Sharing Permissions
  • 01 Dec 2025
  • Dark
    Light
  • PDF

Sharing Permissions

  • Dark
    Light
  • PDF

Article summary

Sharing permissions, sometimes referred to as grantee permissions, let you tailor access to a single object for a user or users.

Sharing permissions in Edit Query let you add individual users to a query

You’ll find sharing permissions in many Slate areas as Edit Permissions or Access Permissions. Depending on their location, these appear as buttons, tabs, or dropdowns.

In the Edit Permissions popup, you can select Add Grantee to grant a user permission to that object.

Locations in Slate

Sharing permissions are available for the following objects:

Adding grantees to an object

Select Add Grantee, or selecting an existing grantee from the list.

The following settings appear:

Active

 Set the sharing permission as Active or Inactive.

Type

  • User: Grant access for a specific Slate user.

  • Permission: Grant access for a specific permission. Any user with the chosen permission will be granted access.

  • Role: Grant access for any user assigned to a selected Role.

Some objects may also have special types that are not available for all objects, such as User Token or Username. Refer to the Knowledge Base article for a specific object to learn more on using these.

Permissions

Permissions to be granted will vary depending on the object type.

For example, queries will allow you determine whether the selected type can Display/Run or Edit a given query, while a knowledge source will only have a single option to allow that source to be Slate AI Searchable.

Once you select your desired settings, select Save. Your newly added permission is added to the list of grantees.

💾 Bookmark your objects

With the exception of views and knowledge sources, which grantees can access through the user interface, you must provide grantees a direct link to the objects you’ve shared with them. Encourage your grantees to bookmark this link.

Testing grantee access

If you have the Security Administrator exclusive permission, you can impersonate a user account that has been granted sharing permissions, and verify for yourself that their access is working as intended.

If you are not a Security Administrator, work directly with the user to verify that their newly granted access is working appropriately.


Was this article helpful?