Skip to content

Commit 2448763

Browse files
committed
docs: table & field permissions
Signed-off-by: Raju Udava <86527202+dstala@users.noreply.github.com>
1 parent 4ef5e8d commit 2448763

File tree

4 files changed

+52
-48
lines changed

4 files changed

+52
-48
lines changed

content/docs/roles-and-permissions/field-permissions.mdx

Lines changed: 16 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ tags: ['Field', 'Permissions']
55
keywords: ['Field permissions', 'NocoDB field permissions', 'NocoDB roles', 'NocoDB permissions', 'NocoDB field permissions overview']
66
---
77

8-
<Callout type="info">Field permissions are available in NocoDB cloud- Team plan onwards and Self hosted Enterprise plans</Callout>
8+
<Callout type="info">Available on NocoDB Cloud from the **Team** plan onwards, and in **Self-hosted Enterprise** editions.</Callout>
99

1010
Field permissions in NocoDB allow you to control who can edit values in specific fields in a table. This feature is particularly useful for managing sensitive data or ensuring that only authorized users can modify certain information.
1111

@@ -27,27 +27,29 @@ You can assign different levels of access to each field. The available options a
2727
|--------------------|----------------------------------------------------------------------|
2828
| **Editors & up** | Members with **Editor**, **Creator**, or **Owner** roles *(default)* |
2929
| **Creators & up** | Members with **Creator** or **Owner** roles |
30-
| **Specific users** | A custom list of selected members |
30+
| **Specific users** | Selected members or teams |
3131
| **Nobody** | No one can edit this field |
3232

3333
By default, users with **Editor** role and above can edit data in all fields in a table.
3434
* Select **Creators & up** to prevent editors from editing values in this field.
3535
* Select **Nobody** to disable editing values for all users in this field.
36-
* Select **Specific users** to grant access only to selected members.
37-
> Only members with **Editor**, **Creator**, or **Owner** roles are available for selection in the dropdown for specific user selection.
36+
* Choose **Specific users** to allow only selected members or teams to edit this field.
37+
38+
<Callout type="info">Only members and teams with **Editor**, **Creator**, or **Owner** roles can be selected for specific access configuration.</Callout>
3839

3940
![Field permissions](/img/v2/permissions/field-permissions-3.png)
4041

41-
<Callout type="info">
42-
Additional notes on field permissions:
43-
- Field permissions do not affect the ability to view records in the table. Users with access can still view all records, but their ability to edit values in specific fields will be restricted based on the permissions set.
44-
- Field permissions are applied at the field level, meaning they affect all records within that table for the specified field. Cannot be set for individual / selected records.
45-
- Field permissions are independent of table permissions. You can set field permissions without enabling table permissions, and vice versa.
46-
- Field permissions also restrict the ability to edit values via API calls and shared forms.
47-
- Field permissions can be set for all field types except for the following field type, as these fields are calculated / system fields and cannot be edited directly.
48-
- formula, rollup, lookup, created-by, last-updated-by, created-at, last-updated-at, button, qr-code, barcode
49-
- For **LinkToAnotherRecord** field type, only the source table LTAR field permission will suffice to control the ability to edit the field (add / remove links). The related table LTAR field permissions will not be accounted for. For example: Country [has-many] City, if the user has permission to edit the Country table, they will be able to add / remove links to City table records in the Country table, even if they do not have permission to edit the City table related LTAR field.
50-
</Callout>
42+
### **Additional Notes on Field Permissions**
43+
44+
* Field permissions **do not control field visibility** — users with access can still view all field data, but their ability to edit values in specific fields depends on the configured permissions.
45+
* Permissions are applied at the **field level**, affecting all records in the table for that specific field. They cannot be configured for individual or selected records.
46+
* Field permissions operate **independently** of table permissions. You can configure field permissions without enabling table permissions, and vice versa.
47+
* Field permissions also apply to **API calls** and **shared forms**, restricting the ability to modify field values through these interfaces.
48+
* Field permissions can be set for all field types except the following, as these are **calculated or system fields** and cannot be edited directly:
49+
* *Formula*, *Rollup*, *Lookup*, *Created By*, *Last Updated By*, *Created At*, *Last Updated At*, *Button*, *QR Code*, *Barcode*
50+
* For **Link to Another Record (LTAR)** fields, only the source table’s LTAR field permission determines editability (add/remove links). The related table’s LTAR permissions are not considered.
51+
* *Example:* If **Country** has many **Cities**, and a user has permission to edit the LTAR field in the **Country** table, they can add or remove links to **City** records from the **Country** table — even if they lack edit permission for the **City** table’s corresponding LTAR field.
52+
5153

5254
## Permissions Overview
5355

content/docs/roles-and-permissions/table-permissions.mdx

Lines changed: 36 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -5,70 +5,72 @@ tags: ['Table', 'Permissions']
55
keywords: ['Table permissions', 'NocoDB table permissions', 'NocoDB roles', 'NocoDB permissions', 'NocoDB table permissions overview']
66
---
77

8-
Table permissions in NocoDB let you control who can create or delete records in each table. This feature helps teams enforce stricter access control while still allowing collaborative workflows.
8+
Table permissions in NocoDB allow you to control who can create or delete records in each table. This feature helps maintain data integrity while supporting flexible and collaborative workflows.
99

10-
<Callout type="info">Table permissions are available in NocoDB cloud- Team plan onwards and Self hosted Enterprise plans</Callout>
10+
<Callout type="info">Available on NocoDB Cloud from the **Team** plan onwards, and in **Self-hosted Enterprise** editions.</Callout>
1111

1212
## Enabling Table Permissions
13-
To configure permissions on a specific table:
13+
14+
To configure permissions for a specific table:
15+
1416
1. Click the `` icon next to the table name in the sidebar.
1517
2. Select **Edit table permissions**.
16-
3. Use the dropdowns to control who can:
17-
- Create records
18-
- Delete records
18+
3. Use the dropdown menus to define who can:
19+
* Create records
20+
* Delete records
1921

2022
![Table permissions](/img/v2/permissions/table-permissions-1.png)
2123

2224
![Table permissions](/img/v2/permissions/table-permissions-2.png)
2325

2426
## Permission Levels
2527

26-
You can assign different levels of access to each action (create record / delete record). The available options are:
28+
You can assign different access levels for each action (create or delete record). The available options are:
29+
30+
| Option | Who gets access |
31+
|-----------------------------|----------------------------------------------------------------------|
32+
| **Editors & up** | Members with **Editor**, **Creator**, or **Owner** roles *(default)* |
33+
| **Creators & up** | Members with **Creator** or **Owner** roles |
34+
| **Specific users or teams** | Selected members or teams |
35+
| **Nobody** | No one can perform this action |
2736

28-
| Option | Who gets access |
29-
|--------------------|----------------------------------------------------------------------|
30-
| **Editors & up** | Members with **Editor**, **Creator**, or **Owner** roles *(default)* |
31-
| **Creators & up** | Members with **Creator** or **Owner** roles |
32-
| **Specific users** | A custom list of selected members |
33-
| **Nobody** | No one can perform this action |
37+
By default, members with the **Editor** role and above can create and delete records in a table.
3438

35-
By default, users with **Editor** role and above can create and delete records in a table.
36-
* Select **Creators & up** to prevent editors from performing these actions.
37-
* Select **Nobody** to disable record creation or deletion for all users.
38-
* Select **Specific users** to grant access only to selected members.
39+
* Choose **Creators & up** to restrict these actions to creators and owners.
40+
* Choose **Nobody** to disable record creation or deletion entirely.
41+
* Choose **Specific users or teams** to grant access only to selected members or teams.
3942

40-
> Only members with **Editor**, **Creator**, or **Owner** roles are available for selection in the dropdown for specific user selection.*
43+
<Callout type="info">Only members and teams with **Editor**, **Creator**, or **Owner** roles can be selected for specific access configuration.</Callout>
4144

4245
![Table permissions](/img/v2/permissions/table-permissions-3.png)
4346

44-
<Callout type="info">
45-
Additional notes on table permissions:
46-
- Table permissions does not affect the ability to view records in the table. Users with access can still view all records, but their ability to create or delete records will be restricted based on the permissions set.
47-
- Table permissions are applied at the table level, meaning they affect all records within that table. Cannot be set for individual / selected records.
48-
- Table permissions are independent of field permissions. You can set table permissions without enabling field permissions, and vice versa.
49-
- Table permissions also restrict the ability to
50-
- create or delete records via API calls and
51-
- create records using shared forms.
52-
</Callout>
47+
48+
### Additional Notes on Table Permissions
49+
50+
* Table permissions **do not control record visibility** — users with access can still view all records. However, their ability to create or delete records depends on the configured permissions.
51+
* Permissions are applied at the **table level** and affect all records within that table. They cannot be defined for individual records or specific subsets.
52+
* Table permissions function **independently** of field permissions; each can be configured separately.
53+
* Table permissions also apply to:
54+
* Record creation or deletion via **APIs**, and
55+
* Record creation through **shared forms**.
5356

5457
## Permissions Overview
5558

56-
Permissions overview provides a quick summary of the current table & field permissions in a consolidated tabular view.
59+
The permissions overview provides a consolidated summary of table and field permissions across the base.
5760

5861
To access the permissions overview:
59-
1. Go to base homepage (Click `Overview` in the sidebar).
62+
63+
1. Go to the base homepage (click **Overview** in the sidebar).
6064
2. Click the **Permissions** tab.
6165

6266
![Permissions overview](/img/v2/permissions/permissions-overview-1.png)
6367

64-
Subsequently, you can select the table for which you want to view the permissions overview. The overview will display field permissions in addition to table permissions, allowing you to see who can create or delete records in each table, as well as which fields are editable and by whom.
68+
Select the table you want to review. The overview displays both table and field permissions, showing which members or teams can create or delete records and which fields are editable by whom.
6569

6670
![Permissions overview](/img/v2/permissions/permissions-overview-2.png)
6771

68-
`Permissions overview` can also be accessed from the table / field permission configuration modal.
72+
You can also open the **Permissions overview** directly from the table or field permission configuration modal.
6973

7074
![Permissions overview](/img/v2/permissions/permissions-overview-3.png)
7175

72-
73-
74-
76+
---
-51.6 KB
Loading
-49.3 KB
Loading

0 commit comments

Comments
 (0)