How can I manage permissions for short-term users or external collaborators?

When granting access to temporary users or contractors, assign roles and permissions suited to their limited responsibilities while keeping sensitive information protected. Custom roles can restrict access to only the features they need, ensuring data security is maintained throughout their engagement.

Effective management of temporary user access involves:

  1. Assign a limited role: Provide temporary users with a role that grants only the permissions necessary for their work.
  2. Regular oversight: Monitor their activity to ensure access aligns with their responsibilities and make adjustments as required.
  3. Data handover: Transfer any important data or ownership of links before ending access to prevent disruptions.
  4. Revoke access: Once the user’s tasks are completed, remove or modify their role to restrict further access.

Implementing these steps helps keep temporary access regulated and preserves data security, even though roles do not expire automatically.

For more information, see How does Cut0 manage user roles?