Skip to main content
Cendra’s role-based access control (RBAC) system lets you create custom roles with granular permissions. Control exactly who on your team can access which features and perform which actions.

How Permissions Work

Permissions follow the format resource:action. Each role defines which resource-action combinations are allowed.

Resources

ResourceWhat it controls
messageInbox conversations and guest messages
agentAI agent configuration and management
knowledgebaseKnowledge base articles and content
labelLabels and condition rules
sandboxSandbox testing environment
workspaceWorkspace settings and configuration
workspaceuserTeam member management
propertyProperty details and configuration
bookingReservation data and management
taskIssues and task management
upsellUpsell campaigns and tracking
notificationNotification preferences
userUser profile management
roleRole creation and permission editing

Actions

ActionDescription
viewRead-only access
editModify existing items
createCreate new items
deleteRemove items

Creating Custom Roles

  1. Navigate to Settings → Workspace → Roles
  2. Click Create Role
  3. Name the role (e.g., “Property Manager”, “Guest Support”, “Admin”)
  4. Toggle permissions on/off for each resource-action combination
  5. Save the role

Example Roles

RolePermissions
AdminFull access to everything
Property ManagerView/edit properties, bookings, messages. No access to workspace settings or billing.
Guest SupportView/edit messages, view properties and bookings. No agent configuration.
ViewerView-only access to messages, properties, and dashboard

Property-Level Access

Beyond role-based permissions, you can restrict team members to specific properties. A team member with “Guest Support” role restricted to 3 properties will only see messages and bookings for those properties.