What is RBAC?
Role-Based Access Control - permissions based on user roles
What is RBAC?
Role-Based Access Control (RBAC) assigns permissions to team members based on their role rather than individually. Common support roles include Agent (can view and respond to assigned conversations), Admin (can manage team settings, routing rules, and integrations), and Owner (full access including billing and data export). Each role has a defined set of permissions that determine what the user can see and do.
RBAC simplifies permission management—instead of configuring access for each person individually, you assign them a role and they inherit all its permissions. When responsibilities change, you update the role assignment rather than reconfiguring individual permissions.
Why RBAC Matters
RBAC prevents unauthorized access to sensitive customer data and critical system settings. An L1 agent shouldn't be able to delete customer records, change billing plans, or modify routing rules. Without RBAC, every team member has the same access level, creating security risks and the potential for accidental configuration changes.
RBAC also supports compliance requirements. Many industries require audit trails showing who accessed what data and who made what changes. Role-based permissions create clear boundaries that simplify compliance documentation and reduce audit scope.
RBAC in Practice
A support team defined 3 roles: Agent (view assigned conversations, use templates, add notes), Admin (manage team members, configure routing, view analytics), and Owner (billing access, data export, integration management). When an agent accidentally changed a routing rule that misdirected 50 conversations, they restructured permissions so only Admins could modify routing. The accidental misconfiguration never happened again.