# Authorization structure

**Category:** Management

**Version:** 1.0

**Last Updated:**  March 02, 2026

**Author:** Any2Info

***

### Description

The **Authorization structure** is used to determine which users can see which forms within a collection.

It uses a **tree structure** to define visibility. The structure works **bottom-up**, meaning visibility increases as you move up the hierarchy.

An authorization structure can be reused across multiple forms. If multiple forms share the same authorization logic, only one authorization structure needs to be created.

Authorization structures can be created and managed in: Management → Authorization structure

***

### How It Works

#### Tree-Based Visibility

An authorization structure always contains:

* **One root node** (this is the name of the authorization structure)
* Child nodes below the root
* A strict hierarchical tree (only one root per structure)

***

#### Visibility Rules

**Lowest Level (Leaf Nodes)**

Users in the lowest node:

* ✅ See forms assigned to themselves (The creator is the default assignee)
* ❌ Do NOT see forms of users in the same node
* ❌ Do NOT see forms of users in sibling nodes

Users in the same node do **not** see each other’s forms.

***

**Parent Nodes**

Users in a higher-level node:

* ✅ See their own forms
* ✅ See forms of users in all child nodes below (recursive)

Visibility flows **upward** in the tree.

***

#### Multiple Node Membership

A user can be added to multiple nodes.

If a user exists in multiple nodes:

* Their visibility is the **combined result**
* There is **no conflict resolution**
* All visible users are merged together

***

#### User Groups

Not only individual users can be added to a node, but also **user groups**.

If a user group is added:

* All members inherit the node’s permissions
* This is **dynamic**
* If a user leaves the group, their permissions are automatically removed
* If a user is added to the group, they automatically inherit the permissions

***

### Roles Within the Authorization Structure

A node can be assigned a **role**.

Roles are defined within the platform and determine what a user is allowed to do (for example: access dashboards, forms, AI agents).

Example:

* Role: `Employees`
* Role: `Employees with expense option`

The role determines:

* Whether a user can create or use certain forms

The authorization structure determines:

* Whose forms a user can see

Example:

* A user may have the right to fill out an **Expense form**
* The authorization structure determines whose expenses they can view

All users in the node and its child nodes automatically inherit the assigned role.

***

### Variables

Authorization structure nodes can define **collection variables**.

Instead of assigning a variable to individual users, the variable can be assigned at node level.

***

#### Inheritance Rules

* Variables are inherited **downwards**
* The value of the **closest node wins**

Example:

* Level 1 sets Variable = A
* Level 3 sets Variable = B
* A user in Level 4 → gets value **B**
* A user in Level 2 → gets value **A**

If:

* Only Level 3 has a value
* A user is in Level 2

Then:

* The user does **not** receive a value
* Inheritance only works upward to the nearest ancestor with a value

***

### Example Structure

Example hierarchy:

* CEO (top level)
* Departments (second level)
* Employees (third level)

In this scenario:

* The CEO sees all forms
* Department managers see all forms within their department
* Employees only see their own forms

Sample structure:

<div align="left"><figure><img src="https://870194474-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-M_kE41Rl4pOtwKfvvQq%2Fuploads%2Fx4hIIS1ZoBxTky2HtLiQ%2Fimage.png?alt=media&#x26;token=cd15cff3-38c8-4886-8abc-46299b21ce89" alt=""><figcaption></figcaption></figure></div>

***

### Using Authorization Structures in Forms

A form can have **one** authorization method.

Available authorization methods:

1. **None**\
   → Everybody sees everything.
2. **Personal**\
   → Everybody only sees their own forms.
3. **Authorization structure**\
   → A structure must be selected from a dropdown.\
   → Visibility is determined by the selected structure.
4. **Manager**\
   → Users see:
   * Their own forms
   * Forms of users for whom they are registered as manager

If no authorization structure is selected (when using "None"), everyone sees all forms.

***

### Reusability

* A collection can contain multiple authorization structures.
* A form can only have **one** authorization structure.
* Authorization structures can be reused across multiple forms.
* Authorization structures can be edited after being linked to forms.

Changes apply immediately once a form is saved.

***

### Changelog

| **Version** | **Date**       | **Change**                       |
| ----------- | -------------- | -------------------------------- |
| 1.0         | March 02, 2026 | Initial document & documentation |
