Curiosity for Developers
  • Overview
  • Getting Started
    • Introduction
    • System Overview
      • Workspace
      • Connectors
      • Front End
    • Requirements
    • Installation
      • Deploying on Windows
        • Download Curiosity Workspace for Windows
      • Deploying on Docker
        • Deploying using Docker Desktop App
        • Docker Hub
      • Deploying on Kubernetes
      • Deploying on OpenShift
      • Configuration
    • Configure your Workspace
    • Connecting to a Workspace
      • Download App
    • Built-in Templates
  • Security
    • Introduction
    • Hosting
    • Encryption
    • Users and Access
      • User Invitations
      • Single Sign-On (SSO)
        • Google Sign-In
        • Microsoft / Azure AD
        • Okta
        • Auth0
    • Permissions Management
    • Auditing
    • Teams management
    • Configuring Backup
      • Restoring a backup
    • Activate a workspace license
  • Data Sources
    • Introduction
    • User Apps
    • Workspace Integrations
    • API Integrations
      • Introduction
      • Data Modeling
      • Writing a Connector
      • Access Control
      • API Tokens
      • API Overview
      • Tips
    • Supported File Types
    • Curiosity CLI
      • Installation
      • Authentication
      • Commands
  • Search
    • Introduction
    • Languages
    • Synonyms
    • Ranking
    • Filters
    • Search Permissions and Access Control
  • Endpoints
    • Introduction
    • Creating an endpoint
    • Calling an endpoint
    • Endpoint Tokens
    • Endpoints API
  • Interfaces
    • Introduction
    • Local Development
    • Deploying a new interface
    • Routing
    • Node Renderers
    • Sidebar
    • Views
  • Artificial Intelligence
    • Introduction
    • Embeddings Search
    • AI Assistant
      • Enabling AI Assistant
    • Large Language Models
      • LLMs Models Configuration
      • Self-Hosted Models
    • Image Search
    • Audio and Video Search
  • Sample Workspaces
    • Introduction
    • HackerNews
    • Aviation Incidents
    • Covid Papers
    • NASA Public Library
    • Suggest a Recipe
  • Basic Concepts
    • Graph database
    • Search Engine
  • Troubleshooting
    • FAQs
      • How long does it take to set up?
      • How does Curiosity keep my data safe?
      • Can we get Curiosity on-premises?
      • Can I connect custom data?
      • How does Workspace pricing work?
      • Which LLM does Curiosity use?
      • What's special about Curiosity?
      • How are access permissions handled?
      • What enterprise tools can I connect?
      • How to access a workspace?
      • How do I hard refresh my browser?
      • How do I report bugs?
      • How do I solve connectivity issues?
      • How do I contact support?
  • Policies
    • Terms of Service
    • Privacy Policy
Powered by GitBook
On this page
  1. Search

Search Permissions and Access Control

PreviousFiltersNextIntroduction

Last updated 11 months ago

You can Manage and identify what is searchable within the system. This feature allows you to hide certain data types and restrict access to specific information, ensuring that sensitive or irrelevant data remains protected and only accessible to authorized personnel.

Managing Searchable Content

You can specify which types of data should be included in the search index. This flexibility enables you to focus search results on the most relevant and necessary information for your organization. For example:

  • Exclude Personal Data: Ensure that personal files or sensitive information, like HR records, are not indexed in the general search.

  • Restrict Financial Documents: Limit the indexing of financial records to specific departments such as Finance and Accounting.

Access Control

Curiosity allows you to define access levels for different users or groups within your organization. This ensures that only authorized personnel can search and view specific data types. Examples include:

  • Team-based Access: Marketing teams can be given access to marketing materials, while restricting access to R&D documents.

  • Role-specific Access: Executives can access confidential strategic documents, while general staff members cannot.

Examples and Use Cases

  • Client Data Confidentiality: If your organization handles client data, you can ensure that only client-facing teams can search and access this information, protecting client privacy and maintaining compliance with data protection regulations.

  • Project Confidentiality: For projects that are in the early stages of development, restrict access to only those team members directly involved, preventing premature exposure of sensitive project details.

Benefits of Controlled Searchability

  • Enhanced Security: By controlling what is searchable and who can access certain data, you significantly reduce the risk of data breaches and unauthorized access.

  • Improved Relevance: Tailor the search experience to the needs of different departments, ensuring that users only see the most relevant results for their roles.

  • Compliance and Privacy: Maintain compliance with industry regulations and internal privacy policies by ensuring sensitive information is only accessible to those with the appropriate permissions.

For detailed instructions on setting up and managing these permissions, please refer to the comprehensive documentation under the section, specifically the subpage titled . This documentation provides step-by-step guidance on how to configure and maintain search permissions and access controls effectively.

If you have any questions about search permissions and access control, please contact us at .

Security
Permissions Management
hello@curiosity.ai