Multi-Tier Access

Master this essential documentation concept

Quick Definition

A documentation architecture where different user groups such as the public, partners, and internal teams each have access to separate, permission-appropriate layers of content.

How Multi-Tier Access Works

graph TD DS[(Documentation Source)] --> AC{Access Control Layer} AC -->|Public Token| PUB[Public Tier] AC -->|Partner API Key| PAR[Partner Tier] AC -->|SSO / Internal Auth| INT[Internal Tier] PUB --> P1[Product Overview] PUB --> P2[Getting Started Guides] PAR --> P3[Integration Specs] PAR --> P4[Sandbox Credentials] INT --> P5[Architecture Runbooks] INT --> P6[Security Policies] INT --> P7[Incident Playbooks] style PUB fill:#4CAF50,color:#fff style PAR fill:#2196F3,color:#fff style INT fill:#9C27B0,color:#fff style AC fill:#FF9800,color:#fff

Understanding Multi-Tier Access

A documentation architecture where different user groups such as the public, partners, and internal teams each have access to separate, permission-appropriate layers of content.

Key Features

  • Centralized information management
  • Improved documentation workflows
  • Better team collaboration
  • Enhanced user experience

Benefits for Documentation Teams

  • Reduces repetitive documentation tasks
  • Improves content consistency
  • Enables better content reuse
  • Streamlines review processes

Turning Video Walkthroughs Into Structured, Permission-Ready Documentation

Many teams first define their multi-tier access architecture during onboarding sessions, recorded all-hands meetings, or internal training calls. Someone walks through which content layers exist, who sees what, and why — but that knowledge lives inside a video file that the wrong audience may not even be able to find, let alone access appropriately.

This creates a real structural problem. A video explaining your multi-tier access model is itself undifferentiated — it either exists or it doesn't. You can't easily restrict a specific timestamp to partners while making another section public. The content that describes your access layers ends up ignoring them entirely.

Converting those recordings into structured documentation changes that dynamic. When your video walkthroughs become searchable, text-based docs, you can organize the output to match your actual multi-tier access model — publishing the partner-facing overview in one permission layer, keeping internal implementation notes in another, and surfacing only the public-appropriate summary externally. A concrete example: a recorded onboarding call that covers both internal admin workflows and partner API access can be transcribed and split into two separate documents, each living in the correct tier.

If your team regularly records sessions that touch on access-sensitive content, exploring a structured approach to video-to-documentation conversion is worth your time.

Real-World Documentation Use Cases

Separating SaaS API Docs for Free Users vs. Enterprise Partners

Problem

A SaaS company publishes all API documentation publicly, exposing premium endpoint specs, rate-limit tiers, and partner-only webhook schemas to competitors and free-tier users who cannot access those features anyway.

Solution

Multi-Tier Access splits the API reference into a public tier (core REST endpoints), a partner tier (advanced webhooks, bulk APIs, SLA guarantees), and an internal tier (admin override endpoints, billing API), each gated by the appropriate credential level.

Implementation

['Audit all existing API docs and tag each page with one of three permission labels: public, partner, or internal.', 'Configure the documentation platform (e.g., ReadMe.io or Stoplight) to require an OAuth token or API key scope to unlock partner and internal sections.', 'Integrate the partner portal login with SSO so that approved partners automatically see the partner tier upon sign-in without manual provisioning.', "Add a visible 'Request Partner Access' CTA on public pages that describe locked features, routing users to the partner onboarding form."]

Expected Outcome

Competitor scraping of premium API specs drops to zero, partner onboarding support tickets decrease by 40% because partners find their integration docs in one authenticated space, and internal engineers stop accidentally sharing admin endpoint links externally.

Healthcare Software Vendor Managing HIPAA-Sensitive Runbooks Alongside Public Help Articles

Problem

A health-tech company stores public patient-portal help articles and internal HIPAA compliance runbooks in the same Confluence space, creating audit failures and the constant risk that a misconfigured page permission exposes PHI handling procedures to unauthenticated users.

Solution

Multi-Tier Access establishes three isolated documentation spaces: a public-facing help center (Zendesk), a partner tier for EHR integration guides (authenticated partner portal), and an internal tier for HIPAA runbooks and incident response procedures (Confluence with Okta SSO enforcement).

Implementation

['Migrate all public help articles to a Zendesk Help Center configured with no authentication requirement and no links back to internal tools.', 'Create a dedicated partner documentation portal in Confluence with a separate space, restricting access to groups mapped to verified integration partners via Okta group sync.', "Lock the internal HIPAA runbook space to the 'Engineering-Internal' and 'Compliance' Okta groups, enabling audit logging on every page view for SOC 2 evidence.", 'Establish a quarterly access review process where space admins certify that no partner or public users have been granted internal-tier permissions.']

Expected Outcome

The company passes its next HIPAA audit with zero findings related to documentation access, and the security team can produce a full access log showing exactly who viewed the incident response runbooks during a breach simulation.

Open-Source Project Maintaining Community Docs While Protecting Enterprise Feature Guides

Problem

An open-source project with a commercial enterprise edition keeps all documentation in a single public GitBook, meaning enterprise-only features like SSO configuration and audit log APIs are visible to community users who cannot use them, generating confused GitHub issues and support tickets.

Solution

Multi-Tier Access creates a public GitBook space for community documentation and a separate, authenticated GitBook organization for enterprise customers, with internal engineering notes kept in a private GitHub wiki gated by org membership.

Implementation

["Fork the existing public GitBook into two spaces: 'Community Docs' (public) and 'Enterprise Docs' (invite-only), copying only the relevant pages to each.", 'Configure the Enterprise Docs space to require a GitBook account linked to a verified enterprise customer email domain, provisioned automatically when a license is issued.', "Add prominent banners on community pages that describe enterprise features, linking to a 'Learn about Enterprise' landing page rather than the locked documentation directly.", 'Set up a GitHub Action that syncs the internal engineering wiki from a private repo, ensuring it is never accidentally published to either public-facing space.']

Expected Outcome

Community GitHub issues referencing enterprise-only features drop by 60%, enterprise customers report faster self-service onboarding because their docs are no longer buried among community content, and the support team can point customers to tier-appropriate resources instantly.

Financial Services Firm Controlling Access to Trading API Docs for Retail vs. Institutional Clients

Problem

A brokerage platform's developer portal exposes institutional-grade API documentation—including FIX protocol specs, direct market access endpoints, and co-location setup guides—to retail developers who lack the regulatory approval and capital requirements to use them, creating compliance and liability risks.

Solution

Multi-Tier Access gates institutional API documentation behind a KYC-verified partner tier, so retail developers see only the standard brokerage API, while institutional clients authenticated via client certificate see the full FIX and DMA documentation in a separate portal section.

Implementation

['Classify all API documentation into three tiers: Retail (OAuth 2.0 standard flow), Institutional (client certificate + compliance approval flag in the identity provider), and Internal (VPN + employee SSO only).', "Implement attribute-based access control (ABAC) in the developer portal so that the 'institutional_approved' claim in the JWT automatically unlocks the institutional documentation section upon login.", 'Add a compliance gate in the onboarding flow: institutional docs remain hidden until the compliance team marks the account as approved in the CRM, which triggers a webhook to update the identity provider claim.', 'Audit access logs monthly, cross-referencing documentation views against active institutional agreements to ensure no lapsed clients retain access to DMA specs.']

Expected Outcome

The compliance team achieves full auditability of who accessed institutional trading documentation, eliminating a regulatory gap identified in the previous year's internal audit, and retail developer confusion about unavailable endpoints drops measurably in support ticket volume.

Best Practices

âś“ Define Permission Tiers Before Migrating Any Content

Attempting to retrofit access controls onto an existing flat documentation structure leads to miscategorized pages and permission gaps. Establish a clear taxonomy—such as Public, Partner, and Internal—with written criteria for what qualifies each page for a given tier before touching a single document. This upfront design prevents the most common failure mode: content that is technically locked but logically belongs in the wrong tier.

âś“ Do: Create a one-page access tier charter that defines inclusion criteria for each tier (e.g., 'Partner tier includes any content requiring a signed NDA or active integration agreement') and get sign-off from legal, security, and product before migration begins.
âś— Don't: Don't start by locking existing pages one-by-one based on gut feel, as this produces an inconsistent permission model where similar content sits in different tiers and creates user confusion and audit failures.

âś“ Sync Documentation Access Permissions with Your Identity Provider Groups

Manually managing which users can see which documentation tier is error-prone and creates stale access when employees change roles or partners lose their agreements. Connecting your documentation platform to an identity provider (Okta, Azure AD, Auth0) and driving access from group membership ensures that a partner who loses their contract automatically loses documentation access when removed from the partner group. This also enables just-in-time provisioning for new users.

âś“ Do: Map each documentation tier to a specific IdP group (e.g., 'docs-partner-tier' in Okta) and configure the documentation platform to grant access based solely on group membership, so access follows the source-of-truth identity system.
âś— Don't: Don't create documentation-platform-native user accounts or manually managed access lists that exist independently of your IdP, as these become orphaned and are rarely cleaned up during offboarding processes.

âś“ Surface Locked Content Existence to Lower Tiers with Upgrade Prompts

Hiding the existence of higher-tier documentation entirely frustrates users who need to understand what capabilities exist before requesting access. A partner who cannot find any mention of the bulk import API may never know to ask for it, stalling their integration. Showing locked content titles and brief descriptions with a clear access request path converts documentation discovery into a business opportunity and reduces misdirected support tickets.

âś“ Do: Display locked page titles and one-sentence descriptions to lower-tier users with a 'Request Access' or 'Upgrade to Partner' call-to-action that links directly to the appropriate approval workflow or sales contact.
âś— Don't: Don't make locked pages return a 404 or blank error to unauthorized users, as this makes your documentation architecture appear broken and gives users no actionable path to obtain the content they need.

âś“ Conduct Quarterly Access Tier Audits with Automated Reporting

Documentation access permissions drift over time as team members change roles, partnerships expire, and new content is added without proper tier assignment. A quarterly audit process that generates a report of all users per tier, cross-referenced against active contracts and employment records, catches over-privileged access before it becomes a security or compliance incident. Automating this report from your IdP and documentation platform APIs makes the audit practical rather than a manual burden.

âś“ Do: Schedule an automated quarterly report that lists every user with partner-tier or internal-tier documentation access, their last login date, and their current status in the HR or CRM system, then assign a documentation owner to review and revoke stale access within a defined SLA.
âś— Don't: Don't treat documentation access as a set-and-forget configuration; avoid skipping access reviews because documentation 'isn't as sensitive as production systems,' since internal runbooks and partner API specs frequently contain information valuable to attackers or competitors.

âś“ Version and Branch Tier Permissions Alongside Documentation Content

When a product releases a new version, the access tier for documentation about that version's features may differ from the previous version—a feature that was partner-only in v2 may become public in v3. Treating permission tiers as metadata that travels with the content version, rather than a global setting, prevents the common problem of a public v3 page accidentally linking to a still-locked v2 partner page for background context. This is especially critical in docs-as-code workflows using Git.

âś“ Do: Store access tier metadata (e.g., a 'tier: partner' frontmatter field) directly in each documentation file within the repository, so that when a branch is merged or a version is released, the permissions are reviewed as part of the pull request process alongside the content changes.
âś— Don't: Don't manage tier permissions exclusively in the documentation platform's UI settings disconnected from the content repository, as this creates a gap where content and its permissions can fall out of sync during migrations, platform changes, or version releases.

How Docsie Helps with Multi-Tier Access

Build Better Documentation with Docsie

Join thousands of teams creating outstanding documentation

Start Free Trial