit
Recertify user access
Update group structures
Annually:
Review permission model
Update access policies
Archive old groups/agents
4. Data Classification
Align agent permissions with data sensitivity:
Public
Organization-wide
No
Internal
Group-restricted
Manager approval
Confidential
Private/Limited groups
Admin approval
Restricted
Named users only
C-level approval
Troubleshooting
User Can't See Agent
Check:
Is user in the organization?
Is agent set to Organization-Wide or Group-Restricted?
If Group-Restricted, is user in an assigned group?
Is user's account active?
Has user refreshed/logged out and back in?
Solution:
Group Not Appearing in Agent Settings
Check:
Does group exist and have active status?
Does group have at least one member?
Do you have permission to assign groups?
Solution:
Ensure group is active
Add at least one member to group
Contact admin if permission issue
Permission Changes Not Taking Effect
Causes:
Browser cache
Session not refreshed
Sync delay (SSO groups)
Solution:
Have user log out completely
Clear browser cache
Log back in
If SSO sync, wait for scheduled sync or trigger manual sync
Next Steps
User Permissions & Roles - Detailed user permission model
Group Management - Advanced group configuration
SSO Integration - Set up SSO with group sync
Audit Logs - Comprehensive audit logging
Last updated

