Sharing permissions, sometimes referred to as grantee permissions, let you tailor access to a single object for a user or group of users.

Sharing permissions in Edit Query let you add individual users to a query
You’ll find sharing permissions in many Slate areas as Edit Permissions or Access Permissions. Depending on their location, these appear as buttons, tabs, or dropdowns.
In the Edit Permissions popup, you can select Add Grantee to grant a user permission to that object.
Locations in Slate
Sharing permissions are available for the following objects:
Adding grantees to an object
Select Add Grantee, or select an existing grantee from the list.
The following settings appear:
Active
Set the sharing permission as Active or Inactive.
Type
User: Grant access for a specific Slate user.
Permission: Grant access for a specific permission. Any user with the selected permission will be granted access.
Role: Grant access for any user assigned to a selected Role.
Some objects may also have special types that are not available for all objects, such as User Token or Username. Refer to the Knowledge Base article for a specific object to learn more about using special types.
Permissions
Permissions to be granted will vary depending on the object type.
For example, queries will allow you to determine whether the selected type can Display/Run or Edit a given query, while a knowledge source has a single option to allow the source to be Slate AI Searchable.
Once you select your desired settings, select Save. Your newly added permission is added to the list of grantees.
💾 Bookmark your objects
With the exception of views and knowledge sources, which grantees can access through the user interface, you must provide grantees a direct link to the objects you’ve shared with them. Encourage your grantees to bookmark this link.
Testing grantee access
If you have the Security Administrator exclusive permission, you can impersonate a user account that has been granted sharing permissions and verify that their access is working as intended.
If you are not a Security Administrator, work directly with the user to verify that their newly granted access is working as intended.