Embedded users inherit WisdomAI’s role-based access control (RBAC) system. The role you assign when provisioning a user controls what they can see and do inside the embedded interface. There is no separate embed-specific permission layer.Documentation Index
Fetch the complete documentation index at: https://docs.wisdom.ai/llms.txt
Use this file to discover all available pages before exploring further.
Custom roles are not yet supported. You must use one of the built-in roles listed below.
How roles affect embedded views
Visibility of edit controls, dashboard creation buttons, and AI workstreams is determined by the user’s role assignment. To hide edit controls in an embedded dashboard, assign the user the Viewer role. This role is pure read-only and cannot create or modify any resources.For a full breakdown of what each role can access, see the Roles & Permission Reference below.
Assigning a role at provisioning time
Pass the specificroleId in the roleAssignments array when calling createUsers. Role IDs are unique UUIDs.
Role IDs
Role IDs are passed in theroleAssignments field when provisioning or updating users.
| Role | ID |
|---|---|
ADMIN | 00000000-0000-0000-0000-000000000001 |
DATA_ADMIN | 00000000-0000-0000-0000-000000000004 |
EXPLORER | 00000000-0000-0000-0000-000000000002 |
BASIC_EXPLORER | 00000000-0000-0000-0000-000000000015 |
VIEWER | 00000000-0000-0000-0000-000000000003 |
OBSERVER | 00000000-0000-0000-0000-000000000007 |
roleAssignments field of the following mutations:
createUsers— assign a role when provisioning a new embedded usersetUserAttributes— update the role of an existing embedded useraddScopeRoleAssignmentsForSharing— grant a scoped role on a specific dashboardremoveScopeRoleAssignmentsForSharing— remove a scoped role from a specific dashboard
Roles & permission reference
The tables below show the full permission breakdown across all roles and resource types. Use these as a reference when deciding which role to assign for a given use case.In the API, Story refers to Dashboards. Roles labeled Writer grant edit access to existing resources but do not grant permission to create new ones.
Role scope & capabilities
Role scope & capabilities
| Role | Scope | Dashboards | Chat / Q&A | SQL editing | AI workstream | Create resources |
|---|---|---|---|---|---|---|
ADMIN | Organization | Create, Read, Clone | Create | Yes | Yes | Yes |
DATA_ADMIN | Domain | Create, Read, Clone | Create | Yes | Yes | Yes |
EXPLORER | Domain | Create, Read (owned or assigned) | Create | Yes | Yes | No |
BASIC_EXPLORER | Domain | Create, Read (owned or assigned) | Create | No | No | No |
VIEWER | Organization | Read only | Read only | No | No | No |
OBSERVER | Organization | No | No | No | No | No |
AD (Admin) · DA (Data Admin) · EX (Explorer) · BE (Basic Explorer) · VI (Viewer) · OB (Observer)Granular permissions
Granular permissions
Chat
Chat
| Permission | AD | DA | EX | BE | VI | OB |
|---|---|---|---|---|---|---|
chat:create | ✅ | ✅ | ✅ | ✅ | ❌ | ❌ |
chat:execute-sql | ✅ | ✅ | ✅ | ✅ | ❌ | ❌ |
chat:edit-sql | ✅ | ✅ | ✅ | ❌ | ❌ | ❌ |
chat:expand-workstream | ✅ | ✅ | ✅ | ❌ | ❌ | ❌ |
chat:read-all | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ |
Dashboard
Dashboard
| Permission | AD | DA | EX | BE | VI | OB |
|---|---|---|---|---|---|---|
dashboard:create | ✅ | ✅ | ✅ | ✅ | ❌ | ❌ |
dashboard:clone | ✅ | ✅ | ❌ | ❌ | ❌ | ❌ |
dashboard:read | ✅ | ✅ | ❌ | ❌ | ✅ | ❌ |
dashboard:write | ❌ | ❌ | ❌ | ❌ | ❌ | ❌ |
Users can always view, edit, and clone dashboards they created themselves or that have been shared with them.
Schedule
Schedule
| Permission | AD | DA | EX | BE | VI | OB |
|---|---|---|---|---|---|---|
schedule:create | ✅ | ✅ | ✅ | ✅ | ❌ | ❌ |
schedule:read | ✅ | ✅ | ❌ | ❌ | ✅ | ❌ |
schedule:write | ❌ | ❌ | ❌ | ❌ | ❌ | ❌ |
Users can always view and edit schedules they created themselves or that have been shared with them.
Agent
Agent
| Permission | AD | DA | EX | BE | VI | OB |
|---|---|---|---|---|---|---|
agent:read | ✅ | ✅ | ✅ | ✅ | ✅ | ❌ |
agent:write | ✅ | ✅ | ❌ | ❌ | ❌ | ❌ |
Users can always view and edit agents they created themselves or that have been shared with them.
Connection
Connection
| Permission | AD | DA | EX | BE | VI | OB |
|---|---|---|---|---|---|---|
connection:create | ✅ | ✅ | ❌ | ❌ | ❌ | ❌ |
connection:read | ✅ | ✅ | ❌ | ❌ | ❌ | ❌ |
connection:write | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ |
connection:delete | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ |
connection:refresh | ✅ | ✅ | ❌ | ❌ | ❌ | ❌ |
connection:list | ✅ | ✅ | ❌ | ❌ | ❌ | ❌ |
Domain
Domain
| Permission | AD | DA | EX | BE | VI | OB |
|---|---|---|---|---|---|---|
domain:create | ✅ | ✅ | ❌ | ❌ | ❌ | ❌ |
domain:list | ✅ | ✅ | ❌ | ❌ | ❌ | ❌ |
domain:invite | ✅ | ✅ | ❌ | ❌ | ❌ | ❌ |
IAM
IAM
| Permission | AD | DA | EX | BE | VI | OB |
|---|---|---|---|---|---|---|
iam:read | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ |
iam:write | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ |
iam:delete | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ |
iam-scope:write | ✅ | ✅ | ✅ | ✅ | ❌ | ❌ |
Workspace
Workspace
| Permission | AD | DA | EX | BE | VI | OB |
|---|---|---|---|---|---|---|
workspace:read | ✅ | ❌ | ❌ | ❌ | ✅ | ✅ |
workspace:write | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ |
workspace:create | ❌ | ❌ | ❌ | ❌ | ❌ | ❌ |
workspace:delete | ❌ | ❌ | ❌ | ❌ | ❌ | ❌ |
Permission reference
Permission reference
The table below describes what each API permission flag controls.
| API permission | Feature |
|---|---|
chat:create | Ask questions |
chat:execute-sql | Run SQL |
chat:edit-sql | Edit SQL |
chat:expand-workstream | AI workstream |
chat:read-all | View chat log |
dashboard:create | Create dashboards |
dashboard:read | View dashboards |
dashboard:write | Edit dashboards |
dashboard:clone | Clone dashboards |
schedule:create | Create schedules |
schedule:read | View schedules |
schedule:write | Edit schedules |
agent:read | View agents |
agent:write | Edit agents |
connection:create | Create connections |
connection:read | View connections |
connection:write | Edit connection configuration |
connection:delete | Delete connections |
connection:refresh | Refresh metadata |
connection:list | List connections |
domain:create | Create domains |
domain:list | List domains |
domain:invite | Invite users to a domain |
iam:read | View users and roles |
iam:write | Manage users and roles |
iam:delete | Remove users and roles |
iam-scope:write | Assign scoped roles |
workspace:read | View workspace |
workspace:write | Edit workspace |
Related articles
Create Users
Provision embedded users with role assignments
Embed a Dashboard
Use roles to control edit access in embedded dashboards