

In this topic, you can explore various scenarios that involve managing permissions.
See the following related pages:
System administrators have the highest level of managerial rights followed by workspace administrators. Standard users have limited administrative capabilities and primarily operate within the permissions assigned to them.
In the hierarchical structure of permissions, client domain permissions are positioned below system administrators but above workspace administrators and standard users. This arrangement facilitates the delegation of administrative tasks to a specific user group known as client domain admins. Unlike the System Administrator group, client domain admins have limited visibility and control confined to their designated client domain. This isolation feature ensures more precise administrative control over a defined segment of the environment, preventing unauthorized access or changes to the overarching RelativityOne instance.
Client domain admins possess the flexibility to adjust permission settings for various objects within their domain, customizing them to align with their specific preferences. However, these permissions are restricted solely to their allocated domain and do not extend beyond it. This protective measure guarantees that they cannot access or modify permissions beyond their designated client domain. By implementing client domain permissions, system administrators can proficiently oversee their domain while upholding the integrity and security of the broader Relativity environment.
Note: Violating the boundary of client domains in a system like Relativity can lead to significant risks and consequences, affecting data security, compliance, and overall system integrity. Client domains serve as isolated environments within the system, providing each client with a segregated space to manage their own data and operations independently.
User groups serve as a means to organize and manage users who share similar roles or permissions. You can assign user groups at either the workspace level or the system level, based on the intended extent of access and management. When assigned at the workspace level, user groups pertain to a particular workspace, governing the permissions and access rights within that workspace. On the other hand, at the system level, user groups have wider-ranging implications and can influence permissions and access across multiple workspaces within the Relativity environment.
Template groups can play a crucial role in efficiently copying over permissions. Template groups allow you to define and configure sets of permissions that can be applied to multiple workspaces or objects. You can create template groups to encompass specific permission settings. These can include object-level and item-level security, document-level security, and field-level security.
These templates provide predefined sets of permissions that can be applied to new workspaces. User groups can be added or removed from specific security workspace templates, allowing for granular control over access and permissions based on the needs of each template. This enables administrators to tailor the security settings for different types of workspaces. This guarantees users are assigned to appropriate groups with the necessary permissions for their roles.
Use Review templates for the review phase of a legal case or investigation. They provide tools and features for document review, coding, tagging, and production.
There are four main customizable Review Template groups:
Investigation templates are designed for conducting investigations and offer functionality for evidence management, interview coordination, case progress tracking, and report generation. Unlike Review templates that primarily concentrate on document review and tagging, Investigation templates prioritize broader facets of the investigative process and include several key functionality:
ECA templates focus on the initial assessment of a case or investigation. They provide tools for data ingestion, indexing, searching, and analysis to quickly identify key information used to make informed decisions. Here are some ways ECA templates differ from others:
With Security workspace templates, you can establish a secure environment within Relativity. Using these templates, you can define access controls, manage user permissions, and ensure data security within the workspace.
You can employ object-level security to restrict entry to specific documents or items within the workspace. These objects encompass various components such as workspaces, documents, fields, and other elements within the system.
Tailoring access to these objects can be done on an individual user or group basis. User access determines the extent of permissions and actions a specific user can perform. Group access simplifies the management of permissions for a set of users in the same category. By managing user or group access, you can determine who is authorized to view, edit, or carry out specific actions on the objects within the system.
Furthermore, objects can have document-level or field-level permission configurations. Document-level permissions allow you to control access to individual documents based on user roles or specific criteria. Similarly, field-level permissions offer the ability to regulate access to particular fields within a document. You can set restrictions on who is permitted to view or modify specific fields based on user or group permissions.
The Manage Object Types permission grants group members the ability to:
Item-level permission settings allow you to:
When the system determines access to an item, it first evaluates the workspace-level permission settings. Then it takes into account any item-level permission settings. If there's a conflict between item-level permissions and workspace-level permissions, the system enforces the more restrictive one.
To change item-level permission settings, you must navigate to the specific document or object and make changes individually.
The Document unitization solution allows users to split imaged documents into many child documents. This solution consists of several components, including the Relativity application, dynamic objects with associated object rules, event handlers, manager and worker agents, and views and layouts on the Document object.
To use the Document unitization solution, users must have the following permissions:
Take the following into consideration when using document unitization solution:
Note: The solution does not process any data in a workspace if the associated resource pool does not have its own manager and worker agents. In such cases, document unitization jobs will remain inactive in the queue.
Do the following to deploy and configure document unitization:
Setup:
You have two groups, Group A and Group B, and two workspaces, Workspace 1 and Workspace 2.
Group A has permission to use Staging Explorer, and permission to access Workspace 1. This is your typical Client Domain Admin group.
Group B has permission to access Workspace 2. This is a typical Review group.
If a user is in both Group A and Group B, they have three permissions:
User Groups |
Permissions |
Access to Workspaces |
---|---|---|
Group A (Client Domain Admin) |
Use Staging Explorer (instance-wide permission) |
Workspace 1 |
Group B (Review) |
Access to Workspace 2 |
Workspace 2 |
User in both Group A & B |
Use Staging Explorer (instance-wide permission) Access Workspace 1 & 2 |
Workspace 1 & 2 |
Note: In this case, because permissions are additive, and if the StagingPaneOnlyPerClientDomain setting is set to False or missing, a user in both groups can use Staging Explorer to access the files on file shares for both Workspaces 1 and 2, even though neither group explicitly gives permissions to use Staging Explorer on the Workspace 2 file share. For more information regarding this, see the Permissions section of the Staging Explorer
This tool is available for any email threading jobs that are run as full builds. Once the job is complete, you can access the visualization from the document viewer by opening a document.
Action | Object Security Permission | Item Security | Tab | Admin Operation |
---|---|---|---|---|
View Relativity Email Threads |
• View, Edit, Create, Delete, or Administer for Color Map • View, Edit, Create, Delete or Administer for Structured Analytics Set • View, Edit, Create, Delete, or Administer for Structured Analytics Results • Create, Read, Update, and Delete permissions on Email Thread, Document, and Saved Search objects. |
Gives group members the rights to select and re-assign an alias to a different entity when using name normalization in Analytics. | Email Threading | Email Thread Visualization |
To access and use the email thread visualization feature, it is essential to have certain security permissions in place.
Additionally, View security permissions are necessary for the following email fields:
If any of these security permissions are not in place, you will not be able to use the email thread visualization tool.
To create fields, the Relativity Application view permission must be set to View.
Action | Object Security Permission | Item Security | Tab | Admin Operation |
---|---|---|---|---|
Create Fields |
|
N/A | Workspace - Admin Fields | N/A |
To create fields, the Relativity Application view permission must be set to View.
Action | Object Security Permission | Item Security | Tab | Admin Operation |
---|---|---|---|---|
Add or Modify Layouts | View, Edit, Create | View, Edit | Workspace Details, Layouts, Layout Sets, Layout Templates, Dynamic Objects | N/A |
Updating the necessary permissions, like object security, tab visibility, and admin operations, are necessary when an admin group needs access to the Management Console or Cost Explorer.
Action | Object Security Permission | Item Security | Tab | Admin Operation |
---|---|---|---|---|
Management Console, Cost Explorer Access |
|
Any workspaces associated with the Management Console or Cost Explorer |
|
N/A |
Note: The Management Console or Cost Explorer object is an Admin Object, so permissions need to be set through the Instance details tab.
Check if the user has the Lockbox Manager security privilege assigned. If not, add the privilege to their security profile. Additionally, confirm the user has the Read permission for the relevant Lockbox folders.
Action | Object Security Permission | Item Security | Tab | Admin Operation |
---|---|---|---|---|
Lockbox feature access | View on the workspace object which allows you to access the workspace where the lockbox feature is configured. | View permission on the Lockbox object enables you to view and interact with the lockbox items within the workspace. | Custom tab |
Requires initial configuration and setup, including defining the lockbox object, customizing tabs, and configuring security settings. |
Check if the user has the necessary permissions to view or modify documents in the Lockbox folder. If not, assign the appropriate permissions to the user's security profile. Additionally, ensure that the Lockbox folder is not restricted to a specific group or user, and that the user has access to that group or user if necessary.
Action | Object Security Permission | Item Security | Tab | Admin Operation |
---|---|---|---|---|
Lockbox feature access |
|
|
Custom tab |
|
If your instance setting EnableCustomerLockBox is set to true, it disallows System admin accounts from accessing workspaces. Another system admin must add the user to the group with access to the desired workspace. Additionally, it may be related to your object and item security permissions.
Action | Object Security Permission | Item Security | Tab | Admin Operation |
---|---|---|---|---|
Unable to log-in. Receiving an error message indicating the default tab could not be determined. |
|
|
The default tab error typically refers to the initial tab that is displayed when you log-in. The exact name and content of this tab may vary depending on your organization’s configuration and customization. |
|
To confirm you possess the appropriate permissions, consult your workspace administrator. For a user to execute automated workflows, they must be affiliated with a group designated as a Workspace Admin or be part of the System Administrators group. Without authorization from an admin user, a non-administrator user cannot perform actions like viewing, editing, deleting, or adding automated workflows. Moreover, if a non-administrator user lacks the necessary permissions for those objects, they cannot edit or add dtSearch or search term reports actions.
Action | Object Security Permission | Item Security | Tab | Admin Operation |
---|---|---|---|---|
Create an Automated Workflow | The Create permission for the “Automated Workflow” item type. | The Create permission for “Automated Workflow” item type. |
|
N/A |
The user who created the automated workflow needs to confirm they have shared it with the appropriate group or individuals in their workspace. They can do this by going to the automated workflow's settings and selecting the Share option.
Action | Object Security Permission | Item Security | Tab | Admin Operation |
---|---|---|---|---|
Share an Automated Workflow | Confirm users who need access have at minimum the View permission on the object associated with the workflow. | Review item-level permission settings to confirm the affected users or groups have the necessary permissions to access and work with the automated workflow. | Security | N/A |
You can set permissions on the automated workflow to control who has access to it. This can be done by going to the automated workflow’s settings and selecting the Permissions option where you can specify which users or groups can access the automated workflow.
Action | Object Security Permission | Item Security | Tab | Admin Operation |
---|---|---|---|---|
Restrict access to an automated workflow | Restrict access to the Automated Workflow object. | Create permission for Automated Workflow item type. |
|
N/A |
You may not have the necessary permissions to modify automated workflows. Check with your workspace administrator to confirm you have the appropriate permissions.
Action | Object Security Permission | Item Security | Tab | Admin Operation |
---|---|---|---|---|
Modify an Automated Workflow | Allow the view and edit permissions for the Automated workflow object. | Edit for the Automated workflow. |
|
N/A |
The user who originally created the automated workflow may need to modify it to use fields that are accessible to all users who need to use it. It’s also necessary to check with your workspace administrator to confirm you have the appropriate permissions.
Action | Object Security Permission | Item Security | Tab | Admin Operation |
---|---|---|---|---|
Use an Automated Workflow with access to certain fields. | View, Edit, Create, and Delete on documents or custom objects the automated workflow interacts with. | Confirm you have the appropriate item security permissions to access the items relevant to the automated workflow. If the automated workflow requires modifying or updating specific fields for items, you should have the necessary item security permissions to perform those actions. | Security | To configure object and item security permissions, you need the necessary administrative roles or permissions to modify security settings. |
Set up workspace permissions that restrict access to specific documents, folders, or other items within the workspace. You can also assign different roles to different users, such as reviewer, editor, or admin, depending on their level of access and responsibility.
Action | Object Security Permission | Item Security | Tab | Admin Operation |
---|---|---|---|---|
Limit multiple users’ access to documents and data relevant to their work |
|
|
Workspace Security Console, Object Permissions tab, document security tab | N/A |
Create a new group or user role specifically for the vendor and set up workspace permissions that limit their access to only the documents and data that are relevant to their work. You can also use redaction or other security features to protect confidential information from unauthorized access.
Action | Object Security Permission | Item Security | Tab | Admin Operation |
---|---|---|---|---|
Limit third-party vendor workspace access to documents and data relevant to their work | View document, field, layout, and saved search. | Configure the security group’s item security permissions to restrict access to confidential or privileged data. |
|
N/A |
Use the built-in security features of Relativity’s workspace permissions to assign roles and permissions based on the user’s job responsibilities and level of access. Custom roles can also be established for groups with specific projects or workflows, guaranteeing that each user has access only to the necessary data.
Action | Object Security Permission | Item Security | Tab | Admin Operation |
---|---|---|---|---|
Grant a new team member access to a workspace with the appropriate permissions. |
|
View permissions on the user item allows the team member to view and access their own user profile and associated settings. |
|
|
Use Relativity's advanced permissions management tools, such as mass operations and custom permissions templates, to simplify the process of setting up and managing workspace permissions. You can also use reporting and auditing tools to track user activity and guarantee compliance with your organization's data security policies.
On this page
Why was this not helpful?
Check one that applies.
Thank you for your feedback.
Want to tell us more?
Great!