Access Rules for Distributed Organizations

In March, we explored how to secure and manage data across multiple locations — without the headaches. We covered strategies for controlling access to tables, columns, and rows, ensuring sensitive information stays in the right hands.

Timestamps

00:30 Document overview
03:15 ❔ User Question: How to wrap text in a cell?
04:20 Access Rules
04:39 Default Rules
09:02 Special Rules
10:46 Seed Rules
11:20 User Attributes
16:27 Granting table access based on Role and Location
21:45 Matching values in a reference list
24:28 ‘View as’ another user
29:08 Matching a user attribute to a value in a reference column
32:02 Locking records from editing after some condition is met
35:04 ❔ User Question: Are rules evaluated in the order listed? Should most-specific rules be listed first?
38:09 Adding a memo
38:34 Restricting column-level access
45:50 A review of how Default Rules apply
47:53 ❔ User Question: Can we host and link Grist data to a M365 tenant?

Useful links:

Document shown: