Permission Scheme

Master this essential documentation concept

Quick Definition

A configurable set of rules in a documentation platform that controls which users or groups can view, edit, or administer specific content areas.

How Permission Scheme Works

graph TD PS[Permission Scheme] --> VG[View Group] PS --> EG[Edit Group] PS --> AG[Admin Group] VG --> GU[Guest Users] VG --> EU[External Clients] EG --> DE[Documentation Engineers] EG --> TW[Technical Writers] AG --> DA[Doc Admins] AG --> PM[Project Managers] PS --> CA[Content Area] CA --> PD[Product Docs] CA --> ID[Internal Runbooks] CA --> AD[API Reference] style PS fill:#4A90D9,color:#fff style VG fill:#7ED321,color:#fff style EG fill:#F5A623,color:#fff style AG fill:#D0021B,color:#fff

Understanding Permission Scheme

A configurable set of rules in a documentation platform that controls which users or groups can view, edit, or administer specific content areas.

Key Features

  • Centralized information management
  • Improved documentation workflows
  • Better team collaboration
  • Enhanced user experience

Benefits for Documentation Teams

  • Reduces repetitive documentation tasks
  • Improves content consistency
  • Enables better content reuse
  • Streamlines review processes

Turning Video Walkthroughs Into Enforceable Permission Scheme Documentation

When onboarding new team members or rolling out platform changes, many documentation teams default to recording walkthroughs that explain how their permission scheme is structured — who can access what, which groups own which content areas, and how to request elevated access. It makes sense in the moment: a screen recording captures the configuration visually and the presenter can explain the reasoning behind each rule.

The problem surfaces later. When a technical writer needs to verify whether a contractor group has edit rights to a specific content area, scrubbing through a 45-minute onboarding video is not a practical workflow. Permission scheme decisions are often buried mid-recording, undocumented in any searchable format, and impossible to audit without watching the entire clip.

Converting those recordings into structured documentation changes that dynamic entirely. Your team can extract the specific access rules discussed, organize them by role or content area, and make them searchable and linkable — so the next time someone questions why a user group lacks admin rights, the answer is a search query away rather than a timestamp hunt. You can also keep permission scheme documentation versioned alongside your platform configuration, creating a clear audit trail that video alone cannot provide.

If your team is sitting on a library of recorded platform walkthroughs, there is a more practical way to put that knowledge to work.

Real-World Documentation Use Cases

Restricting Unreleased Product Documentation from External Partners

Problem

A SaaS company shares a Confluence space with integration partners, but pre-release feature docs, internal roadmaps, and security advisories are accidentally visible to external partner accounts, creating NDA violations and competitive risk.

Solution

A Permission Scheme separates the partner-facing space into two tiers: a 'Partner View' group with read-only access to published API docs, and an 'Internal Only' group restricted to employees, ensuring pre-release pages are invisible to partner logins entirely.

Implementation

["Audit the existing space and tag all pre-release and internal pages with a dedicated label like 'internal-only'.", "Create a Permission Scheme with two groups: 'External Partners' (View permission only on approved pages) and 'Internal Staff' (View + Edit on all pages).", "Apply page-level restrictions on all 'internal-only' labeled pages to block the 'External Partners' group explicitly.", 'Set up a quarterly permission review task to validate that new pages created by writers are assigned to the correct group before publishing.']

Expected Outcome

Zero accidental disclosures of pre-release content to partners, with audit logs confirming external accounts can only access 73 approved API reference pages out of 400+ total space pages.

Enabling Contractors to Edit Draft Docs Without Accessing Production Runbooks

Problem

A DevOps team onboards contract technical writers to update user-facing guides, but their documentation platform grants space-wide edit access by default, exposing sensitive production incident runbooks and on-call escalation procedures to contractors.

Solution

A Permission Scheme creates a 'Contract Writers' group scoped exclusively to the 'User Guides' and 'Release Notes' sections with Edit permissions, while production runbooks under 'Operations' remain restricted to full-time staff with a separate 'Ops Team' permission group.

Implementation

["Define two distinct content areas in the platform: 'Customer-Facing Docs' and 'Operations Runbooks', each governed by its own Permission Scheme.", "Create a 'Contract Writers' group assigned View + Edit + Comment rights only within the 'Customer-Facing Docs' scheme.", "Assign all contractors to the 'Contract Writers' group during onboarding, never granting space-admin or global roles.", "Configure the 'Operations Runbooks' scheme to explicitly deny all permissions to the 'Contract Writers' group, overriding any inherited space defaults."]

Expected Outcome

Contractors can fully contribute to 12 user guide sections without ever seeing operational runbooks, reducing security review overhead by eliminating manual page-by-page restriction setting for each new contractor.

Enforcing Regulatory Compliance for HIPAA-Sensitive Clinical Documentation

Problem

A healthcare technology firm maintains clinical workflow documentation alongside general product guides in the same platform. Compliance auditors find that support staff and marketing employees have read access to pages containing PHI-adjacent process descriptions, violating HIPAA minimum-necessary rules.

Solution

A Permission Scheme called 'Clinical Compliance' restricts the clinical documentation space to a 'Clinical Staff' group (verified, HIPAA-trained employees) with View + Edit, while all other platform users are explicitly excluded from the space at the scheme level.

Implementation

["Work with the compliance team to identify all pages containing PHI-adjacent content and migrate them into a dedicated 'Clinical Workflows' space.", "Create a 'Clinical Compliance' Permission Scheme that grants access exclusively to members of the 'Clinical Staff' Active Directory group, synced via SSO.", "Remove the default 'All logged-in users' view permission from the space and replace it with the explicit 'Clinical Staff' group only.", 'Generate monthly permission audit reports from the platform showing exactly which accounts accessed the clinical space, submitted to the compliance officer.']

Expected Outcome

Passes HIPAA access control audit with documented proof that only 34 credentialed clinical staff members have any access to clinical documentation, down from 210 employees who previously had implicit access.

Managing Multi-Tenant Documentation for a Managed Service Provider

Problem

An MSP maintains separate documentation for 15 client environments in a single Confluence instance. Client A's engineers can browse to Client B's network architecture docs by guessing page URLs, since all clients share the same global permission defaults.

Solution

Each client receives a dedicated space governed by a unique Permission Scheme named after the client (e.g., 'Acme Corp Scheme'), granting View + Edit only to that client's designated contacts and the MSP's internal team, with no cross-client group membership.

Implementation

["Create one Confluence space per client and apply a uniquely named Permission Scheme to each space that includes only that client's user group and the MSP 'Internal Engineers' group.", "Disable anonymous access and 'All logged-in users' defaults at the global platform level to eliminate permission inheritance loopholes.", "Automate user provisioning so that when a new client contact is added in the CRM, they are automatically added only to their client's permission group via a Jira automation or API script.", "Conduct semi-annual cross-client permission audits by attempting to access each client space with a test account from a different client group, verifying 'Access Denied' responses."]

Expected Outcome

Complete tenant isolation confirmed across all 15 client spaces, with automated provisioning reducing manual permission setup time from 45 minutes per new client to under 3 minutes.

Best Practices

Map Permission Schemes to Organizational Roles, Not Individual Users

Assigning permissions directly to individual user accounts creates an unmanageable web of exceptions that breaks when employees change roles or leave the organization. Permission Schemes should reference named groups tied to job functions (e.g., 'Technical Writers', 'Engineering Managers') so that access automatically updates when group membership changes via HR or identity provider sync.

✓ Do: Create role-based groups like 'Senior Technical Writers' or 'External API Partners' and assign Permission Scheme rights to these groups, managing membership centrally in your identity provider.
✗ Don't: Never add individual user accounts (e.g., john.doe@company.com) directly to a Permission Scheme, as this creates orphaned permissions when users leave and requires manual cleanup across every scheme they appear in.

Apply the Principle of Least Privilege When Configuring View and Edit Rights

Default platform configurations often grant broad 'All logged-in users' view access, which violates least-privilege principles and exposes sensitive documentation to unintended audiences. Each Permission Scheme should grant only the minimum access level required for a group to perform their specific documentation function, with Edit rights reserved for active contributors.

✓ Do: Start every new Permission Scheme with zero permissions and explicitly add only the groups and rights that are justified for that content area, documenting the business reason for each grant.
✗ Don't: Do not copy-paste an existing Permission Scheme as a starting template without auditing it first, as inherited over-permissive settings will silently propagate to the new content area.

Establish a Named Owner for Every Permission Scheme

Permission Schemes without a designated owner become stale, with outdated groups and access levels that no one feels responsible for reviewing. Assigning a named Documentation Administrator or Team Lead as the scheme owner creates accountability and ensures the scheme is reviewed when team structures or content sensitivity changes.

✓ Do: Document the scheme owner's name, team, and review cadence (e.g., 'Reviewed quarterly by: Sarah Chen, Docs Platform Lead') directly in the scheme's description field within the platform.
✗ Don't: Do not assign ownership to a shared team alias or leave the owner field blank, as this guarantees that permission reviews are skipped indefinitely during team transitions.

Use Separate Permission Schemes for Draft and Published Content Stages

Treating in-progress draft documentation with the same permissions as published content exposes incomplete, inaccurate, or sensitive work-in-progress to audiences who should only see approved material. Maintaining distinct schemes for draft spaces (restricted to writers and reviewers) and published spaces (broader read access) enforces a deliberate content promotion workflow.

✓ Do: Configure a 'Draft Content' Permission Scheme limited to the writing team and subject matter experts, and a separate 'Published Content' scheme that opens view access to the broader intended audience after editorial approval.
✗ Don't: Do not use page-level restrictions alone to protect drafts within a publicly-viewable space, as this is error-prone and relies on individual writers remembering to set restrictions on every new draft page.

Audit Permission Scheme Membership After Every Organizational Change

Mergers, reorgs, contractor offboarding, and role changes all create stale permission group memberships that accumulate silently over time, gradually expanding access beyond intended boundaries. Scheduling permission audits tied to organizational change events—rather than only on a calendar cadence—catches access drift before it becomes a compliance or security issue.

✓ Do: Integrate permission scheme audits into your offboarding checklist and org-change runbooks, generating a report of all groups a departing employee belonged to and confirming their removal from every scheme-linked group within 24 hours of departure.
✗ Don't: Do not rely solely on annual security audits to catch permission drift, as a contractor who left 11 months ago may have retained edit access to sensitive architecture documentation for nearly a full year.

How Docsie Helps with Permission Scheme

Build Better Documentation with Docsie

Join thousands of teams creating outstanding documentation

Start Free Trial