Skip to main content

Permissions

Permissions enable users to view different data and content in Salted CX and perform actions. Salted CX has granular permissions that give individual users the level of access they need.

By default, a user logged to Salted CX using an Identity Provider has no permissions and cannot access any part of the application. To enable users to access Salted CX you have to explicitly add permissions in the identity provider.

note

Always give users the minimum level of access they need to do their job efficiently. We recommend identifying just a few combinations of permissions you will be giving your users so it is fairly consistent across your company. We have tried to put some common combinations of permissions into Permission Sets.

Scope

Scope defines to what metadata, content, and objects the permissions apply.

ScopeDescription
*Users can perform the action on any entity within Salted CX.
MEView only metadata and content related to my engagements. The meaning of this scope depends on the permission and context.

Permissions List

Each permission has a scope. Supported scopes depend on the permission.

PermissionDescriptionScopes
account.manageChange preferences for the entire account.*
account.settings.askChange Ask settings for the entire account.*
agent.viewAccess to agent profile.*
ask.engineeringTechnical settings of asks enabling to adjust how AI model behaves.*
ask.journeyAsk questions to AI in the customer journey on individual engagements, conversations and customer journey.*
ask.sampleAsk questions to AI about larger set of engagements or reviews.*
coaching.session.manageCreate and edit coaching sessions for agents.*
content.salted.dashboardsView built-in Salted CX dashboards.*
data.audio.agentPlay audio of the conversation in the customer journey* — view metadata for all agents
ME — view metadata only for engagements the user has handled
data.content.agentView turn content in the customer journey.* — view metadata for all agents
ME — view metadata only for engagements the user has handled
data.metadata.agentView metadata in dashboards and visualizations.* — view metadata for all agents
ME — view metadata only for engagements the user has handled
earlyAcccess.experimentsAccess to experimental features.*
form.manageCreate and modify forms. Enables to use existing questions in any of the forms.*
protectedInformation.viewReveal protected information in the customer journey.*
question.manageCreate and modify questions. Enables to create and edit questions that can be used for building forms.*
reporting.edit.metricsEdit metrics.*
reporting.edit.reportsEdit dashboards and visualization.*
reporting.savedView.manageSave current filtering criteria as personal saved views in dashboards.*
reporting.viewView dashboards and visualizations.*
review.agent.acknowledgeAcknowledge agent reviews.*
review.agent.disputeDispute agent reviews.*
review.auto.acknowledgeAcknowledge auto reviews.* — acknowledge any auto review
ME — acknowledge only auto reviews of engagements that are associated with and turn (of any type) related to those engagements
review.auto.disputeDispute auto reviews.* — dispute any auto review
ME — dispute only auto reviews of engagements that are associated with and turn (of any type) related to those engagements
review.auto.verifyProvide feedback to auto reviews. This permission enables them to mark the auto reviews as Correct, Incorrect and Unclear. This permission has strong influence of Auto Reviewer accuracy. Users should receive training before getting this permission.*
review.autoreviewer.manageCreate, fine-tune and manage auto reviewers. Auto reviewers enable to find reviews automatically.*
review.customer.acknowledgeAcknowledge customer reviews.* — acknowledge any customer review
ME — acknowledge only customer reviews of engagements that are associated with and turn (of any type) related to those engagements
review.customer.disputeDispute customer reviews.* — dispute any customer review
ME — dispute only customer reviews of engagements that are associated with and turn (of any type) related to those engagements
review.reviewReview engagements and turns by answering questions, providing tags and answers to questions.* — review any engagement or turn
ME — review only engagements that are associated with and turn (of any type) related to those engagements
review.reviewer.acknowledgeAcknowledge manual reviews.* — acknowledge any manual review done by a reviewer
ME — acknowledge only manual reviews of engagements that are associated with and turn (of any type) related to those engagements
review.reviewer.disputeDispute manual reviews.* — dispute any manual review done by a reviewer
ME — dispute only manual reviews of engagements that are associated with and turn (of any type) related to those engagements
saveSearch.shared.manageManage saved searches. Users can share their searches with the all users in their account.*
user.settings.askChange Ask AI settings per user.*

Permission Sets

To simplify permission management we also provide permission sets that group multiple permissions under one common named item. By convention, the permission sets are in capital letters.

One user can have multiple permission sets and also have additional permissions that expand their permissions. Users can view and perform all actions listed in any permission set they have attached or in any individual permission.

RoleDescription
ALLAccess to every feature of Salted CX. Any new functionality added to our application is automatically available to this user.

We do not recommend to assign this permission to anybody. It is intended primarily for the evaluation period before single sign-on is set up for the account.
AGENTPermissions suitable for agents that give access to view reports filtered to their data and drill to the customer journey.
AGENT_ALL_CONTENTAgents that are allowed to see all the data in the contact center. This can help agents to better understand complete customer journeys and see their performance compared to other agents.
ANALYSTPermissions suitable for analyst role - a dashboard creator that give access to create reports and edit metrics.
AUTO_QA_MANAGERPermissions suitable for experienced users enabling full stack of analytical features including management of auto-reviewer models and ask AI.
REVIEWERPermissions suitable for a person that performs manual quality assurance.
TEAM_LEADERPermissions suitable for team leaders that give access to all reports and search and drill to the customer journey of all agents.
TEAM_LEADER_QATeam leaders who also perform quality assurance.
VIEW_CONTENTPermissions that enable to view all metadata and content. You can combine this permission set with other permissions set to widen the data available to the user but keeping the same set of actions the user can perform.
VIEW_METADATAPermissions that enable to view all metadata. You can combine this permission set with other permissions set to widen the data available to the user but keeping the same set of actions the user can perform.
VIEW_PROTECTEDPermissions that enable to reveal protected (redacted) information in the customer journey. You can combine this permission set with other permissions set to widen the data available to the user but keeping the same set of actions the user can perform.
note

Permissions sets are managed by Salted CX and we may add more permissions to give users access to features suitable for the given roles. If you need to be really strict with access to individual features of Salted CX do not use permission sets but always list individual permissions.

The following matrix contains what permissions are enabled for each permission set.

Permission / Permission SetADMINAGENTAGENT_ALL_CONTENTANALYSTAUTO_QA_MANAGERREVIEWERTEAM_LEADERTEAM_LEADER_QAVIEW_CONTENTVIEW_METADATAVIEW_PROTECTED
account.manage*
agent.viewMEME*****ME**
ask.journey********
coaching.session.manage**
content.salted.dashboards***
data.audio.agentME***
data.content.agentME********
data.metadata.agentME********
form.manage***
protectedInformation.view*
question.manage***
reporting.edit.metrics**
reporting.edit.reports**
reporting.view**********
review.agent.acknowledge*
review.agent.dispute*
review.auto.acknowledgeMEME*
review.auto.disputeMEME***
review.auto.verify**
review.autoreviewer.manage*
review.customer.acknowledgeMEME*
review.customer.disputeMEME*
review.reviewMEME****
review.reviewer.acknowledgeMEME*
review.reviewer.disputeMEME**
saveSearch.shared.manage**

Permissions Definition

You define permissions for individual users in a JSON object that you edit in your Identity Provider. Each user that should have access to Salted CX has to have the permission definition in stored in their attribute.

The example permission definition below uses just one permission set without version. User with this permission will able to perform tasks that we consider suitable for agents including getting new features.

{
"sets": ["ALL"]
}

The example permission definition below uses combination of 1 role and individual permissions.

{
"sets": ["AGENT"],
"review.view": "*",
"review.edit": "*"
}
note

If the permission definition is not in a valid format the user has no access to Salted CX.

Issues include invalid JSON structure, unknown permission set name, unknown permission name, values are not of the expected type and unsupported scope for a permission.

note

The limit for permissions is 2048 characters (including spaces, new lines and other empty characters). For this reason Salted CX enables you to specify permissions in a short way using permissions sets.

If the length of the permissions exceeds the 2048 characters and thus the permissions are not in valid JSON format Salted CX ignores the permissions and the given user has no access to Salted CX.

Setting Permissions

note

Permissions are evaluated during login as they are passed to Salted CX from an identity provider. Users have to logout and login to have updated permissions.

User permissions are passed to Salted CX from identity providers in custom user attributes. Claim is a key-value pair associated with the user. Claims can be used to provide additional attributes that might be useful for applications such as Salted CX.

To give users access to Salted CX you need to provide value in cxsaltedpermissions in the JSON format that Salted CX expects. How the value is set depends on your identity provider.