Artificial Intelligence Corporate Risk
  • Welcome
  • Getting Started
    • Inviting Users
    • Adding New Large Language Models
      • Azure OpenAI Service
      • OpenAI
      • Mistral
      • Google AI
      • LLaMA AI
      • AWS Bedrock
  • Chat
    • Initiating a Chat
    • Viewing Chat History
  • Dashboards
    • Creating Dashboards
    • Dashboard Elements
      • Top N
      • Charts and Graphs
      • Totals
      • Maps
  • Monitoring
    • Adding a User to the Monitor Role
    • Setting up alerts and issues
    • Editing Issues
  • Compliance
    • Adding a User to the Compliance Role
    • Creating a Search
    • Consuming the Results
  • Admin
    • AI Agents
      • Adding a New Agent
        • General Settings
        • Agent Engine Properties
          • Azure OpenAI
          • OpenAI
          • Mistral
          • Google AI
          • LLaMA AI
          • AWS Bedrock
        • Advanced Settings
          • Usage
            • Max Messages
            • LLM Temperature
          • Scanners
            • AI Scanners
            • General Scanners
          • API Keys
          • Files
      • Editing an Agent
      • Deleting an Agent
      • Adding from a Template
    • Company
      • General Information
      • External Agent Provider Settings
    • Custom APIs
      • OAuth2 API
      • Adding a New API
        • API Information
        • API Headers
        • API Endpoint Parameters
        • API Query Parameters
        • Body Parameters
      • Editing a Custom API
      • Deleting a Custom API
    • Custom Database
    • Users
      • Inviting a New User
      • Deleting a User
      • Roles
        • Accessing User Roles
      • Assigning an Agent
      • Setting a Default Agent
    • Groups
      • Adding a New Group
      • Deleting a Group
      • Assigning a User
      • Removing a User
      • Adding an Agent
      • Removing an Agent
    • Agent Scanner Defaults
      • Toxicity
      • Personal Information
      • Topic Scanner
      • Prompt Injection Detection
      • Regex Scanner
      • Geographic Gating
      • Language Detection
      • Allowed File Types
    • Logs
      • Interpreting Logs
  • Server Admin
    • Upgrade
    • Default Agents
      • Adding a New Agent
    • Data Archive
    • API Access
      • Chat
        • List Agents
        • Create Conversation
        • List of Conversations
        • Get Conversations
        • Ask Agent
        • Chat with Agent
        • Add File to Conversation
        • Add Files to Agent
        • Deleting a File
      • OAuth2
        • OAuth2
        • OAuth2 Token
      • Users
        • List Users
        • Create User
        • Add User to Group
        • Set User Token
        • Delete User
      • How to Launch Our API Example
        • How the Code Works
    • Configure OAuth2
    • Custom Secrets
  • API Overview
    • Authentication
    • Calling the Scanner
    • Consuming the Results
    • 📃Pagination
      • Understanding API Parameters
      • Pagination Helper
      • Example Page
      • Recap
    • AIRisk API OAuth2 Authentication
      • Authorization
      • Authorization Endpoint
        • Example Authorization URL
        • Error Responses
      • Tokens
        • Error Handling
        • Generic vs. User-Specific Tokens
          • Example Usage Flow / Reasons
        • Usage of the Access Token
      • Token Endpoint
        • Example Token Request
        • Error Responses
      • Summary of OAuth2 Authorization Flow
  • Managing Your Account
    • Personal Data
  • Support
    • Onboarding Check List
  • Internal Deployment
    • Outlook Plugin
    • Firewall Rules
    • Infrastructure
    • Graph Connection Requirements
    • Zoom Transcripts
  • Example Python Application
  • Release Notes
    • V4.28
    • V4.12
    • V4.0
    • V3.71
    • V3.0 Beta
    • V2.23
    • V2.22
    • V2.120 HotFix
    • V2.103 June 1
Powered by GitBook
On this page
  1. Admin
  2. Users

Roles

In our system, there are four distinct user roles, each with specific permissions and responsibilities. Below is an overview of each user role:

  1. Company Admin:

    • The Company Admin role is the highest level of authority within the system.

    • Responsibilities:

      • Manage all aspects of the system, including user accounts, groups, agents, and settings.

      • Configure system-wide settings and permissions.

      • Access all features and functionalities of the admin panel.

    • Permissions:

      • Full control over user management, including creating, deleting, and modifying user accounts.

      • Access to all system settings and configurations.

      • Ability to assign roles and permissions to other users.

      • Complete access to all features and functionalities of the system.

  2. User:

    • The User role represents standard users of the system who perform day-to-day tasks.

    • Responsibilities:

      • Perform assigned tasks within the system based on their role and permissions.

      • Access and utilize features and functionalities assigned to them by the Company Admin.

    • Permissions:

      • Limited access to system settings and configurations.

      • Ability to perform tasks assigned to them by the Company Admin.

      • Access to features and functionalities relevant to their role.

  3. Monitor:

    • The Monitor role is responsible for monitoring activities and generating reports within the system.

    • Responsibilities:

      • Monitor user activities, interactions, and system performance.

      • Generate reports and analytics based on collected data.

    • Permissions:

      • Access to monitoring tools and reporting functionalities.

      • Ability to view and analyze user activities and system performance metrics.

      • Limited access to system settings and configurations.

  4. Compliance:

    • The Compliance role ensures adherence to regulatory requirements and internal policies within the system.

    • Responsibilities:

      • Enforce compliance standards and regulations within the organization.

      • Audit user activities and ensure compliance with company policies.

    • Permissions:

      • Access to compliance-related tools and functionalities.

      • Ability to perform audits and enforce compliance standards.

      • Limited access to system settings and configurations.

Note: User roles can be customized and tailored to meet the specific needs and requirements of your organization. Additionally, users can be assigned multiple roles or custom roles based on their responsibilities within the system.

PreviousDeleting a UserNextAccessing User Roles

Last updated 4 months ago