Search K
Appearance
Appearance
Capture uses role-based access control (RBAC) to determine who can create, view, and act on captures. Security is configured at the template level and enforced consistently across all capture interfaces.
Each Capture Template defines which roles are allowed to:
Users are assigned roles in:
Console → User Management
When a user attempts to interact with Capture, the system checks:
Grants: Ability to create new captures from this template
Typical roles:
Use when: These users initiate the process
Grants: Ability to see captures in the inbox and view details
Typical roles:
Use when: These users need visibility but may not create captures
Grants: Ability to complete the capture with approval decision
Only applies to: Approve/Reject submission type
Typical roles:
Use when: These users have authority to make approval decisions
Template: Submit type Security:
Use case: Anyone can submit, everyone can see submissions Example: IT help desk requests, general inquiries
Template: Approve/Reject type Security:
Use case: Junior creates, senior reviews and approves Example: Engineering drawing reviews, design approvals
Template: Approve/Reject type Security:
Use case: Automation creates captures, specific reviewers handle them Example: AI output validation, automated quality checks
Template: Any type Security:
Use case: Confidential or sensitive processes Example: Executive approvals, confidential transmittals
Begin with broader access and narrow down based on actual requirements. Over-restriction creates friction and workarounds.
Example:
For accountability and audit purposes, avoid allowing the same role to both create and approve captures.
Good:
Risky:
Maintain documentation of:
This helps with:
Before deploying, test with accounts having different role assignments:
Consider what happens when:
Ensure you have processes for:
Security is enforced at all interaction points:
Checked: Does user have Create access? Location: Mesh, Inbox, API
Checked: Does user have View access? Result: Only shows captures user can access
Checked: Does user have View access? Result: Access denied if no permission
Checked: Does user have appropriate access level? Result: Actions available based on role
Checked: Does user have Approve/Reject access? Result: Action blocked if insufficient permission
Requirement: First-level and second-level reviewers with different permissions
Solution:
Requirement: Access varies by project
Solution Option 1 - Multiple Templates:
Solution Option 2 - Dynamic Fields:
Requirement: External users need review access but limited system access
Solution:
Important distinction:
Controlled by template role configuration:
Controlled by Model Viewing Service Account:
Note: Reviewers may see artifacts in Capture that they couldn't normally access in Vault. This is intentional—the service account provides the necessary access for review purposes.
Capture provides complete audit trail:
For regulated industries:
Use Capture data for:
Check:
Check:
Check:
Check:
Continue with configuration topics: