Article Type: Concept
Audience: Enterprise Administrators, Application Administrators
Module: Enterprise Admin - Access Control
Applies to Versions: All Versions
Access Types define the fundamental level of platform capabilities granted to Enterprise Users within each Fuuz Application. Unlike Roles which control granular data permissions, Access Types determine which platform interfaces, tools, and system functions a user can access. Each Access Type provides a predefined set of policies that enable specific categories of platform interaction.
Access Types are assigned at the Application level, meaning a single Enterprise User may have different Access Types across different Applications and Environments. Only Enterprise Administrators can assign and modify Access Types when adding or editing Enterprise User records.
| Access Type | Description | Provided Policies |
|---|---|---|
| Administrator | Administrative user with full Application control including user management, access control, data ingress/egress, role management, application settings, and audit logs | Complete administrative policies required to perform all administrative actions within the Application |
| Developer Access | Development user with access to App Designer tools (Screen, Data Model, Data Flow, Document Designers) and troubleshooting capabilities; can view all data but cannot manage users | Development policies required to create and modify Applications, access all design tools, and troubleshoot Application behavior |
| Web Access | Standard user for web frontend access; requires Role assignment with Role-Based Access Control (RBAC) to access any Application functionality or data | Basic policies required to authenticate and access the web frontend; all functional access controlled by assigned Roles |
| API Access | Restricted access type for external software systems requiring programmatic API access; provides no default policies and must be linked to specific Applications with explicit RBAC assignments | No additional policies by default; requires explicit Policy Group assignment to access any data or perform any actions |
| Gateway Access | System-controlled access type automatically assigned to users generated by Fuuz when authenticating a Gateway; restricted similar to API Access | Limited policies required to use and edit the Gateway; additional access requires Policy Group assignment |
The Enterprise Admin interface is architecturally implemented as an Application within the Fuuz Platform. Users granted access to this Enterprise Admin Application with the Administrator Access Type are designated as Enterprise Administrators by default. This architectural pattern means that Enterprise Administrators are simply Application Administrators for the special-purpose Enterprise Admin Application.
In Q1 2026, the platform will introduce an explicit Enterprise Administrator flag on user records, providing clearer separation between Application Administrators and Enterprise Administrators while maintaining backward compatibility with the current architecture.
Each Environment (Build, QA, Production) maintains its own distinct list of Enterprise Users with independent Access Type assignments. A user must be explicitly granted access to each Environment separately, and their Access Type can differ across Environments based on operational requirements.
Example Multi-Environment Access Pattern:
This isolation ensures that developers working in Build or QA Environments do not automatically have access to Production data and configurations. Enterprise Administrators in each Environment independently control which users have access and what Access Types they are granted.
In current platform versions, Access Types are mutually exclusive within an Application - each user can hold only one Access Type per Application. This creates specific implications for access management:
2026 Enhancement: The mutual exclusivity constraint will be removed in Q1 2026, allowing users to hold multiple Access Types simultaneously. This will enable more flexible permission models such as users who have both Developer and Web Access, or specialized administrative users who only need specific administrative capabilities without full Administrator privileges.
Appropriate For:
Key Capabilities:
Appropriate For:
Key Capabilities:
Restrictions:
Appropriate For:
Key Characteristics:
Role-Based Configuration:
Web Access users see nothing in their navigation menu until an Administrator assigns them one or more Roles. Each Role defines:
Appropriate For:
Key Characteristics:
Configuration Requirements:
System-Controlled Assignment:
Gateway Access Type is automatically assigned by the Fuuz Platform when authenticating a Gateway device. This is a system-controlled Access Type that users generally do not manually assign. The platform creates these users automatically during Gateway registration and authentication processes.
Key Characteristics:
Policy Group Extension:
If Gateway users require additional permissions beyond basic Gateway operations, administrators can assign Policy Groups to extend their access. This might be necessary for Gateways that need to write data to specific Data Models or trigger specific Data Flows.
Navigation Path:
Enterprise Admin Home → Enterprise Users → [Create or Edit User]
Required Permissions:
Assignment Process:
| Access Type | Visible Menu Sections | Key Interfaces |
|---|---|---|
| Administrator | Access Control, Data Management, Application Settings, Audit Logs | Users, Roles, Access Requests, Import/Export, Application Configuration, Authentication Events |
| Developer Access | App Designer, Troubleshooting Tools, Data Model Management | Screen Designer, Data Model Designer, Data Flow Designer, Document Designer, Logs, Debug Tools |
| Web Access | Only menu items defined in assigned Roles | Application-specific screens as defined by Role configuration; no platform administration tools |
| API Access | No web interface access | Programmatic API endpoints only; no UI access |
| Gateway Access | Limited Gateway management interfaces | Gateway configuration, device driver management (if Policy Groups assigned) |
Access Types function as containers for system-defined policies that grant specific platform capabilities. When an Access Type is assigned to a user, the platform automatically provisions all policies associated with that Access Type, enabling the corresponding platform functions and interfaces.
Policies are atomic permissions that control specific platform capabilities such as:
Access Types and Roles serve fundamentally different purposes in the Fuuz security model:
| Aspect | Access Types | Roles |
|---|---|---|
| Purpose | Control platform interface and tool access | Control data and operation access within Applications |
| Scope | Platform-level permissions (what tools/interfaces user can access) | Application-level permissions (what data/operations user can perform) |
| Assignment | One Access Type per user per Application (currently) | Multiple Roles can be assigned to single user |
| Configuration | System-defined, cannot be customized | Customer-defined and fully customizable |
| Example | Developer Access = can see Screen Designer | "Operator" Role = can view and create Work Orders |
Due to the current mutual exclusivity of Access Types, the Administrator Access Type includes all policies from the Developer Access Type plus additional administrative policies. This means:
When the mutual exclusivity constraint is removed in 2026, this overlap will become explicit - administrators who also need development capabilities can be assigned both Access Types independently.
Policy Groups are collections of policies that can be assigned to users with API Access or Gateway Access types to extend their permissions beyond the minimal default capabilities. Policy Groups enable fine-grained control over what operations and data these restricted Access Types can access.
Common Policy Group patterns for API Access:
In Q1 2026, the Access Type system will undergo two significant architectural improvements:
1. Non-Mutually Exclusive Access Types
Users will be able to hold multiple Access Types simultaneously within the same Application. This enables scenarios such as:
2. Explicit Enterprise Administrator Flag
An explicit Enterprise Administrator flag will be added to user records, separating the Enterprise Admin designation from the Administrator Access Type. This architectural change provides:
Access Control:
Administration:
Development:
Integration:
| Issue | Cause | Resolution |
|---|---|---|
| User with Web Access sees no menu items | No Roles assigned to user | Administrator must assign one or more Roles that define menu items and data access |
| Developer has access in Build but not Production | Environments maintain separate user lists | Production Enterprise Admin must explicitly grant user access in Production Environment; consider assigning Web Access in Production instead of Developer for safety |
| Cannot assign multiple Access Types to single user | Current platform limitation - Access Types are mutually exclusive | Assign Administrator Access Type (includes Developer capabilities) or wait for Q1 2026 enhancement allowing multiple Access Types |
| API Access user cannot access any data | API Access provides no default policies | Assign Policy Group(s) to the user that define permitted operations and data access |
| User needs both administrative and standard user access | Mutually exclusive Access Types | Assign Administrator Access Type and also assign Roles for testing user experience; Administrator can perform all functions of Web Access users when Roles are assigned |
| Cannot find option to make user an Enterprise Admin | Enterprise Admin is not an Access Type - it's granted by giving Administrator access in Enterprise Admin Application | Create/edit user, link to Enterprise Admin Application, assign Administrator Access Type; note explicit Enterprise Admin flag coming in Q1 2026 |
| Gateway Access user needs additional permissions | Gateway Access has minimal default policies | Assign Policy Group(s) to extend Gateway user permissions for specific Data Models or operations |
| Developer cannot manage user access | Developer Access Type does not include user management policies | Expected behavior - user management requires Administrator Access Type; contact Administrator if user access management is needed |
| Version | Date | Editor | Description |
|---|---|---|---|
| 1.0 | 2025-12-29 | Craig Scott | Initial Release including current functionality and Q1 2026 enhancement preview |