Managing Access to Sensitive Workflows in Console

In this article

No headings found on page

How sensitive workflow access works in Console

Sensitive workflows in Console are governed by three primary functions: Knowledge Base access, Playbooks, and Access Policies. Together, these controls determine who can see information, who can trigger automation, and how access to connected systems is granted.

Console integrates directly with Identity and Access Management (IAM) providers such as Okta, Google Cloud Identity, and Microsoft Entra to enforce group-based access controls. These integrations allow organizations to align workflow permissions with existing IAM structures.

Access control combines role-based permissions, workspace scoping, approval workflows, app-level access policies, and controlled action execution. These controls help ensure that high-impact actions follow defined review and execution paths.

Controlling access with roles and workspaces

Roles determine what users are permitted to do within a workspace, including which workflows they can trigger and which configuration settings they can change. 

In addition to role-based permissions, Knowledge Base access can be restricted using identity groups. For example, onboarding and offboarding documentation can be limited to members of an HR group in Okta. Users outside of that group are not able to retrieve or reference those articles through Console. This ensures sensitive documentation is only surfaced to authorized teams.

Access to sensitive workflows can be further controlled by:

  • Assigning appropriate roles to users or groups

  • Limiting access to specific workspaces

  • Reviewing role assignments regularly

Workspace-level scoping allows teams to separate operational access across departments or environments.

Using approvals to review high-impact requests

Playbooks can be restricted so that only specific users or groups are permitted to trigger certain workflows. For example, the ability to create a Slack group or initiate a payroll change can be limited to designated roles. This prevents broad access to high-impact automation.

In addition, approvals can be configured as part of workflow logic to ensure sensitive actions are reviewed before execution. Requests are routed to designated approvers and require human review before changes are applied. Approval logic can vary depending on the type of request or system involved, allowing teams to apply additional oversight where necessary. 

Workflows can also be partially automated. Certain steps may execute automatically, while others require explicit approval from a manager or administrator. This allows organizations to control which parts of a sensitive workflow are automated and which require human review.

Enforcing policies with app access controls

App Access Policies allow teams to control how integrated systems are used within Console.

Policies can:

  • Restrict which users or groups can execute actions in connected apps

  • Enforce approval requirements for certain actions

  • Standardize how sensitive systems are accessed

They can also define the duration of granted access and vary approval requirements based on user attributes. For example, junior employees may require managerial approval for certain requests, while senior team members may follow a different review path. These policies allow organizations to tailor enforcement based on risk level.

When combined with role-based permissions and workspace scoping, app-level policies provide structured control over high-risk workflows. 

Executing and tracking sensitive actions

Sensitive workflow requests are captured and processed within Console.

Teams can review the request that initiated the action, confirm approval steps were followed, and maintain visibility into executed changes. This traceability supports accountability across automated workflows.

Maintaining ongoing governance

Managing sensitive workflows requires continuous oversight.

Workspaces provide administrative separation across departments. Organizations can create separate Console workspaces for HR, IT, Legal, or Finance. Administrators within one workspace do not have visibility into another workspace’s Knowledge Base, Playbooks, or Access Policies. This ensures backend configuration access is scoped to the appropriate team.

Teams can:

  • Periodically review role assignments

  • Update approval logic as organizational needs change

  • Adjust app access policies when new systems are connected

Using roles, Knowledge Base controls, Playbooks, Access Policies, and workspace separation together allows teams to manage high-risk workflows in a structured and controlled way. 

In this article

No headings found on page

In this article

No headings found on page