Overview
Sharing and Collaboration overview
Semaphor provides powerful sharing and collaboration features that allow you to securely share dashboards and visualizations with team members, customers, and partners. With role-based access control and flexible sharing options, you can ensure the right people have the right level of access to your analytics.
User Types
Semaphor supports two distinct user types, each with different access patterns:
Organization Users
Organization users are internal platform users (employees of your company) with access to manage dashboards across multiple tenants:
- Can create and manage dashboards for customers
- Can share resources with both organization users and tenant users
- Must be pre-created in the system
- Available roles: ADMIN, AUTHOR, POWER_USER, VIEWER
Tenant Users
Tenant users are your end customers or external users of the platform:
- Limited to their tenant scope for complete data isolation
- Auto-created when first accessing the platform
- Can create and manage their own dashboards (with POWER_USER role)
- Available roles: POWER_USER, VIEWER
Key Capabilities
For Organization Users
- Manage dashboards across multiple customer tenants
- Share with both internal team members and external customers
- Create and manage user groups
- Full platform administration (ADMIN role)
For Tenant Users
- Create and manage dashboards within their tenant
- Share with other users in the same tenant
- Collaborate on dashboards (with appropriate access levels)
- View-only access (VIEWER role) or full capabilities (POWER_USER role)
What's Next
Understanding Permissions
Learn how user roles and access levels work together
Dashboard Management
Create, organize, and manage your dashboards
Sharing Resources
Share dashboards with users and groups
Multi-Tenancy
Semaphor is built for multi-tenancy from the ground up:
- Complete isolation between tenants
- Flexible sharing within and across tenant boundaries (organization users only)
- Role-based access at both platform and resource levels
- Security-first design with token-based authentication
For more details on data isolation and security policies, see Security & Multi-Tenancy.