Understanding Roles & Permissions
Master Syndik's role-based access control system to ensure proper security and efficient workflow management across your property management team.
Overview
Syndik uses a comprehensive role-based access control (RBAC) system that allows you to precisely control what each user can see and do within the platform. This ensures data security while maintaining operational efficiency.
Security First
Always follow the principle of least privilege - grant users only the minimum access they need to perform their job functions.
Role Hierarchy
Syndik follows a hierarchical permission structure where higher-level roles inherit permissions from lower-level roles:
Complete system control with access to all features and settings.
Full property management with limited system administration.
Day-to-day property operations and resident services.
Specialized access for specific job functions.
Permission Types
Syndik uses granular permissions that can be assigned individually or as part of role packages:
- β’ View properties and units
- β’ Access resident information
- β’ Read financial reports
- β’ View maintenance requests
- β’ Access communication logs
- β’ Update property information
- β’ Modify resident records
- β’ Process payments
- β’ Manage work orders
- β’ Send communications
- β’ Create/delete records
- β’ Manage user accounts
- β’ Configure system settings
- β’ Access sensitive data
- β’ Export bulk data
- β’ Audit log access
- β’ Security settings
- β’ Permission management
- β’ Integration controls
- β’ Data retention policies
Creating Custom Roles
You can create custom roles tailored to your organization's specific needs:
Navigate to Role Management
Settings β Users & Permissions β Role Management
Create New Role
Click "Add Custom Role" and enter role name and description
Select Permissions
Choose individual permissions or start from an existing role template
Test and Deploy
Test the role with a test user before assigning to production users
Security Best Practices
- β Follow principle of least privilege
- β Regularly review user permissions
- β Use role templates for consistency
- β Document custom role purposes
- β Test roles before deployment
- β Remove access immediately when staff leave
- β Don't share admin credentials
- β Don't give excessive permissions
- β Don't create roles without documentation
- β Don't ignore permission audit alerts
- β Don't use generic role names
- β Don't bypass the approval process
Common Examples
Here are some common role configurations for different scenarios:
Allowed Actions:
- β’ View available units
- β’ Schedule tours
- β’ Create prospect records
- β’ Process applications
- β’ Generate lease documents
Restricted Access:
- β’ Financial reporting
- β’ Maintenance management
- β’ User administration
- β’ Property settings
- β’ Bulk data export
Allowed Actions:
- β’ Manage work orders
- β’ Assign maintenance staff
- β’ Track inventory
- β’ Communicate with residents
- β’ Generate maintenance reports
Restricted Access:
- β’ Lease management
- β’ Financial data
- β’ User permissions
- β’ Property configuration
- β’ Legal documents