OutSystems allows you to define the permissions of IT users using a role-based permission model. This model enables you to set up the permissions of your IT users for simple to complex security policy needs, as you can:
Set up the permissions of a small team using only the built-in default roles, Developer and Administrator.
Create additional roles to better control the different permission levels of a larger team.
Use teams to manage an enterprise-grade security policy, where you have many applications and users.
Grant or revoke permissions to users for specific applications without using teams.
Manage your IT Teams in the USER MANAGEMENT area of your LifeTime console (
To manage IT teams, you must be an infrastructure manager.
Articles in this Section
- Understand the Permission Model for IT Users
- Learn the OutSystems permissions model.
- Create and Assign Roles
- Grant your IT users permissions by assigning them roles.
- Create an IT User
- Create IT users for new developers and operators that will operate the platform.
- Create an IT Team
- Teams allow you to manage the permissions of a large number of IT users over the applications in your factory.
- Set Up the Permissions in a Team
- Using teams you can manage the permissions of several IT users working in the same business team over all the applications they own without having to grant permissions on each application individually.
- Grant Permissions for Specific Applications
- Learn how to grant users with permissions for specific applications.
- Control Who Creates Applications
- OutSystems permission model allows you to limit the creation of new applications in an environment to some users, such as IT architects.
- Allow Managers to Handle Permissions of IT Teams
- Keep the control of the users and teams that are created, but delegate the permission management to the team manager.
- Allow Integrations With External Databases
- Learn how to allow developers in the team to create integrations with external databases.
- Find Out the Permissions of IT Users
- Ensure a strict security policy by checking the permissions IT users have over an application.