Documentation

Permissions Reference

Article

Permissions Reference

This reference lists every resource, action, constraint, and field in the MX8 Labs permissions system. Use it alongside the Understanding Roles and Permissions overview and the Managing Roles and Permissions how-to guide.

Resources

Resources are the objects that permissions are applied to. The wildcard resource (*) matches all resources and is used to grant blanket access — for example, read access to everything in the account.

ResourceDescription
* (All Resources)Wildcard that matches every resource. Typically used for broad read access.
accountThe account record — name, data residency region, and retention settings.
account_assetShared files, images, and other assets uploaded to the account.
exposure_sourceAd exposure tracking integrations for linking advertising data to respondents.
projectA container that groups related surveys for shared reporting and coding.
surveyAn individual survey instrument within a project.
audienceA respondent audience segment deployed against a survey.
reportA reporting view aggregating data from surveys within a project.
report_questionAn individual question configuration inside a report.
report_topicA thematic grouping of questions within a report.
coding_dictionaryThe shared open-end coding scheme for a project's surveys.
coding_labelAn individual code within a coding dictionary.
translationA language translation applied to a survey.
insightAn AI-generated or user-created insight from survey data.
todoA task or action item tracked within the platform.
Actions

Actions describe what a user can do with a resource. Internal actions apply when working in the platform UI. External channel actions control access through the REST API and MCP integrations.

Internal application actions

ActionDescription
readView a resource and its details.
createCreate a new instance of a resource.
updateModify an existing resource.
deletePermanently remove a resource.
go_liveActivate a resource, such as launching an audience to begin data collection.
moveRelocate a resource to a different parent, such as moving a survey between projects.
exportExport data from a resource.
update_cacheRefresh cached or computed data for a resource.
run_internalExecute an internal platform process associated with a resource.

External channel actions

ActionDescription
api_readRead a resource through the REST API.
api_runExecute or trigger operations on a resource through the REST API.
mcp_readRead a resource through the MCP integration.
mcp_runExecute or trigger operations on a resource through the MCP integration.
Constraint Types

Constraints narrow a permission to specific fields or values. They are optional — a permission with no constraint grants unrestricted access to the specified action on the resource.

Constraint TypeDescription
No constraintThe permission applies without restriction. The user can perform the action on the full resource.
allowed_valuesRestricts a field to a specified list of values. The action is only permitted when the target field's value is in the allowed list.
denied_valuesBlocks a specified list of values for a field. The action is permitted for any value except those in the denied list. Denied values always override allowed values when both apply.
field_subsetRestricts an update action so the user can only modify the listed fields. Any attempt to change other fields will be denied.

Edit permissions dialog showing constraint options

Constrainable Fields

When attaching a constraint to a permission, you specify which field the constraint applies to. The available fields are:

FieldDescriptionTypical Usage
statusThe current status of a resource.Restrict which statuses a role can assign.
priceThe price or cost value on a resource.Limit which price points a role can set.
account_idThe owning account identifier.Control cross-account resource references.
report_typeThe type classification of a report.Restrict which report types a role can create or modify.
allow_syntheticWhether synthetic respondents are permitted.Prevent or require synthetic respondent usage.
survey_idThe associated survey identifier.Scope permissions to specific survey associations.
project_idThe associated project identifier.Scope permissions to specific project associations.
typeThe general type classifier on a resource.Restrict which subtypes a role can work with (for example, audience types).
nameThe display name of a resource.Limit rename access or restrict to specific naming patterns.
is_liveWhether a resource is currently live/active.Prevent a role from changing live status directly.
System Role: account_member

The account_member role is assigned by default to every user added to an account. It provides read access to all resources and the ability to perform standard research tasks. The table below shows every permission granted.

ResourceActions
All Resources (*)read
Projectcreate, update
Surveycreate, update, delete, api_read, api_run, mcp_read, mcp_run
Audiencecreate, update, delete, api_run, mcp_run
Reportcreate, update, delete
Report Questionupdate, delete
Report Topiccreate, update
Coding Dictionaryupdate
Coding Labelcreate, update, delete
Translationupdate
Insightcreate, update, delete
Todocreate, update, delete

Notable exclusions for account_member: no access to modify the account itself, no account asset management, no exposure source management, no go_live permission, no move permission, no export or cache management, and no project deletion.

System Role: account_admin

The account_admin role is assigned to the account creator and includes all member permissions plus elevated administrative access. The table below shows every permission granted.

ResourceActions
All Resources (*)read
Accountupdate, delete
Account Assetcreate, update, delete
Exposure Sourcecreate, update, delete
Projectcreate, update, delete, move
Surveycreate, update, delete, move, api_read, api_run, mcp_read, mcp_run
Audiencecreate, update, delete, go_live, api_run, mcp_run
Reportcreate, update, delete
Report Questionupdate, delete
Report Topiccreate, update
Coding Dictionaryupdate
Coding Labelcreate, update, delete
Translationupdate
Insightcreate, update, delete
Todocreate, update, delete

Key additions over account_member: account update and delete, account asset management, exposure source management, project deletion and move, survey move, and audience go_live.

Permission Resolution Rules

When a user holds multiple roles, permissions are resolved using these rules in order:

  1. Additive coarse permissions — If any role grants an action on a resource, the user has it.
  2. Additive field grants — Field-level update grants from different roles are merged together.
  3. Denied values override allowed values — If any role denies a value, it is denied regardless of other roles allowing it.
  4. Immutable fields win — Certain fields are protected at the platform level and cannot be changed by any role.