Bloomreach Engagement has developed Role-based access control to protect your data from unauthorized access. Having the access minimization principle in mind, this system allows you to make sure that only the right people have access to personal data or specific modules.
With Bloomreach Engagement, you can define and manage dedicated persons with specific permissions, such as modifying, viewing, or exporting customer data and executing campaigns. You can set separate access with the explicit purpose for each user either on a project or account level.
To do this, go to
Settings > Project settings > Access management where you can select from, assign, and modify specific access rights.
Note that in each project there is a limit of 1000 users.
Role-based access control groups small sets of specific permissions and accesses under "roles" that can be assigned to team members by the Admin. This way, administrators can decrease the risk of major mistakes and security breaches by carefully restricting users' access to perform only the tasks they really need.
You can invite new users to your project and decide which role suits their work. They will have to accept your invitation, and until they do so, they will appear within pending invitations.
The invitation is valid for seven days for security reasons. After this time, the invited user will no longer be able to accept it, and the Administrator or Super Admin has to resend the invitation.
You can make changes to the specific role and permissions while the invitation is pending, and you can further refine user accesses even after the invitation has been accepted. Thus, do not worry if you accidentally invite someone with an incorrect role or permissions, as the Project Administrator can change the role anytime.
Once the user is in the project, you can adjust their project role by hovering over their name and clicking on the
Edit button on the right side in the
Project team tab. Here, you can select multiple roles from a list of roles (some of which are described in the table below). Bloomreach Engagement predefines several roles, and you can also create your own custom roles to suit your specific needs.
You can assign multiple roles to each user by scrolling down their individual access permission setup and selecting
Add role group. Then, in
Project team you can see all individual roles and their descriptions under that person's name.
The administrator can grant the user a temporary role by setting an expiration date in the user interface. Select the icon
Add expiration and select the exact day and time that the user's role will expire. Expired roles are visible in the interface but are not active and do not grant any permissions. We recommend setting expiration for highly sensitive roles, such as Admin roles and Personal Data Viewer.
There are several access roles in Bloomreach Engagement out of the box. To make it easy for you to quickly understand the scope of the role, all of them abide by the following naming convention: The first word or two represents the section of the application, and the later the extent of the permission.
Regarding the extent of the permission, there are levels of roles with an increasing set of permissions, creating a hierarchy of roles, as described in the flowchart below. Higher-level roles inherit all permissions from the lower ones, and lower levels never allow functions from higher-level roles. For example, while an Admin has access to all other functions, sole Editors cannot publish or export from Bloomreach Engagement (they can only do the task they are assigned and abilities hierarchically beneath them). All standalone roles follow this hierarchy and naming.
Admin: has full access to Campaigns (can view, edit, delete, start, and stop all Campaigns; can edit running Campaigns; can change Campaigns settings); can edit customer data excluding customer consents; can edit consent settings
Editor: can write and delete access; can modify and delete objects.
Publisher: can execute access; can trigger an action that may immediately impact the end customers or make objects publicly available.
Exporter: can export or download data from the Bloomreach Engagement application.
Approver: can only approve specific actions.
Requester: can create a request.
Viewer: read-only access; cannot modify objects.
Example of permissions hierarchy
The lowest-level role, the viewer, has their set of defined permissions.
The higher-level role, the editor, has their own set of permissions AND those of the viewer.
And the publisher has their set of permissions AND those of the editor, which also include those of the viewer.
Be aware of the hierarchy between Instances, Accounts, and Projects. Roles granted on a higher scope (account) are applied to all lower scopes (project). Similarly, if users operate on their own single-tenant instance, that instance has the highest hierarchy (instance -> account -> project)
For example, if a user is granted "Analyses Viewer" on the Account scope, the user will have the "Analyses Viewer" role in all projects under that account.
Roles assigned to users on an instance scope are applied to all accounts and projects within the instance. Roles assigned to users on account scope are applied to all projects within the account.
Ensure Project Safety by granting a role on the correct Scope
Roles assigned to users on an instance scope are applied to all accounts and projects within the instance. Roles assigned to users on account scope are applied to all projects within the account.
This might be critical, as you might be granting Account rights to someone, who is supposed to see or edit one Project ONLY.
Several predefined standalone and non-standalone roles come out of the box and can be assigned to the members/users of your project. All standalone roles follow the naming and hierarchy of roles described above.
In addition, there are several non-standalone roles set up by Bloomreach Engagement that allow access to specific actions.
A user can have multiple roles assigned, but each user must have at least one standalone role to be able to access the project.
The following is the list of all predefined roles in Bloomreach Engagement.
|Account Admin||Has full access to accounts, projects, and customer data within an account; has full access to account access management; has full access to account-specific settings; can edit group access.||Yes|
|Account IAM Admin||The role allows the administration of Identity and Access Management (Roles, Policies, and Service Accounts) on the Account and Project levels.||No|
|Account Temporary Access Approver||Can approve temporary access requests on the Account and Project levels.||No|
|Account User (Legacy)||Can open account; can view account overview dashboards.||Yes|
|Analyses Editor||Can view, edit, and delete all analyses (dashboards, reports, segmentations...); can edit customer data - excluding consents; can share dashboards.||Yes|
|Analyses Exporter||Can view and export all analyses; can share dashboards.||Yes|
|Analyses Viewer||Can view all analyses.||Yes|
|SSO Account Admin||Has full access to accounts and can log in using the backup magic login link method.||Yes|
|Campaigns Admin||Has full access to Campaigns (can view, edit, delete, start, and stop all Campaigns; can edit running Campaigns; can change Campaigns settings); can edit customer data - excluding customer consents; can edit consent settings||Yes|
|Campaigns Editor||Can view, edit, and delete Campaigns; can edit customer data - excluding consents; can view, edit, and delete Catalogs.||Yes|
|Campaigns Viewer||Can view Campaigns and their evaluations.||Yes|
|Customer Data Exporter||Can export customer data in bulk (download).||Yes|
|Email Campaigns Editor||Can view, edit and delete Email Campaigns; can view Catalogs.||Yes|
|Email Campaigns Publisher||Can view, edit, delete, and publish Email Campaigns; can view Catalogs.||Yes|
|Email Campaigns Viewer||Can view Email Campaigns and their evaluations; can view Catalogs.||Yes|
|Experiments Editor||Can view, edit and delete Experiments.||Yes|
|Experiments Publisher||Can view, edit, delete, and publish Experiments.||Yes|
|Experiments Viewer||Can view Experiments and their evaluations.||Yes|
|Exports Module Admin||Has full access to set up Exports of customer data, including PII.||Yes|
|Personal Data Viewer (flag)||Has view access to private fields (personal data, PII).||No|
|Project Admin||Has full access to everything in projects; has full access to the project access management; can edit customer data - including consents.||Yes|
|Project IAM Admin||The role allows the administration of Identity and Access Management (Roles, Policies, and Service Accounts) on the Project level.||No|
|Project Developer||Has full access to imports, catalogs, integrations (including approval); can change selected project settings; can view customer data.||Yes|
|Project Temporary Access Approver||Can approve temporary access requests on the Account level.||No|
|Project User (Legacy)||Can open projects and view customer data.||Yes|
|Recommendation Editor||Can view Segmentations and view, edit, and delete Recommendations; can view Catalogs.||Yes|
|Recommendation Viewer||Can view Recommendations and Segmentations; can view Catalogs.||Yes|
|SMS Campaigns Editor||Can view, edit and delete SMS Campaigns; can view Catalogs.||Yes|
|SMS Campaigns Publisher||Can view, edit, delete, and publish SMS Campaigns; can view Catalogs.||Yes|
|SMS Campaigns Viewer||Can view SMS Campaigns and their evaluations; can view Catalogs.||Yes|
|Technical Support||Has roles: Analyses Editor and Analyses Exporter, Campaigns Admin, and Customer Data Exporter||Yes|
|Temporary Access Approver||Can approve temporary access requests.||No|
|Weblayers Editor||Can view, edit and delete Weblayers.||Yes|
|Weblayers Publisher||Can view, edit, delete, and publish Weblayers.||Yes|
|Weblayers Viewer||Can view Weblayers and their evaluations.||Yes|
The special role of "Personal Data Viewer" grants access to private fields (personal data, PII). Bloomreach Engagement predefined roles never include this role. Personal Data Viewer must be granted explicitly or included in your custom roles.
To read more about the roles and see which specific roles are inherited, find the role in
Access management > Roles.
Standalone role required
Remember that each user must have at least one standalone role to be able to access the project. If a user does not have any standalone role, for example, only being a
Personal Data Viewer, they will have a problem with logging into the project.
Bloomreach Engagement offers three main types of instances for your projects: multi-tenant, single-tenant, and exclusive instance. These contain different features and configurations of data layers. In each instance, data is separated, and access management is enabled to ensure your security. You can learn more about our Security architecture in its separate article.
What is important for Access management is that the additional layers of security within the more sophisticated types of instances, such as the single tenant or exclusive instance, will require some additional roles and accesses or permissions compared to the multi-tenant instance. There are these additional roles for projects running on a single tenant instance, as described in the table below.
|Super Admin||Has full access to all accounts (Account Admin), projects (Project Admin) and customer data (including PII); has full access to instance-specific settings; has full access to the instance access management; can see and edit CDN setting field.||Yes|
|Instance Manager||Has full access to all accounts (Account Admin), projects (Project Admin), and customer data (including PII); has full access to instance-specific settings; can see and edit CDN setting field.||Yes|
|Temporary Access Requester||Can request temporary access.||No|
|Sales (Legacy)||Will be added shortly||No|
|AccessLockedProjects (flag)||Will be added shortly||No|
|DebugImf (flag)||Will be added shortly||No|
|OverrideSqlAccess (flag)||Will be added shortly||No|
|ListAllProjects (flag)||Will be added shortly||No|
Bloomreach Engagement allows you to assign finely detailed roles to your project members, not limiting you to choose from broader predefined roles listed above. Remember, a user can have multiple roles assigned, but each user must have at least one standalone role to be able to access the project.
|Account Usage Viewer||Can view the Usage Dashboard on the Project and the Account level.||Yes|
|Customers Viewer||Can view Customer attributes and events; can view Catalogs.||Yes|
|Customers Consent Editor||Can grant and revoke customer Consents; can view Customer attributes and events.||Yes|
|Customers Editor||Can view, edit and delete Customer attributes and events; can view Catalogs.||Yes|
|Data Manager Viewer||Can view Data Manager.||Yes|
|Data Manager Definition Editor||Can view, edit and delete Data manager definitions.||Yes|
|Event Analyses Editor||Can view, edit and delete Event Analyses (e.g., Funnels, Trends, Retentions, Flows, and Geo Analyses).||Yes|
|Event Analyses Exporter||Can view, edit, delete, and export Event Analyses (e.g., Funnels, Trends, Retentions, Flows, and Geo Analyses).||Yes|
|Event Analyses Viewer||Can view Event Analyses (e.g., Funnels, Trends, Retentions, Flows, and Geo Analyses) and their results.||Yes|
|Imports Admin||Can view, edit and delete Imports and Catalogs.||Yes|
|In-App-Message Editor||Can view, edit and delete In-App-Message.||Yes|
|In-App-Message Publisher||Can view, edit, delete, and publish In-App-Message.||Yes|
|In-App-Message Viewer||Can view In-App-Message and their evaluations.||Yes|
|Initiatives Editor||Can view, edit and delete Initiatives.||Yes|
|Integrations Editor||Can view, edit and delete Integrations; can create already approved integration types (accepted Terms & Conditions).||Yes|
|Managed Endpoints Editor||Can view and edit Managed Endpoints; can view Catalogs.||Yes|
|Managed Endpoints Publisher||Can view, edit and publish Managed Endpoints; can view Catalogs.||Yes|
|Managed Endpoints Viewer||Can view Managed Endpoints and their evaluations; can view Catalogs.||Yes|
|Project Usage Viewer||Can view the Usage Dashboard on the Project level.||Yes|
|Reports Editor||Can view, edit and delete Reports.||Yes|
|Reports Exporter||Can view, edit, delete, and export Reports.||Yes|
|Reports Viewer||Can view Reports and their results.||Yes|
|Scenarios Editor||Can view, edit and delete Scenarios; can view Catalogs.||Yes|
|Scenarios Publisher||Can view, edit, delete, and publish Scenarios; can view Catalogs.||Yes|
|Scenarios Viewer||Can view Scenarios and their evaluations; can view Catalogs.||Yes|
|Segmentations Editor||Can view, edit and delete Segmentations.||Yes|
|Segmentations Exporter||Can view, edit, delete, and export Segmentations.||Yes|
|Segmentations Viewer||Can view Segmentations.||Yes|
|Surveys Editor||Can view, edit and delete Surveys.||Yes|
|Surveys Publisher||Can view, edit, delete, and publish Surveys.||Yes|
|Surveys Viewer||Can view Surveys and their evaluations.||Yes|
While Bloomreach Engagement predefines roles, you can set up your own custom roles. This allows you to add and combine several inherited roles to create a single role that would suit your specific needs. In other words, custom roles are stacked from predefined roles and inherit all their permissions and scope level.
To do so, go into the
Project settings > Access Management > Roles and click on
+ Create custom role in the top right corner. Select
+ Add inherited role.
When there is a team with the same responsibilities and permissions operating the Bloomreach Engagement application, we do recommend creating a custom role. This custom role would inherit all required roles - allowing you to then only assign this single role to all team members. Furthermore, this makes it easier to see who is currently a member of this role on the Custom role
Custom roles (user-defined) can be combined from multiple roles, but it is not possible to remove a permission from a particular role.
There can be a maximum of 100 custom roles.
One custom role can include maximum 32 roles.
Removing access for users
Removing a user only removes their access. However, all analyses and campaigns they created will remain.
In case you want to add more security and refine further what exactly specific users with their roles can edit within Bloomreach Engagement, you can assign users to access groups. This might be the case if you have multiple teams, agencies, or users working within some set of scenarios as there can be unintentional changes to scenarios from other users. Access groups solve this issue by locking edit access only for users who are assigned to those groups.
Groups can be managed by an Account Admin and one user can be a member of several groups.
The owner (or creator) of a definition and an Account Admin can always edit the list of groups. It is also possible to change owners.
Currently only scenarios and segmentations support this option.
To create a group navigate to the
Account Settings > Access management > Groups and click on the Add group button.
After you click on the
+ Add member button a window opens where you put the emails of the users you wish to add to the group.
The name will resolve after the group is saved and if needed you can remove users from a group.
When you want to restrict access to certain, e.g., segmentation navigate to the list of all segmentations. Expand the Edit menu next to the item where you want to restrict access and choose Access lock….
In a new window, you can select the groups that will have access to that segmentation.
You can select one or more groups and Save the settings.
The new lock icon will appear next to the name of the locked definition.
It is also possible to restrict access as a bulk action for several resources at once.
You need to select the segmentations you wish to restrict access to and click on the Access lock... icon from the menu.
When bulk action is used all previously assigned groups will be overwritten with a new set of groups.
It is not enough to be a member of the group to have edit access. Users also need to have an appropriate role, e.g., Scenarios Editor or Scenarios Publisher to be able to have edit or publish permissions.
You can see whether you have edit access to a specific locked segmentation by checking the color of the icon next to the segmentation name. If you can edit that specific segmentation, the icon is green. I you do not have the edit access, the icon is orange.
The Owner and Account Admin always have access and are able to edit even locked definitions. For this reason, it is possible to change the owner and assign it to another user.
Only an Account Admin can change owner.
When you want to change the owner of a certain, e.g., segmentation navigate to the list of all segmentations. Expand the Edit menu next to the item where you want to make a change. From the menu, choose Change owner….
A new window opens where you can choose a new owner from the drop-down menu.
It is also possible to change owners as a bulk action for several resources at once.
You need to select the segmentations you wish to change the owner for and click on the Change owner... icon from the menu.
- There are a maximum of 50 groups per account.
- There are a maximum of 50 users per group.
- There are a maximum of 10 groups per definition.
- Only the Account Admin can change the owner.
- Only the Account Admin can list and edit members of a group.
- If there is a change in, e.g., an aggregate or a definition that is used in a scenario, this change would be applied.
Access Management > Account team/Project team, you can check who is part of your identity domain.
The identity domain serves to solve the tension between users having only one user account but access to multiple accounts and projects. It is unclear what policies to follow when enforcing some requirements (such as requiring an email and password or SSO to log in). During the login process, it is unclear what accounts would be accessed since users have access to multiple, and these have different settings.
However, the identity domain solves this issue. When users are invited to the instance for the first time, an account is set up where they were invited as their native domain. Following this, the policies and settings from this account would apply to the user.
Currently, the identity domain supports the following settings:
You can check who is part of your identity domain under
Access Management > Account team/Project team.
There is a column called Native account. If the name matches the account name, the user belongs to this account, and the settings apply. If there is "Other", the user is from a different account. We do not reveal the native account of the users to other clients to avoid revealing what other accounts are on the instance.
If you need to change the native account for your user, please get in touch with our support team.
When user roles are changed, there is a slight delay before the new permissions are applied. Be aware that permission changes are not applied immediately – it may take up to one minute to propagate changes into all components. If you are still getting the error after waiting a few minutes and reloading the application and think you should have access or permissions for this action, please contact our support.
Updated 12 days ago