Skip to main content

Can administrators set different control levels for different teams?

Y
Written by Yatheendra Brahmadevera
Updated over a week ago

Direct Answer (TL;DR)

Yes. Brilo AI Permission Levels let administrators assign different control levels to different teams so each group only sees and can change what they need. Permission Levels support role assignment, team-level access controls, and granular permissions to restrict features such as call routing, agent training, and account settings. Administrators configure these controls in the Brilo AI admin console and map roles to teams or permission groups; audit logs record changes for review. This enables least-privilege operation while preserving centralized governance.

Can admins set team-based permissions? — Yes. Brilo AI admins can assign role-based access to teams so each team has a tailored permission set.

Can different teams have different access? — Yes. Use team-level access controls (permission groups) to enable or limit features per team in Brilo AI.

How are permissions assigned? — Permissions are assigned by creating roles and mapping those roles to teams or individual users via Brilo AI’s admin settings.

Why This Question Comes Up (problem context)

Enterprises ask this because organizations often have multiple lines of business (for example, clinical support, fraud operations, and claims teams) that require different capabilities inside Brilo AI. Buyers want to avoid overprivileging users while keeping operations efficient. They also need clear auditability for compliance and to separate duties between teams that manage voice agent training, call routing, and reporting.

How It Works (High-Level)

Brilo AI Permission Levels are implemented through role assignment and team mapping inside the Brilo AI admin console. Administrators create roles that bundle capabilities (for example: view-only reporting, manage agents, or configure routing) and then assign those roles to teams or individual users. Brilo AI enforces those permissions at runtime across the console and API endpoints so users only see features and data their roles allow.

In Brilo AI, Permission level is a named set of enabled and disabled capabilities applied to users or teams.

In Brilo AI, Role is a reusable profile that includes a set of permissions such as agent editing, routing configuration, or audit viewing.

Related concepts in Brilo AI include role-based access control (RBAC), granular permissions, scopes, and audit logs for change tracking.

Guardrails & Boundaries

Brilo AI Permission Levels are designed to reduce risk but have clear boundaries. Brilo AI does not automatically infer least privilege; administrators must define roles and map them correctly. Sensitive actions (for example, deleting data, exporting transcripts, or changing enterprise-wide routing) should be limited to a small set of admin roles and reviewed periodically.

In Brilo AI, Admin role is the role that includes elevated capabilities and should be limited to trusted administrators.

Brilo AI enforces permission checks on UI actions and API calls, and audit logs capture role assignments and privilege changes. Brilo AI will block UI and API operations if the caller’s assigned permission set does not include the required capability. Brilo AI does not override external identity providers unless configured to sync roles from those systems.

Applied Examples

Healthcare example: A hospital’s care coordination team can be assigned a role that allows them to start and stop Brilo AI voice agent campaigns and edit patient-facing scripts, while denying access to billing reports. This keeps clinical staff focused on patient workflows while protecting financial data.

Banking example: A fraud investigation team can receive a role that grants access to call transcripts and case notes but disallows changes to call routing or agent model training. The contact center operations team gets the opposite permissions so they can tune routing without accessing sensitive case files.

Insurance example: Claims adjusters can be given a role to view claim-related call recordings and submit escalation tasks, while the underwriting team keeps access to model configuration and bulk export functions separate.

Human Handoff & Escalation

Brilo AI voice agent workflows can include role-checked handoffs that route a caller to a human queue or notify a user based on their permissions. When a Brilo AI workflow triggers a human handoff, the system evaluates the recipient’s role to confirm they have permission to receive the handoff (for example, to listen to recordings or access PII). If the target user lacks the needed permission, Brilo AI can route to an alternate queue or raise an escalation task for an authorized team member.

Administrators can configure escalation policies so that only users with specific roles receive high-privilege alerts or access to sensitive transcripts. Brilo AI records the handoff and the receiving user’s role in the audit log.

Setup Requirements

  1. Create roles: Define the named roles you need (for example, Reporter, Agent Manager, Ops Admin).

  2. Define permissions: Map each role to a list of allowed and disallowed capabilities (for example, "edit agent", "view transcripts", "export data").

  3. Create teams: Organize users into teams that match your operational groups (for example, Clinical Team, Fraud Ops).

  4. Assign roles to teams: Apply roles to teams or individual users so everyone inherits the correct Permission Levels.

  5. Configure identity integration: Connect your single sign-on provider or directory to sync users (optional) and map directory groups to Brilo AI teams.

  6. Verify audit logging: Ensure audit logs are enabled and test a role change to confirm events are recorded.

  7. Review and iterate: Periodically review role assignments and adjust as workflows change.

If you use a CRM or an external roster, prepare a mapping between your CRM groups and Brilo AI teams.

If you plan to call webhooks for routed events, prepare your webhook endpoint.

Business Outcomes

  • Reduced risk from overprivileged users by applying least-privilege Permission Levels.

  • Clear separation of duties so teams can operate independently—operations can tune routing while compliance keeps audit visibility.

  • Faster onboarding and offboarding through role-to-team mappings that scale across multiple teams and locations.

  • Better auditability for internal reviews and regulatory inquiries because role and permission changes are recorded.

FAQs

Can I create custom roles in Brilo AI?

Yes. Administrators can create and name custom roles and explicitly choose which Brilo AI capabilities are enabled or disabled for each role.

Can permissions be assigned to individual users instead of teams?

Yes. Brilo AI supports assigning roles directly to individual users as well as to teams or groups, giving flexibility for exceptions and temporary access.

How are permission changes tracked?

Permission changes and role assignments are recorded in Brilo AI audit logs so administrators can review who changed what and when.

Can a user have multiple roles?

Yes. Brilo AI allows multiple role assignments; the user’s effective permissions are the union of assigned roles unless your policy enforces stricter conflict rules.

What happens if a user attempts an action they don’t have permission for?

Brilo AI blocks the action in the UI or API and returns an authorization error. The attempted action and the user’s role are logged for review.

Next Step

  • Review your current team structure and list the roles you need for each line of business in Brilo AI.

  • Open the Brilo AI admin console to create roles and assign them to teams, or contact your Brilo AI account representative for a configuration walkthrough.

  • If you need help mapping roles to your identity provider or CRM, request assistance from Brilo AI support or your Customer Success Manager.

Did this answer your question?