Skip to main content

User Permissions

Control exactly what each user can see and do in Olympus Cloud. This guide covers the permission matrix, custom roles, row-level security, delegation workflows, access auditing, and SSO group integration.


Permission Model Overview

Olympus Cloud uses Role-Based Access Control (RBAC) with granular permissions. Each user is assigned one or more roles, and each role grants a specific set of permissions.

Organization
└── Roles (define permissions)
└── Users (assigned roles)
└── Locations (scope access)

Key Concepts

ConceptDescription
RoleA named collection of permissions (e.g., Manager, Scheduler)
PermissionA specific action a user can perform (e.g., approve_timesheet)
ScopeWhere a permission applies (organization-wide, location, department)
DelegationTemporarily granting permissions to another user

Built-In Roles

Olympus Cloud includes pre-configured roles that cover common use cases.

RoleDescriptionTypical Users
Organization AdminFull access to all features and settingsBusiness owners, IT admins
Location ManagerManage a specific location's staff and schedulesStore managers, site leads
Department ManagerManage a department within a locationKitchen manager, shift lead
SchedulerCreate and publish schedulesScheduling coordinators
TimekeeperApprove timesheets and manage time entriesPayroll coordinators
EmployeeView own schedule, clock in/out, request time offAll staff members
ViewerRead-only access to reports and dashboardsExecutives, auditors

Permission Matrix

Schedule Permissions

PermissionAdminLocation MgrDept MgrSchedulerTimekeeperEmployeeViewer
View all schedulesYesLocationDeptYesNoOwn onlyYes
Create schedulesYesYesDeptYesNoNoNo
Publish schedulesYesYesNoYesNoNoNo
Edit published schedulesYesYesNoYesNoNoNo
Approve shift swapsYesYesDeptYesNoNoNo
View open shiftsYesYesDeptYesNoOwn deptNo

Time and Attendance Permissions

PermissionAdminLocation MgrDept MgrSchedulerTimekeeperEmployeeViewer
View timesheetsYesLocationDeptNoYesOwn onlyYes
Approve timesheetsYesYesDeptNoYesNoNo
Edit time entriesYesYesDeptNoYesNoNo
Add manual entriesYesYesDeptNoYesNoNo
Delete time entriesYesNoNoNoNoNoNo
Configure overtime rulesYesNoNoNoNoNoNo

People Management Permissions

PermissionAdminLocation MgrDept MgrSchedulerTimekeeperEmployeeViewer
Add employeesYesYesNoNoNoNoNo
Edit employee profilesYesLocationDeptNoNoOwn onlyNo
Deactivate employeesYesNoNoNoNoNoNo
Assign rolesYesLimitedNoNoNoNoNo
View employee directoryYesYesYesYesYesYesNo
Approve time-off requestsYesYesDeptYesNoNoNo

Reporting Permissions

PermissionAdminLocation MgrDept MgrSchedulerTimekeeperEmployeeViewer
View standard reportsYesLocationDeptScheduleTimeOwn onlyYes
Create custom reportsYesYesNoNoNoNoNo
Export reportsYesYesDeptYesYesNoYes
Schedule reportsYesYesNoNoNoNoNo
View labor costsYesYesNoNoNoNoYes

System Administration Permissions

PermissionAdminLocation MgrDept MgrSchedulerTimekeeperEmployeeViewer
Manage integrationsYesNoNoNoNoNoNo
Configure locationsYesNoNoNoNoNoNo
Manage billingYesNoNoNoNoNoNo
View audit logYesNoNoNoNoNoNo
Configure SSOYesNoNoNoNoNoNo
Manage custom rolesYesNoNoNoNoNoNo

Custom Roles

Create roles tailored to your organization's needs when built-in roles do not match your requirements.

Creating a Custom Role

  1. Go to Settings > Roles & Permissions
  2. Click Create Role
  3. Enter a role name and description
  4. Select permissions from each category:
    • Check individual permissions to grant
    • Use Select All within a category for bulk selection
  5. Set the default scope:
    • Organization-wide: Access across all locations
    • Location-scoped: Access limited to assigned locations
    • Department-scoped: Access limited to assigned departments
  6. Click Save Role

Custom Role Best Practices

Principle of Least Privilege

Grant only the minimum permissions needed for a role. It is easier to add permissions later than to deal with the consequences of overly broad access. Start restrictive and expand based on actual needs.

PracticeDescription
Name clearlyUse descriptive names like "Payroll Coordinator" not "Custom Role 1"
Document the purposeAdd a description explaining who uses this role and why
Start with a templateClone a built-in role and modify it
Review quarterlyAudit custom roles every quarter for continued relevance
Limit admin-level rolesKeep the number of Organization Admin users minimal

Editing Custom Roles

  1. Go to Settings > Roles & Permissions
  2. Click on the role to edit
  3. Modify permissions as needed
  4. Click Save Changes
Impact of Role Changes

Changing a role's permissions immediately affects all users assigned to that role. Review the list of affected users before saving. Consider creating a new role instead of modifying a widely-used one.


Row-Level Security

Row-level security ensures users only see data relevant to their assigned locations and departments, even when they have broad feature permissions.

How It Works

User ScopeData VisibleExample
Organization-wideAll locations, all departmentsOrganization Admin sees everything
Location-scopedAll departments within assigned locationsDowntown Manager sees only Downtown data
Department-scopedOnly assigned department within assigned locationsKitchen Manager sees only Kitchen data at their location

Configuring Data Scope

  1. Go to Settings > Users
  2. Click on the user to configure
  3. Under Access Scope, assign:
    • Locations: Which locations this user can access
    • Departments: Which departments within those locations
  4. Save changes

Data Scope and Reports

Row-level security applies to all data views:

  • Dashboard widgets show only scoped data
  • Reports filter automatically based on user scope
  • Employee directory shows only employees in scope
  • Schedules display only relevant departments and locations
  • Time entries are limited to scoped employees

Delegation Workflows

Temporarily grant your permissions to another user during vacations, leaves, or role transitions.

Creating a Delegation

  1. Go to Profile > Delegation
  2. Click Create Delegation
  3. Select the delegate (the person receiving your permissions)
  4. Choose which permissions to delegate:
    • All permissions: Full delegation of your role
    • Specific permissions: Select individual permissions
  5. Set the delegation period:
    • Start date and time
    • End date and time
  6. Add a reason (optional but recommended)
  7. Click Activate Delegation

Delegation Rules

RuleDescription
Approval requiredDelegations require admin approval (configurable)
Maximum durationDelegations cannot exceed 30 days by default
No escalationA delegate cannot further delegate permissions
Audit trailAll delegated actions are logged with the delegate's identity
Auto-expiryDelegations automatically expire at the end date
Early terminationThe delegator or an admin can end a delegation early

Managing Active Delegations

Admins can view all active delegations at Settings > Security > Active Delegations:

  • See who has delegated to whom
  • View the permission set and duration
  • Revoke any delegation immediately if needed

Access Auditing

Track every permission-related action for compliance and security.

Audit Log

Access the audit log at Settings > Security > Audit Log.

Event TypeWhat Is Logged
Login eventsSuccessful and failed login attempts
Permission changesRole assignments, custom role modifications
Data accessReport views, data exports
Configuration changesSettings modifications, integration changes
Delegation eventsDelegation creation, activation, expiry
User managementAccount creation, deactivation, role changes

Filtering the Audit Log

FilterOptions
Date rangeSpecific dates or relative periods
UserSpecific user or all users
Event typeLogin, permission change, data access, etc.
Action resultSuccess or failure
IP addressFilter by source IP

Exporting Audit Data

  1. Apply your desired filters
  2. Click Export
  3. Choose format (CSV or PDF)
  4. Download the audit report
Audit Log Retention

Audit logs are retained for 12 months on Professional plans and 24 months on Enterprise plans. For compliance requirements beyond these periods, set up scheduled exports to your own archival system.


SSO Group Mapping

Map your identity provider's groups to Olympus Cloud roles for automated role assignment.

Supported Identity Providers

ProviderProtocolStatus
Google WorkspaceSAML 2.0 / OIDCSupported
Microsoft Entra IDSAML 2.0 / OIDCSupported
OktaSAML 2.0Supported
OneLoginSAML 2.0Supported

Setting Up SSO Group Mapping

  1. Go to Settings > Security > SSO Configuration
  2. Ensure SSO is configured and active (Enterprise plan required)
  3. Click Group Mapping
  4. For each IdP group, select the corresponding Olympus Cloud role:
IdP Group (Example)Olympus Cloud Role
olympus-adminsOrganization Admin
olympus-managersLocation Manager
olympus-schedulersScheduler
olympus-timekeepersTimekeeper
olympus-employeesEmployee
  1. Set the default role for users without a group match
  2. Enable Auto-Provisioning to create accounts on first SSO login
  3. Save the mapping

SSO Group Sync Behavior

EventBehavior
User logs in via SSORole updated based on current IdP group membership
User added to IdP groupRole updated on next login
User removed from IdP groupRole reverted to default on next login
User deactivated in IdPAccess denied on next login attempt
Group Mapping Override

When SSO group mapping is enabled, manual role assignments in Olympus Cloud are overwritten on the user's next SSO login. To make individual exceptions, add the user to the appropriate IdP group rather than assigning the role manually.