Skip to main content

Permissions and Access Overview — Alysio

Alysio uses a structured permissions and access model to ensure users can securely access the data, features, and workflows relevant to their role while maintaining appropriate controls over sensitive revenue information. Permissions in Alysio are managed at the workspace level and are determined by a combination of user roles, integration authorization scopes, and data visibility rules inherited from connected systems. Because Alysio connects directly to your existing revenue platforms, it respects the access controls already configured within those systems. This ensures that users only see the data they are authorized to access while allowing organizations to maintain their existing security and governance policies.

How Permissions Work in Alysio

Alysio’s permission model operates across two primary layers. The first layer governs platform-level permissions, which determine what users can do inside the Alysio platform. This includes which features they can access, which agents they can configure, and which actions they can initiate through the Execution Engine. The second layer governs data-level permissions, which determine what data users are allowed to view. These permissions are inherited from connected systems such as CRM platforms or sales engagement tools. For example, if a user does not have access to a particular account or opportunity within your CRM, that data will not be visible within Alysio. This model ensures that Alysio aligns with your existing data access policies while providing a unified interface for revenue intelligence.

Integration-Level Permissions

When an integration is established between Alysio and a connected system, the authorization flow defines the scope of permissions granted to the platform. Alysio uses scoped permissions, meaning the platform can only access the data and perform the actions explicitly authorized during the integration setup process. Integrations typically use: OAuth authentication
API credential-based authentication
These credentials allow Alysio to retrieve or update data within connected systems while remaining restricted to the approved scope. Administrators should review the permission scopes requested during each integration to ensure they align with organizational security policies and data governance requirements.

Data Visibility

Data visibility within Alysio is determined by both the user’s role in the Alysio workspace and the permissions defined within connected systems. Typical visibility patterns include: Workspace administrators have visibility across connected data sources and integrations.
Managers can view pipeline, account, and engagement activity associated with their teams.
Individual contributors typically see only the accounts, opportunities, and activities assigned to them.
Because Alysio inherits data access permissions from integrated systems, it does not expose information that users are not authorized to access within those systems.

Action Permissions

In addition to controlling what data users can view, Alysio also controls which actions users can initiate through the platform. Operational actions such as updating CRM records, assigning tasks, or triggering workflows are executed through the Execution Engine using the credentials authorized during integration setup. The scope of available actions is therefore limited to the permissions granted within the connected system. Workspace administrators can review and manage integration permissions at any time through the Integrations section of workspace settings.

Audit and Compliance

Alysio maintains logs of actions performed through the platform to support organizational governance and compliance requirements. Audit logs capture important activity such as: Actions initiated by users
Actions initiated by AI Revenue Agents
Execution Engine operations performed within connected systems
These logs allow administrators to review what actions occurred, when they occurred, and which user or agent initiated the action. This auditing capability helps organizations maintain transparency and accountability when using automated workflows and integrations.

Managing Permissions

Permissions within Alysio are managed by workspace administrators through the Settings section of the platform. Administrators can: Assign or modify user roles
Review integration authorization scopes
Configure workspace-level access settings
Monitor system activity through audit logs
Changes to permissions take effect immediately after being saved. Organizations should periodically review user roles and integration permissions to ensure they remain aligned with internal access policies.

Support

If you have questions about permissions configuration, user access, or data governance within Alysio, contact the Alysio support team: support@alysio.ai Your onboarding team can also assist with configuring roles and integration permissions during initial setup.