Record Permissions

circle-check

Overview

Record permissions determine who can see and act on Records within an Object.

Permissions are evaluated through a layered model:

  1. Object-level access

  2. Record-level scope

  3. Action permissions (single and bulk)

  4. Field-level permissions

Each Object supports two primary Record scopes:

  • All Records

  • My Associated Records

These scopes can be assigned different access levels within a Permission Group. Record permissions are critical for:

  • Controlling data visibility

  • Governing bulk operations

  • Managing automation behavior

  • Preserving archive integrity and audit history

For more information on how permissions relate to Objects, review Object Permissions.


Record Permissions

Record-level permissions are configured within each individual Object’s settings or from the Permission Groups Modal. These permissions control which users can access and manage that Object’s configuration and what permissions they have within that Object.

These permissions determine whether users can:

  • View All Records or only associated Records

  • Edit, Create, Delete or Unarchive Records

  • Access Record views and actions (single or bulk)

  • Modify automations

  • Configure default field permissions

These permissions are configured per Object and can vary across different Permission Groups. For example:

  • Two Objects may both be visible to a user, but only one allows Record creation.

  • One Object may allow exports while another blocks exports.

  • A user may be able to view Records but not archive or upload them.

How Configuration and Record Permissions Interact

Object configuration permissions and Record data permissions control different behaviors.

Object Configuration Permissions

Object structure and configuration

  • Edit Object settings

  • Configure fields

  • Customize layouts

  • Manage Object-level permissions

  • Visibility of individual Records

  • Record-level actions

Record Permissions

Record data and actions within an Object

  • View Records within an association scope (All or My Associated)

  • Create, edit, archive, delete Records

  • Perform single-Record actions

  • Perform bulk actions

Editing Object structure or settings

Since these permissions are evaluated independently, misalignment can lead to confusing behavior. For example:

  • A user may be able to modify object settings but see no Records.

  • A user may see records but be unable to edit the Object configuration.

  • API calls may return empty results if record-level access is restricted, even when Object visibility is enabled.

When troubleshooting access issues, verify both Object configuration permissions and Record data permissions.


How Record Permissions Work

Each Object includes separate permission rows for:

  • All [Object Name] Records

  • My [Object Name] Associated Records

Administrators can assign different access levels to each scope. For example:

  • View access to All Records

  • Create/Edit access to My Associated Records

This allows broad visibility while restricting modification rights to associated records.

chevron-rightConfiguring Record Permissionshashtag

1. Select settings in Kizen's navigation

2. Go to Team, Roles, & Permissions

Navigate to the Permissions Group subtab.

3. Select New Permission Group

4. Scroll down and toggle on the Record Permissions you want to add.

In the example shown, Custom Object - Products is selected.

5. Select the drop-down arrow on the Record Permission you're editing

Selecting the arrow will show a drop-down of the various permissions that can be set.

6. Edit permissions for your Record

You can now edit permissions on your Records.

Tiered Access Levels

Each scope row uses tiered access levels:

  • None

  • View

  • Create/Edit

  • Delete/All

These levels determine the degree of access within that scope. Delete/All represents the highest access level within a scope row and governs Record-level deletion or archive capability for that scope.

What “My Associated Records” Means

“My Associated Records” grants access only to Records where the user is the owner, explicitly assigned as a team member, or inherits access through a defined relationship.

Association may include:

  • Record ownership (Owner field)

  • Explicit team association

  • Relationship-based inherited association

Associations determine whether a record falls within a user’s “My Associated Records” scope.

An interaction (such as modifying a record or logging activity) generates an association. However, a user can be associated with a record without having directly interacted with it. To learn more, check out Team Interactions in Records (Coming Soon).

See Object Relationships for details on how relationship modeling affects inherited access.

Unarchive Permissions

Unarchive permissions are explicitly separated into:

  • Unarchive Any Record

  • Unarchive My Records

Unarchive is not implied by Create/Edit access and must be granted independently.

When a record is archived, its owner and team associations are preserved so that unarchive permissions can be enforced correctly. Archived Records do not appear in active Record views.

Record Creation

Record creation is controlled separately through: Create New Records

Create permission is not automatically implied by other scope settings and must be explicitly granted.


Record-Specific Permission Areas

Record permissions are configured inside Permission Groups and intersect with Object-level configuration.

Record Overview Permissions

Access to Record view types is permissioned separately from record visibility. Under Record Overview, administrators can configure access to:

  • Chart View

  • Board View

  • Quick Filters

Users may have record access but be restricted from specific view modes.

Single Record Actions

Single-Record permissions control actions performed on an individual Record. These permissions determine which action controls appear on the Record detail page.

Single-Record permissions include:

  • Modify Automation

  • Team Associations

  • View Timeline

For Contact Records, additional single-Record actions are available, including:

  • Send Single Message (email or SMS)

  • Manage Subscription Status

  • Access communication history

For more details, see Contact Permissions.

Automation Overlap

Starting an automation generally requires Create/Edit access to the Record.

Automations execute in a separate permission context. Users who can modify automations may be able to cause record changes that exceed their normal UI editing permissions.

Custom Actions can expose specific automations and may allow execution with more limited access. Permission to modify automations should be treated as an elevated capability. For more detail, see Custom Actions (Coming Soon).

Record-Specific Bulk Actions

Bulk permissions are grouped separately under Perform Bulk Actions.

Bulk permissions include:

  • Change Field Value

  • Modify Automation

  • Add Team Associations

  • Export to CSV

  • Archive Records

  • Upload Records

Bulk permissions are configured separately from single-record permissions, but they are constrained by record-level scope access. If a user does not have sufficient scope access (such as Create/Edit or Delete/All), corresponding bulk actions will not be available.

Because bulk operations can affect large numbers of Records, they should be granted intentionally and aligned with appropriate scope access.


Field-Level Permissions Interaction

Record permissions operate alongside field-level permissions.

Field-level permissions are evaluated after Record-level access is granted.

Within a Permission Group, administrators can configure:

  • Default access level for new fields

  • Individual field permissions (None, View, Create/Edit)

Field-level permissions apply to both default and custom fields. Even if a user has Record-level access, certain fields may remain hidden or read-only.

Files include a specific Delete permission at the field level that enables hard deletion of a file rather than simply unlinking it from a Record.


Record Permissions in API Responses

Record permissions are enforced consistently across the UI and APIs. Effective permissions are evaluated at request time.

API responses include an access Object indicating record-level permissions (such as view, edit, remove). If a user lacks permission:

  • Records may not appear in search results

  • Update operations may fail

  • Action-based operations may be rejected

Most Record APIs require specifying which fields to return rather than returning all fields by default. For endpoint details, see Record APIs.


Important Considerations

Keep the following in mind when configuring or troubleshooting record permissions:

  • Platform-level Object access does not imply Record-level access.

  • Access to a record does not automatically grant access to view modes, single-Record actions, bulk operations, or field-level editing.

  • Association modeling directly impacts visibility.

  • Automation and bulk permissions can significantly expand user impact.

  • Missing Records or fields often indicate permission restrictions, not missing data.

  • Integrations should evaluate access flags before attempting write operations.

Permission misconfiguration is a common cause of empty UI states and empty API responses.


What’s Next

Next, review Record APIs to understand how records are created, retrieved, updated, archived, and managed programmatically or you can continue exploring other Records documentation with the topics below:

Last updated

Was this helpful?