Skip to main content
All CollectionsRoles and PermissionsTailoring Custom Permission Sets
Managing Permissions for Client and Contact Management
Managing Permissions for Client and Contact Management

Tailor who can view, add, and manage data for your clients and contacts with custom permission sets.

Updated over a week ago

To effectively manage access to sensitive information within your organization, Productive offers customizable permission sets, including options for clients and contacts.

Here’s how you can customize these permissions to ensure that only authorized users have access to data specific to your clients and contacts.

Custom permission sets are available on the Ultimate subscription plan.

Setting Up Custom Permission Sets

1) Create a New Permission Set

To begin, navigate to Settings > Permission sets and select "+ New permission set." This will allow you to build a tailored set of permissions that you can apply to your users.

2) Adjusting Permissions for Contacts & Clients

This section allows you to manage permissions for client and contact data.

Key options include:

  • View Contacts
    Specify who can view contact information.

  • Add, Edit, and Delete Contacts
    Control who can manage contact entries within your organization.

  • View Contact Custom Fields
    Decide who can see non-sensitive custom fields associated with contacts and clients.

  • Edit Contact Custom Fields
    Control access to editing custom fields related to contacts and clients.

  • View Sensitive Contact Custom Fields
    Restrict who can access sensitive information in custom fields, both for contacts and clients.

  • Add, Edit, and Delete Sensitive Contact Custom Fields
    Define which users can manage sensitive contact data for clients and contacts.

  • Add, Edit, and Delete Clients
    Determine which users have access to manage client information.

  • View Clients
    Set permissions for viewing client data.

Note: Client and Contact custom fields are located in Settings > Custom fields​ > Contacts.

Finalizing and Applying Permissions

After configuring the permissions to suit your needs, save your new permission set and assign it to the relevant users.

This setup ensures that your organization’s data is protected, with access granted only to those who need it.

Did this answer your question?