Role-Based Access Control (RBAC)
To ensure that personal data and sensitive business information are only available to authorized staff, Intric uses strict role-based access control (RBAC). This system is central to meeting the GDPR’s requirements for data minimization and data protection by design.
Overall permission structure
Intric’s permission model is built in a hierarchy to give maximum flexibility and security:
- Organization/Workspace: The top level where overall settings and user management are handled.
- Spaces: Logical groupings (e.g. departments or projects) where access is controlled at group level.
- Collections: Specific folders or subject areas within a Space where documents are stored.
Defined roles
Users’ permissions in the platform are determined by their assigned role. Roles can be assigned both at organization level and for specific Spaces to control access and functionality. For roles within a Space:
| Role | Description | Key functions |
|---|---|---|
| Owner | The organization’s owner/administrator. | Full control over organization settings, user management, groups, SSO configuration, and billing. |
| Creator | Content creator / contributor. | Can upload documents, create and manage content in Collections, and interact fully with AI Assistants. |
| User | End user / reader. | Can search, read documents, and ask questions to AI Assistants, but cannot upload, change, or delete data. |
Spaces and Collections: Granular control
Access control in Intric is based on the principle of need-to-know. This is handled through granular control at Space and document level.
- Spaces as access boundary: Access is controlled by inviting specific users or groups to a Space. A user who is not a member of a Space cannot see its documents, search results, or the Assistants linked to that Space.
- Private Spaces: For particularly sensitive information (e.g. management documentation or specific HR matters), private Spaces can be created. These are hidden from everyone except the specifically invited members.
- Collections for internal structure: Within each Space, documents can be organized in Collections. This gives administrators a clear overview of where different types of information are stored and ensures that the right content is processed by the right Assistant.
Security classification: Control at model level
In addition to user permissions, Intric uses security classification to control data flows at system level. This makes it possible to restrict which AI models may be used by specific Assistants.
- Model boundaries: Administrators can classify Assistants (e.g. “Sensitive HR data” vs “Public information”). An Assistant with a high security classification can be configured to use only specific models that meet your organization’s highest compliance requirements.
- Data minimization in processing: By controlling model choice you ensure that sensitive information is never sent to a model or sub-processor that is not approved for that type of data.
Technical security boundaries
Intric’s architecture ensures that access control is enforced at all levels. For an overall technical picture:
- API validation: Every call to the database or AI model is validated against the user’s current permissions. If a user lacks permission for a specific document, it is never included in the AI model’s context.
- Login protection: Via SSO integration (e.g. Entra ID), your internal security policies are reflected, including multi-factor authentication (MFA) and conditional access.
- Logical isolation: Even when multiple Spaces exist within the same organization, search indexes and storage are structured so that searches never return results outside the user’s permission scope.
Configuration and Audit
To support compliance, Intric offers tools to review and control access:
- Permission overview: In the control panel, administrators can see exactly which users have access to which Spaces.
- Audit logs: The system logs critical events such as role changes, data deletion, and document export. This provides the traceability often required in a DPIA.
Best practices for access configuration
We recommend the following for a secure setup:
- Principle of least privilege: Assign Creator or Owner status only to those who actually need to manage data. Use User as the default for most users.
- Use Spaces strategically: Create separate Spaces for sensitive areas (e.g. HR, management, or specific customer projects) rather than one large shared Space for the whole organization. This also makes export, erasure, and deletion easier in line with the GDPR.
- Combine RBAC with security classification: Use security classification on your Assistants so that the most sensitive data is always processed by the most secure model options.