Security
Access Control
Role-based access control and permission management in Babelize.
Access Control
Babelize uses role-based access control (RBAC) to manage permissions across accounts and resources.
Account Types
Personal Accounts
Individual accounts with single-user access:
- Full control over own projects
- Billing management
Workspace Accounts
Team accounts with multi-user access:
- Centralized project management
- Role-based permissions
- Shared billing
Workspace Roles
| Role | Description |
|---|---|
| Owner | Full access, billing, can delete workspace |
| Admin | Project management, member invites |
| Editor | Create and manage translations |
| Viewer | Read-only access |
Role Permissions
| Permission | Owner | Admin | Editor | Viewer |
|---|---|---|---|---|
| View projects | ✓ | ✓ | ✓ | ✓ |
| Create projects | ✓ | ✓ | ✓ | ✗ |
| Delete projects | ✓ | ✓ | ✗ | ✗ |
| Run translations | ✓ | ✓ | ✓ | ✗ |
| Manage glossary | ✓ | ✓ | ✓ | ✗ |
| Invite members | ✓ | ✓ | ✗ | ✗ |
| Remove members | ✓ | ✓ | ✗ | ✗ |
| Manage billing | ✓ | ✗ | ✗ | ✗ |
| Delete workspace | ✓ | ✗ | ✗ | ✗ |
Project-Level Access
Project Visibility
| Setting | Who Can Access |
|---|---|
| Workspace | All workspace members |
| Private | Only invited members |
Project Roles
Projects can have specific member assignments:
Session Management
Session Properties
| Property | Value |
|---|---|
| Duration | 7 days |
| Renewal | On activity |
| Concurrent | Unlimited |
Viewing Active Sessions
- Go to Settings → Security
- View Active Sessions
- See device, location, last activity
Revoking Sessions
Revoke individual sessions or all sessions:
- Go to Settings → Security → Active Sessions
- Click Revoke on a session
- Or click Revoke All to sign out everywhere
Multi-Factor Authentication
MFA adds additional security:
Available Methods
| Method | Status |
|---|---|
| Email OTP | Default |
| Authenticator App | Coming soon |
Enabling MFA
- Go to Settings → Security → MFA
- Choose authentication method
- Complete setup flow
- Save recovery codes
Access Logs
All access is logged:
| Log Entry | Information |
|---|---|
| Timestamp | When access occurred |
| User | Who accessed |
| Action | What was done |
| Resource | What was accessed |
| IP Address | Where from |
| Result | Success or failure |
See Audit Logs for accessing logs.
Best Practices
Principle of Least Privilege
- Assign minimum necessary permissions
- Review access regularly
Regular Audits
- Review member list monthly
- Check for unused access
Offboarding
When team members leave:
- Remove from workspace
- Review shared resources