ChangelogBook a demoSign up

Identity Resolution permissions

Identity resolution is only available on Business tier plans. You can use it with or without Customer Studio.
AudienceHow you’ll use this article
Organization adminsConfigure which teams can create, run, or manage identity graphs.
Workspace adminsGrant the right users IDR access without over‑privileging sources, destinations, or credentials.

Overview

Permissions for Identity Resolution (IDR) are managed through source-level permissions, not through a separate IDR permission system.

There are two important rules:

  • All users in a workspace can see all identity graphs.
    There is currently no way to restrict visibility of specific IDR graphs.

  • Only users with Configure schema permission on a source can create, edit, or delete identity graphs tied to that source.

Each identity graph is tied to exactly one source (for example, Snowflake, Databricks). Control over IDR is enforced at that source level.

Your ability to:

  • Create identity graphs
  • Edit identifier rules, models, or Golden Records
  • Delete graphs

is determined entirely by whether your group’s role includes Configure schema for the underlying source.

New to Hightouch access control? Start with
Managing users and groups and
Role-based access control (RBAC).


How IDR permissions work

  • Each identity graph is tied to exactly one source.
  • Visibility
    • All workspace users can view all IDR graphs.
    • There is no per-graph or per-source visibility control for IDR.
  • Create / edit / delete (CUD)
    • Requires Configure schema permission on the source used by the graph.
    • This permission can be granted through:
      • Workspace admin role (broad access), or
      • A custom role scoped to specific sources (recommended).

Permissions are evaluated per source. A user may:

  • Be able to edit IDR graphs tied to Source A, and
  • Not be able to edit graphs tied to Source B,

depending on whether their role includes Configure schema for those sources.


Default behavior and role mapping

View access

All users with access to the workspace can:

  • Open the Identity Resolution list page
  • Open any identity graph
  • View tabs like Summary, Runs, Models, Rules, Golden Records, Inspector, Configuration
  • Preview resolved data and Golden Records

There is currently no way to restrict view access to specific identity graphs.


Create / edit / delete access

By default:

  • Workspace admins can create, edit, and delete IDR graphs because they have Configure schema on all sources.
  • Other users must have a custom role that grants Configure schema on the specific source tied to the identity graph.

To create, edit, or delete an IDR graph, a user must have:

  • Configure schema on that source

Additional permissions (such as View source data or Configure models & syncs) may be required depending on broader responsibilities, but they do not control IDR graph CUD access.


Where you configure IDR access

IDR doesn’t have its own permissions screen. Access is always managed at the group level:

  • Users gain IDR permissions through the groups they belong to
  • Groups gain access through workspace roles and custom roles

You configure this via:

  • Settings → Organization → Users and groups
    • See which groups a user belongs to and which workspaces they can access.

Organization settings page showing Users and Groups navigation for assigning roles

  • Settings → Organization → Groups
    • Define groups (for example, Data Platform, Marketing, Analytics).
    • On the Workspaces tab, choose the role (Workspace admin/editor/viewer or Custom…) for each workspace.
    • On the Members tab, add or remove users in each group.

Organization settings page showing Workspaces navigation for assigning roles

  • Settings → Workspace → Groups
    • See which groups have access to the current workspace and what their roles are.

Workspace settings page showing Groups navigation for assigning roles


Granting IDR edit access (Configure schema)

To let a team create and manage IDR without making them full Workspace admins, assign their group a custom role that includes Configure schema permission for the relevant source(s).

  1. Go to Settings → Organization → Groups and open the group that should manage IDR.
  2. In the group’s Workspaces tab, find the workspace and set the role to Custom….
  3. Click Edit custom role.

Organization settings page showing Custom role editor

  1. In the custom role editor:
    • Open the Sources section.
    • For the source used by your identity graph:
      • Turn on Configure schema.
      • (Optional) Turn on View source data and Configure models & syncs if these users also own models/syncs on top of IDR outputs.

Organization settings page showing Configure schema

  1. Save the role.

You can also reach this custom‑role editor from Settings → Workspace → Groups by setting the group’s role to Custom… and clicking Edit custom role….

Result

Members of this group can now:

  • Create identity graphs that use that source
  • Edit graphs (models, identifier rules, Golden Record)
  • Delete graphs and adjust Golden Record configuration for that source

IDR ownership stays with the data owners for that source, not with every Workspace admin.

Option 2: Make a group Workspace admin (simple, broad)

Workspace admins have full permissions across the entire workspace, including all sources, destinations, Customer Studio schema, subsets, destination rules, templates, and audit‑log visibility. Use this only for users who genuinely need broad administrative access.

  1. Go to Settings → Organization → Groups.
  2. Open or create a group that should own admin access for this workspace.
  3. In the group’s Workspaces tab, set the role for the workspace to Workspace admin.

Organization settings page showing Workspace admin role

  1. In the group’s Members tab, click + Add users and add the Workspace admins.

Organization settings page showing Members tab with Add users button

These users now:

  • Have Configure schema on all sources in that workspace
  • Have full IDR access (create, edit, delete graphs and Golden Records)
  • Can manage all other workspace resources

Organization admins are a special built‑in group. They inherit Workspace admin in all workspaces and can manage org‑wide settings like billing, SSO, and groups. Keep this group as small as possible.


How roles combine (multiple groups)

Users can belong to multiple groups. Their effective permissions are the union of all group roles.

Example:

  • Group A → Workspace viewer
  • Group B → Custom role with Configure schema for one source

The user can:

  • View everything in the workspace (from Group A)
  • Edit IDR only for that one source (from Group B)

This pattern works well for:

  • Giving broad read-only access to many users
  • Adding narrow edit rights where needed (for example, a specific source or set of destinations)

Destination permissions for IDR syncs

IDR permissions cover only the graph and Golden Record. To sync IDR outputs, users also need destination and sync permissions.

If a team will:

  • Create syncs from _resolved, _resolved_identifiers, or _golden_records tables, or
  • Build Customer Studio audiences on top of IDR outputs and sync them downstream,

then their group’s custom role must also include:

  1. Settings → Organization → Groups → open the group.
  2. Click Edit custom role.
  3. Under Destinations, grant:
    • Manage destination for the appropriate destinations.
    • Create / edit / run syncs as required by your governance model.

Organization settings page showing Destinations section


Customer Studio permissions (if you use Customer Studio)

If Customer Studio is enabled:

  • The IDR Golden Record table is often the parent model.
  • Many marketers should work in Customer Studio only, without direct IDR/source access.

Recommended split:

  • Data / platform teams
    • Own IDR graphs and Golden Record via Configure schema on sources.
  • Marketing teams
    • Use Customer Studio-specific roles that:
      • Let them create/edit traits, audiences, journeys
      • Do not include source‑level Configure schema

Configure this in the same custom role:

  1. Settings → Organization → Groups → open the marketing group.
  2. Click Edit custom role.
  3. Under Customer Studio, grant:
    • Access to the relevant parent model(s) (Golden Record)
    • The audience/trait actions they need
  4. Keep Configure schema on sources turned off for this group.

Organization settings page showing Customer Studio section


Troubleshooting

“I can’t create an identity graph”

Likely:

  • Your groups don’t include Configure schema for the source.
  • You’re only a Workspace viewer or Workspace editor.

Fix:

  • Ask a Workspace admin or Organization admin to:
    • Add you to a group whose custom role includes Configure schema for that source, or
    • Make you a Workspace admin (if broad access is acceptable).

“I can view IDR graphs but can’t edit them or Golden Records”

Likely:

  • You have read‑only access (for example, Workspace viewer or a role with only View source data).

Fix:

  • Have an admin:
    • Extend your group’s custom role to include Configure schema for that source, or
    • Move IDR ownership to a separate group and add you there.

“I don’t see any identity graphs at all”

Likely:

  • You don’t have read access to the source(s) IDR uses.
  • You’re not in any group with access to this workspace.

Fix:

  • Confirm you are:
    • In at least one group with access to the workspace
    • In a group whose role includes read permissions on the relevant sources

Ready to get started?

Jump right in or a book a demo. Your first destination is always free.

Book a demoSign upBook a demo

Need help?

Our team is relentlessly focused on your success. Don't hesitate to reach out!

Feature requests?

We'd love to hear your suggestions for integrations and other features.

Privacy PolicyTerms of Service

Last updated: Feb 26, 2026

On this page

Was this page helpful?