Roles & Permissions
The Zild Platform enforces access control through a Role-Based Access Control (RBAC) model. All access is:- Authenticated
- Tenant-scoped
- Role-based
- Explicitly authorized
Access Control Model
Zild applies authorization in three layers:- Tenant isolation
- Role-based permission evaluation
- Conversation-level access control
- Identity authentication
- Tenant resolution
- Role validation
- Resource-level permission check
Tenant Isolation
Each user belongs to a single Tenant. Permissions are always evaluated inside that Tenant’s boundary. This guarantees:- No cross-tenant data access
- No cross-tenant configuration access
- No cross-tenant conversation visibility
- API layer
- Admin interface
- Data access layer
- Workflow execution layer
Role Model Overview
Zild defines three primary roles:- Administrator
- Supervisor
- User
Administrator
The Administrator has full access within the Tenant. This role is intended for system owners and technical administrators.Permissions
Administrators can:- Manage users and assign roles
- Configure Apps (WhatsApp, Voice, Webchat)
- Create and edit Agents
- Create and manage Workflows
- Configure Integrations
- View and manage all Conversations
- Access analytics and reports
- Rotate API keys
- Modify Tenant settings
Supervisor
The Supervisor has operational visibility and control over a specific group. Supervisors manage teams and oversee conversation quality.Permissions
Supervisors can:- View conversations assigned to their group
- Reassign conversations within their group
- Escalate conversations
- Close conversations
- Monitor conversation performance
- View group-level analytics
- Modify Tenant settings
- Manage API credentials
- Create or modify system-level integrations
- Access conversations outside their assigned group
User
The User is an operational role with limited scope. Users typically represent front-line agents.Permissions
Users can:- View conversations assigned to them
- Respond to their assigned conversations
- Escalate conversations
- Close conversations
- View conversations assigned to other users
- Access conversations outside their group
- Modify system configuration
- Manage Agents, Apps, or Workflows
- Access Tenant-level settings
Group-Based Access Control
Supervisors and Users operate within groups. A group typically represents:- A department
- A support team
- A sales team
- A business unit
- Administrator → All conversations
- Supervisor → Conversations within their group
- User → Conversations assigned to them only
Conversation-Level Authorization
When a conversation is accessed:- User identity is authenticated
- Tenant is resolved
- Role is identified
- Group association is checked (if applicable)
- Assignment ownership is validated
Security Enforcement
Authorization checks are enforced at:- API endpoints
- Admin interface actions
- Conversation retrieval queries
- Workflow execution triggers
Audit Logging
The platform logs security-relevant actions, including:- Role assignments
- User creation and modification
- Conversation reassignment
- Escalation actions
- Configuration changes
- Operational traceability
- Compliance auditing
- Security investigation
Principle of Least Privilege
Zild follows the principle of least privilege:- Users only access their own conversations
- Supervisors only access their group
- Administrators manage system configuration
Summary
The Zild permission model is structured around:- Tenant isolation
- Role-based access control
- Group-level segmentation
- Conversation-level ownership enforcement
- Administrator — Full access
- Supervisor — Group-level visibility
- User — Own conversations only