The Users, Roles & Groups page is your central hub for access management. Users represent real people in your organization, roles define usage patterns with automatic mapping rules, and groups tie users and roles together with access to specific knowledge packs and guardrails.

The Users tab displays all user accounts with their status, department, and group memberships.
Users Tab
The Users tab shows all user accounts synced from your identity provider (Azure Entra ID). Each user card displays the person's name, job title, department, contact information, last login time, and group memberships.
User Status
Users have one of two statuses:
| Status | Description |
|---|---|
| Active | The user can access the system normally |
| Blocked | The user is prevented from logging in |
Administrators can block or unblock users by updating their status.
User Details Drawer
Click any user card to open the details drawer with three tabs:
- Details — personal information including name, job title, department, employee ID, email, phone, and address
- Activity — account status, current online state, last login timestamp, and active session details (device, browser, location)
- Groups — lists all groups the user belongs to, with member counts and knowledge pack access
Filtering Users
Use the search bar and filter dropdowns to find specific users:
| Filter | Options | Description |
|---|---|---|
| Search | Free text | Searches across user names |
| Status | All, Active, Blocked | Filter by account status |
| Department | Dynamic list | Filter by organizational department |
| Group | Dynamic list | Filter by group membership |
Groups Tab
Groups are permission containers that connect users and roles to knowledge packs and guardrails. A user's access to knowledge base content is determined by their group memberships.

Each group card shows its members, assigned roles, accessible knowledge packs, and applied guardrails.
Creating a Group
Open the Create Dialog
Switch to the Groups tab and click Add Group in the top-right corner.

Enter a name and optional description for the new group.
Enter Group Details
Type a group name (required) and an optional description. Click Create to save.
Configure the Group
After creation, the group details modal opens automatically. Use the three tabs to configure:
- Members — add users and roles to the group. Toggle between Users, Roles, or Both views. Search for members and click the + icon to add them.
- Knowledge Packs — select which knowledge packs this group can access. Search and add packs from the available list.
- Guardrails — assign guardrail policies that apply to this group's interactions.
Group Types
| Type | Description |
|---|---|
| Manual | Members are added and removed by administrators |
| Automatic | Members are assigned automatically based on rules (e.g., by department or role category) |
Group Fields
| Field | Description | Required |
|---|---|---|
| Name | Display name for the group | Yes |
| Description | Explains the group's purpose | No |
| Type | Manual or Automatic | Yes |
| Access Level | Public, Internal, Confidential, or Restricted | Yes |
| Members | Users and roles assigned to this group | No |
| Knowledge Packs | Content collections this group can access | No |
| Guardrails | Safety policies applied to this group | No |
Roles Tab
Roles represent usage patterns rather than individual people. Each role defines mapping rules that automatically classify incoming interactions — for example, routing requests from a specific channel or location to the appropriate access level.

Each role card displays its mapping rules, active user count, and enabled/disabled status.
Role Properties
| Field | Description | Required |
|---|---|---|
| Name | Display name for the role | Yes |
| Description | Explains what the role represents | No |
| Category | Access classification: Public Access, Employee Access, Admin Access, API Access, or System Access | Yes |
| Status | Enabled or Disabled | Yes |
| Mapping Rules | Conditions that trigger this role | No |
Mapping Rules
Mapping rules define when a role applies based on interaction properties:
| Rule Type | Description | Example |
|---|---|---|
| Channel | Communication channel | Teams, Web Chat, Mobile App, API, CLI, MCP |
| Location | Geographic location or IP range | Country, state, city, or IP range |
| Time | Time-based conditions | Business Hours, After Hours, Weekend |
| Auth | Authentication method | Authenticated, Anonymous, API Key, Executive SSO, Service Credential |
| Device | Device type | Desktop, mobile, tablet |
| Referrer | Source website | URL pattern of the referring page |
| Caller Type | Who initiated the request | Human, Application, Agent |
| Credential Type | How the caller authenticated | Personal Token, Service Account, Agent Credential, Scoped API Key |
Each rule has a priority (1–100) that determines evaluation order when multiple rules match. Higher numbers take precedence.
Caller Type and Credential Type rules are designed for programmable traffic. Pair them with the Programmable Access page to declaratively route machine callers — for example, map every Agent credential to a read-only role, or give Service Accounts a higher-privilege role that Personal Tokens do not receive.
Roles are assigned to groups, not directly to users. To give a role access to knowledge packs or guardrails, add it to a group with the appropriate configuration.
Creating a Role
Switch to the Roles tab and click Add Role. Enter a name, select a category, and optionally add a description. After creation, open the role to configure mapping rules.
You cannot delete a role that is assigned to any group. Remove the role from all groups first, then delete it.
How Access Control Works
The access control model follows this hierarchy:
- Users are real people synced from your identity provider
- Roles classify interactions automatically via mapping rules
- Groups bundle users and roles together
- Groups grant access to knowledge packs and guardrails
A user's effective access is the union of all knowledge packs and guardrails from every group they belong to.
Related Pages
- Knowledge Packs — content collections that groups can access
- Guardrails — safety policies assigned to groups
- Programmable Access — issue credentials whose Caller Type and Credential Type are matched by the role rules described above
- Sandbox — test how a credential resolves to a role and group before pointing live traffic at it
- Settings — configure system-wide settings and escalation rules