Users and access
Manage team members, permissions, custom roles, and Single Sign-On (SSO).
Collaborate with your team while keeping control over who can see and change content. This guide shows how to invite users, assign roles, and set up advanced access options.
Manage users
Add and remove team members in your repository settings.
Invite users
Starting from the starter plan, you can invite users to your repository. Go to Settings > Users.
Enter their email, choose a role (if available), and send the invite. They’ll get an email and also see the pending invite in their dashboard.
Remove users
Go to Settings > Users and click the Remove button next to their name.
Transfer ownership
Only the repository owner can transfer ownership to another user.
- In Settings > Users, scroll to Transfer ownership.
- On the free plan (single user), enter the new owner’s email. The transfer is completed once the new owner accepts the invitation.
- On paid plans, select user who you’d like ownership transferred to. The transfer happens immediately.
If the current owner has lost access to a repository, an administrator can request ownership through the support portal.
Repository roles
Repository roles define what each user can do across the entire repository.
In Small and Starter plans, all users are Administrators. Plans from Medium and above include additional roles for more granular control.
Go to Settings > Users and use the Role Type dropdown next to the user’s name.
The table below describes each role:
Writer | Create and edit pages and releases |
Publisher | Everything a Writer can do, plus: |
Administrator | Everything a Publisher can do, plus:
|
Repository Owner | Everything an Administrator can do, plus:
|
Contributor | When Custom Roles are active, users who are Writers or Publishers appear as Contributors at the repository level. Their permissions are configured in Space settings > User roles |
Custom roles (Enterprise)
If you use multiple locales, custom roles lets you define permissions for each locale within a Space.
In Space settings > User roles, choose what each person can do in their assigned locales for that Space, or apply a role to everyone in the repository for that Space.
The table below describes each role:
Read-only | View pages and releases |
Writer | Everything a Read-only can do, plus: |
Publisher | Everything a Writer can do, plus: |
Repository owner and Administrators | Administrators can do everything a Publisher can do, plus: |
SSO
Enterprise customers can enable Single Sign-On (SSO) to control login through their company’s IDP. Prismic supports OAuth2 identity providers (IdP) including Google, Okta, Microsoft Entra ID, and Auth0.
Contact Prismic sales at sales@prismic.io to request SSO setup. Then create a new application using the instructions for your IdP below:
Go to the Credentials section of the Google Developer Console. Click on OAuth consent screen and add the following information.
Application Name | Prismic |
Application Logo | Insert Prismic Logo |
Support Email | support@prismic.io |
Scope for Google API | email profile openid |
Authorized domains | prismic.io |
Application Homepage link | https://prismic.io |
Application Privacy Policy | https://prismic.io/legal/privacy |
Application Terms & Conditions | https://prismic.io/legal/terms-of-service |
Then, click on Credentials > Create credentials. Select OAuth Client ID and then Web application. Save the form.
To provide access to existing users, assign them to the Prismic Google application. New users can be invited directly from the Prismic repository.
Finally, send the Client ID and Secret to your CSM using encrypted email or a one-time link.
Okta
Go to Applications > Add Application. Select Web as the platform and OpenID Connect as the Sign on method. Click Create and add the information below. Then, click Save and securely store the Client ID and Secret.
Application Name | Prismic |
Login redirect URIs | https://prismic.io/sso/{yourEmailDomain}/callback |
Then, go to the endpoints section of the Okta documentation. Securely store the /authorize
, /token
, and, /userinfo
endpoints.
To provide access to existing users, assign them to the Prismic Okta application. New users can be invited directly from the Prismic repository.
Finally, send the Client ID, Client Secret, /authorize
, /token
, and, /userinfo
endpoints to your CSM using encrypted email or a one-time link.
OAuth2 IdPs
Go to your IdP’s dashboard and create a new Open ID Connect application using the callback URI: https://prismic.io/sso/{your-email-domain.com}/callback.
To provide access to existing users, assign them to the Prismic application. New users can be invited directly from the Prismic repository.
Then, send the clientID
, clientSecret
, authorizeUrl
, accessTokenURL
, scope
, profileURL
and, userInfoUrl
to your CSM using encrypted email or a one-time link.