Skip to content

Permissions

GPT Workbench uses a role-based access control system organized at two levels: organizations and teams. Permissions govern who can create, view, edit, and delete resources across the platform.

Team Selector with Roles

Role Hierarchy

Organization Roles

Organizations are the top-level grouping. Every user belongs to one organization.

RoleDescription
OwnerFull organizational control, including billing and account deletion
AdminUser and settings management, integration configuration
MemberStandard access to enabled features and tools

Team Roles

Teams exist within organizations. Each team has its own role assignments.

RoleDescription
OwnerTeam creator with full control, including team deletion
AdminMember and settings management within the team
MemberAccess to team resources with limited configuration ability

A user's organization role and team role operate independently. An organization Admin who is a team Member still has limited permissions within that specific team. Conversely, a team Admin does not gain organization-level privileges.

Organization Permissions

Owner Permissions

The organization Owner has unrestricted access to every feature.

PermissionDetails
Billing managementView invoices, change subscription plan, update payment methods
Organization deletionPermanently delete the organization and all data
Ownership transferTransfer the Owner role to another user
User managementInvite, remove, promote, or demote any user
Settings managementConfigure all organization-level settings
Integration managementConnect and disconnect OAuth integrations (HubSpot, Microsoft 365, Google Workspace)
Tool configurationEnable or disable tools globally, set daily usage limits, manage API keys
System prompt libraryCreate, edit, and delete organization-scoped system prompts
Usage analyticsFull access to cost reports, token usage, and activity logs
All Admin permissionsEverything listed under Admin below

Admin Permissions

PermissionDetails
User managementInvite new users, remove existing users, change roles (except Owner)
Organization settingsModify organization name, preferences, and display settings
Integration configurationConnect and manage OAuth providers (HubSpot, MS365, Google)
Tool limitsSet daily tool usage limits and enable or disable tools
System promptsCreate and manage organization-scoped system prompts
Usage analyticsView cost reports, token consumption, and activity summaries
Context sharingShare context blocks at the organization scope
Template managementCreate, edit, and delete organization-scoped templates

Member Permissions

PermissionDetails
Thread creationCreate threads in any team they belong to
Tool usageUse tools enabled by organization and team admins
Team membershipJoin teams via invitation or invite link
Context blocksCreate personal context blocks, link shared blocks to threads
SharingShare context blocks with teams they belong to
TemplatesUse organization and team templates, create personal templates
Profile managementUpdate own name, email, password, and preferences

Team Permissions

Team Owner Permissions

PermissionDetails
Team deletionPermanently delete the team, including all threads, messages, and context
Ownership transferTransfer the Owner role to another team member
All Admin permissionsEverything listed under Team Admin below

Team Admin Permissions

PermissionDetails
Member managementInvite new members (email or invite link), remove members, change roles
Team settingsUpdate team name and all configuration options
System promptSet and edit the team default system prompt
Preferred modelSet the default AI model for new team threads
Auto-contextAdd, remove, and reorder auto-context blocks for the team
Tool configurationEnable or disable tools at the team level
Thread managementAccess, edit, move, and delete any team thread
Invite linksCreate, view, and delete team invite links
Archived contentView and restore archived threads and messages

Team Member Permissions

PermissionDetails
Thread accessView all threads in the team
Thread creationCreate new threads within the team
Own thread managementEdit and manage threads they created
Context usageAttach team context blocks and shared blocks to threads
Auto-context viewingSee auto-context blocks (displayed as read-only with blue styling and shield icon)
Tool usageUse tools enabled at the team level
SharingShare context blocks with the team

Resource Access Matrix

Threads

ResourceOwner/CreatorTeam AdminTeam MemberOther Team MembersNon-Team Members
Personal team threadFull control------No access
Shared team thread (own)Full controlFull controlFull controlView and useNo access
Shared team thread (other's)--Full controlView and useView and useNo access
Public thread link--------Read-only

Context Blocks

ResourceBlock OwnerTeam AdminTeam MemberOrganization Member
Personal blockFull controlNo accessNo accessNo access
Team-shared blockFull controlView and linkView and linkNo access
Org-shared blockFull controlView and linkView and linkView and link
Auto-context blockFull controlConfigureView only (read-only, blue styling)No access

Documents

Documents inherit access from the context blocks they are attached to.

Context ScopeWho Can Access
Personal contextOnly the context block owner
Team contextAll members of the team
Organization contextAll members of the organization

Templates

Template ScopeWho Can UseWho Can EditWho Can Delete
PersonalCreator onlyCreator onlyCreator only
TeamAll team membersCreator and team adminsCreator and team admins
OrganizationAll org membersCreator and org adminsCreator and org admins

System Prompts

Prompt ScopeWho Can UseWho Can Edit
PersonalCreator onlyCreator only
TeamAll team membersTeam admins and Owner
OrganizationAll org membersOrg admins and Owner

Tool Permissions

Organization-Level Controls

Organization Admins configure the global tool availability:

  • Enable/disable tools: Control which native tools and MCP servers are available across the organization
  • Daily limits: Set maximum daily usage for specific tools (e.g., 100 web searches per day per user)
  • API key management: Configure provider API keys that power tool integrations

Tools that are disabled at the organization level cannot be enabled at the team or thread level.

Team-Level Controls

Team Admins can further configure tools for their team:

  • Enable or disable tools from the set allowed by the organization
  • Configure team-level tool defaults that apply to all new team threads
  • Team tool selections are additive: they combine with thread-level selections

Thread-Level Override

Individual users can enable additional tools on a per-thread basis:

  • Only tools that are enabled at both the organization and team level are available
  • Users cannot exceed daily limits set by organization admins
  • Thread-level tool selections persist across sessions

Permission Flow

Organization (Admin enables tools globally)
    |
    v
Team (Admin selects subset for team threads)
    |
    v
Thread (User enables from available tools)

A tool must be enabled at every level in the chain to be usable in a thread.

API Access

Personal Access Tokens

Users can generate personal access tokens for programmatic access to the GPT Workbench API.

API Token Creation

Creating a token:

  1. Navigate to your profile settings
  2. Open the API Tokens section
  3. Click Create Token
  4. Enter a descriptive name for the token
  5. Select the permission scopes the token should have
  6. Click Create
  7. Copy the token immediately -- it is shown only once

Token characteristics:

  • Tokens authenticate as the creating user and inherit that user's permissions
  • Tokens respect all organization and team role restrictions
  • Tokens are subject to the same rate limits as interactive usage
  • Tokens can be revoked at any time from the profile settings page

Available scopes:

  • Read access to threads and context blocks
  • Write access to threads and context blocks
  • Tool execution
  • Team management (for admins)

Organization API

Organization Admins can configure API-level integrations:

  • Webhooks: Receive notifications when events occur (thread created, message sent, etc.)
  • Custom integrations: Connect external systems to GPT Workbench
  • Programmatic tool management: Manage tool configurations via API

Integration Permissions

OAuth Connections

OAuth integrations (HubSpot, Microsoft 365, Google Workspace) are managed at the user level with organization oversight.

ActionWho Can Perform
Connect an OAuth providerAny user (connects to their own account)
Disconnect own connectionThe user who connected
View connected accountsOrganization admins (all connections), users (own connections)
Configure integration settingsOrganization admins
Use integration toolsAny user with an active connection and tool access

Important: OAuth tokens are user-specific. When a user connects HubSpot, for example, the connection uses their HubSpot credentials. Other team members need their own connections to use HubSpot tools.

Integration Data Visibility

Data TypeWho Can See
HubSpot CRM data (deals, contacts)Users with active HubSpot OAuth connection
Microsoft 365 files and emailsUsers with active MS365 OAuth connection
Google Workspace documentsUsers with active Google OAuth connection
Integration connection statusOrganization admins (all users), individual users (own connections)

Data Visibility

Usage Analytics

MetricOrganization OwnerOrganization AdminTeam AdminTeam Member
Organization-wide costsFull accessFull accessNo accessNo access
Organization token usageFull accessFull accessNo accessNo access
Team costsFull accessFull accessTeam onlyNo access
Team statistics cardFull accessFull accessTeam onlyTeam only
Personal usageOwn dataOwn dataOwn dataOwn data
Per-run cost breakdownAll runsAll runsTeam runsOwn runs

Cost Reports

Cost visibility depends on organization settings:

  • USD mode: Costs displayed in dollars (available to admins and users if enabled)
  • Credits mode: Costs displayed in credit units (abstracted from raw dollar amounts)
  • Hidden mode: Costs not displayed to standard members

The cost display mode is configured at the organization level by admins.

Audit and Compliance

Activity Logging

Organization Admins have access to activity logs that track:

Event TypeDetails Logged
AuthenticationLogin timestamps, IP addresses, session duration
Resource accessThread views, context block access, document downloads
Tool usageTool invocations, parameters used, execution results
Sharing actionsShares created, modified, or revoked
Team managementMembers invited, removed, or role-changed
Configuration changesSettings modified, tools enabled/disabled

Data Retention

Data retention is configurable based on your subscription plan:

Data TypeRetention Policy
Active threadsRetained indefinitely while subscription is active
Archived threadsRetained based on plan tier (30+ days for paid plans)
MessagesRetained with their parent thread
Context blocksRetained until explicitly deleted
DocumentsRetained until the parent context block is deleted
Activity logsConfigurable retention period (default: 90 days)
API tokensActive until revoked or user is removed

Compliance Controls

ControlDescription
Data exportOrganization Owners can export all organization data
Data deletionIndividual users can request deletion of their personal data
Access reviewAdmins can audit current permissions and sharing relationships
Session managementUsers can view and revoke active sessions

Permission Inheritance

Permissions follow an inheritance model:

  1. Organization level sets the ceiling for what is possible
  2. Team level narrows permissions within the organization boundary
  3. Thread level allows individual customization within team boundaries

A user never has more permissions at a lower level than what is granted at the level above.

Example: If the organization disables the HubSpot tool, no team admin can enable it, and no user can add it to a thread. If the organization enables it but a team admin disables it for their team, members of that team cannot use it in team threads (but could use it in personal threads if their personal team has it enabled).

Best Practices

  1. Apply the principle of least privilege -- Assign the minimum role needed for each user's responsibilities
  2. Audit permissions regularly -- Review team memberships and roles quarterly to ensure they reflect current organizational structure
  3. Use teams to segment access -- Create teams that map to projects or departments rather than granting broad organization-level access
  4. Rotate API tokens -- Replace personal access tokens periodically, especially for automated integrations
  5. Document access policies -- Maintain clear guidelines about who should have which roles and why
  6. Monitor shared content -- Use the Shared Context Manager to review what is shared at each scope
  7. Leverage auto-context for compliance -- Use team auto-context to ensure compliance requirements are always included in relevant conversations
  8. Review public links -- Periodically audit public thread links to ensure sensitive conversations are not exposed
  • Teams - Team creation, management, and settings
  • Sharing - Sharing mechanisms for threads, context, and templates
  • Admin Features - Organization administration capabilities
  • Models & Tools - Tool configuration and availability

GPT Workbench Documentation