RBAC is only available in our Enterprise tier. Need enterprise-grade access control? Book a call with our sales team.

Permissions Hierarchy

Access permissions in camelAI follow this hierarchy (from highest to lowest):

Superuser

System-level access with complete control

Org Admin

Organization-wide access and control (Enterprise only)

Owner

Resource creator with management permissions

  • In non-Enterprise tiers: full control
  • In Enterprise tier: control dependent on group membership

Group Member

Access based on group permissions (Enterprise only)

External Viewer

View-only access to shared dashboards (via email)

No Access

Cannot view or interact with the resource

Detailed Permission Matrix

The following table provides a comprehensive breakdown of permissions by role in camelAI Enterprise:

PermissionSuperuserOrg AdminOwnerGroup MemberExternal ViewerNo Access
User Management
Add users to organization
Assign users to groups
Toggle admin status
Deactivate users
Data Source Management
Connect data sources
Assign data sources to groups
Private Connection Management
Create private connections⁵
Edit own private connections
Delete own private connections
Share private connection data⁶
Group Management
Create/delete groups
Configure external sharing for groups
Dashboard Access
View shared dashboards
Dashboard Management
Create dashboards
View all organization’s dashboards
Edit any dashboard
Edit own dashboard
Delete any dashboard
Delete own dashboard
Dashboard Sharing
Share with groups¹
External email sharing²
Artifact Management
Create artifacts
Edit any artifact
Edit own artifact
Delete any artifact
Delete own artifact
Chat/Query Access
Use AI chat with any data source
Use AI chat with permitted data sources³
Start chat with dashboard artifact⁴
View database queries

Notes:

¹ Group Sharing Restrictions: Owner can only share dashboards with groups if:

  • The owner is a member of the group
  • The group has access to all data sources used by artifacts in the dashboard

² External Sharing Restrictions: External sharing is only possible if:

  • The owner belongs to a group with external sharing enabled (can_share_externally=true)
  • All artifacts in the dashboard use data sources from groups with external sharing enabled

³ Data Source Access: Users can only access data sources through chat that are connected to groups they belong to

Chat with Artifact: The “Start a chat” button on dashboard artifacts is only available to users who have access to the underlying data source through their group membership

Private Connections: Non-admin users can create private connections (currently limited to CSV and Excel files up to 1GB) if enabled by an org-admin. This feature is enabled by default per user.

Private Connection Sharing: Data from private connections cannot be shared with other users. If an artifact with private data is added to a dashboard, that dashboard becomes private and only visible to the creator. Only org-admins can share private connection data by adding the connection to a group.

Admin Panel Features

Enterprise tier organizations have access to an admin panel with the following management capabilities:

  • Add users and assign them to groups
  • Toggle admin status for users
  • Deactivate users
  • Users can belong to multiple groups
  • Toggle permission for users to create private connections (enabled by default)

Dashboard Sharing Rules

Conditions for Sharing with Groups (Enterprise Tier)

1

Group Data Source Access

The group must have access to all data sources used by all artifacts in the dashboard

2

User Group Membership

The user attempting to access must be a member of all required groups

3

Private Connection Limitations

Dashboards containing artifacts that use private connections cannot be shared unless an org-admin has added those private connections to a group

Conditions for External Sharing

External sharing permissions are carefully controlled to protect sensitive data.

1

Owner Permissions

The dashboard owner must be in a group with external sharing enabled

2

Data Source Permissions

All artifacts in the dashboard must use data sources from groups that allow external sharing

3

Changes in Conditions

If any condition changes (e.g., artifact added using a restricted data source), external access should be revoked

Access Revocation

Access is automatically removed when: