What is RBAC?

Converge Converge Team

Role-Based Access Control - permissions based on user roles

What is RBAC?

Role-Based Access Control (RBAC) assigns permissions to team members based on their role rather than individually. Common support roles include Agent (can view and respond to assigned conversations), Admin (can manage team settings, routing rules, and integrations), and Owner (full access including billing and data export). Each role has a defined set of permissions that determine what the user can see and do.

RBAC simplifies permission management—instead of configuring access for each person individually, you assign them a role and they inherit all its permissions. When responsibilities change, you update the role assignment rather than reconfiguring individual permissions.

Why RBAC Matters

RBAC prevents unauthorized access to sensitive customer data and critical system settings. An L1 agent shouldn't be able to delete customer records, change billing plans, or modify routing rules. Without RBAC, every team member has the same access level, creating security risks and the potential for accidental configuration changes.

RBAC also supports compliance requirements. Many industries require audit trails showing who accessed what data and who made what changes. Role-based permissions create clear boundaries that simplify compliance documentation and reduce audit scope.

RBAC in Practice

A support team defined 3 roles: Agent (view assigned conversations, use templates, add notes), Admin (manage team members, configure routing, view analytics), and Owner (billing access, data export, integration management). When an agent accidentally changed a routing rule that misdirected 50 conversations, they restructured permissions so only Admins could modify routing. The accidental misconfiguration never happened again.

Related Terms

Related Reading

Frequently Asked Questions

At minimum: Agent (daily conversation handling), Admin (team and settings management), and Owner (billing and full access). Larger teams might add: Senior Agent (can handle escalations and reassign), Quality Reviewer (can review conversations but not respond), and Manager (analytics access without configuration rights).
In most systems, a person has one role that encompasses their full permission set. If you need hybrid permissions, create a custom role that combines the specific permissions needed. Avoid giving everyone the Admin role as a shortcut—it defeats the purpose of RBAC.
RBAC defines what actions each role can perform. Team hierarchy defines reporting relationships and oversight. A team lead might have the Admin role (can manage agents) while a senior agent has the Agent role with additional permissions (can escalate and reassign). Keep roles and hierarchy aligned.