Effective workspace management requires clear control over who can access information and what actions they are permitted to perform. Projek uses a structured role-based permission system to ensure secure collaboration while maintaining operational efficiency.
Workspace owners and managers can invite members, assign roles, and manage access levels according to organizational needs. This helps maintain accountability, prevent unauthorized changes, and protect sensitive project and financial data.
By properly managing workspace members and permissions, teams can collaborate smoothly while preserving structured authority and system security.
Step 1: Access the Members Section
Go to Workspace Settings.
Select Members.
Click “Invite Members.”
Step 2: Send Invitations
Enter the email address of the user you want to invite.
Assign a default role (Owner, Manager, Member, or Client).
Click “Send Invitation.”
The invited user will receive an email containing a secure, time-limited invitation link.
Projek uses defined roles to control access:
Owner
Full administrative control
Manage billing and subscription
Invite/remove members
Configure workspace settings
Transfer ownership
Manager
Create and manage projects
Assign tasks and bugs
Oversee team activities
Approve expenses and timesheets (if applicable)
Member
Work on assigned projects and tasks
Log time and submit expenses
Collaborate through comments and files
Client
Limited access
View project progress and deliverables
No administrative privileges
Roles ensure structured collaboration while maintaining data security.
Workspace administrators can:
Change Roles: Update permissions as responsibilities change.
Remove Members: Revoke access while retaining historical records.
Suspend Access: Temporarily restrict access without full removal.
Transfer Ownership: Assign ownership to another qualified member.
All changes are applied immediately to maintain accurate access control.
Assign the minimum role necessary for each user.
Regularly review member access.
Remove inactive users promptly.
Limit owner-level access to trusted administrators.