Prompts Permissions

Role-based access control for workspace-owned prompts.

Policy Resolution

Prompt flows are workspace-capability driven and then filtered by plan and feature gates.

Effective Permission = Workspace Role Capability AND Plan/Feature Gate

Operation To Gate Mapping

OperationGate
Add prompt versioncanContribute
Edit version/default/metadatacanUpdate
API integration actionscanUpdate
Delete prompt/versioncanDelete
Move private prompt to workspacecanUpdate

Role Availability Matrix

RoleViewAdd VersionEdit/Default/APIDeleteMove Private Prompt
OwnerYesYesYesYesYes
AdminYesYesYesYesYes
ContributorYesYesYesNoYes
ReaderYesNoNoNoNo
GuestNoNoNoNoNo
Note:
Prompt UI controls can vary by flow; backend authorization remains authoritative.

FAQ

How are prompt permissions evaluated?+

In current implementation, prompt permissions are primarily workspace-capability driven, then constrained by plan and feature gates.

Q1

Can Contributor edit prompts?+

Yes. Contributor can add and edit versions, but cannot delete prompt versions or prompts.

Q2

Can Reader perform API integration actions?+

No. Reader has view-only prompt access and cannot run edit/default/API-management actions.

Q3

Can Guest access workspace prompts?+

No. Guest does not have workspace-owned prompt management access.

Q4

Are prompt run controls always mapped to canRun?+

Prompt run behavior is often constrained by page access and backend authorization rather than explicit canRun UI checks.

Q5

Tip:
For cross-entity policy details, see Workspace Permissions Matrix.