Configuration Scope: Exportable
This setting is included in configuration exports and will be the same across all environments once the config file is imported.
Version Requirement
This feature is available in Brief Connect v2.3.0 and later.
Controlling Record Creation Permissions
Overview
By default, all Brief Connect users who are members of the "All Users" Azure Entra ID group can create records of any type. However, you may want to restrict record creation to specific users or control which record types different users can create.
The Can Create Record permission provides granular control over:
- Who can create records (all users, specific users, specific Azure Entra ID groups)
- Which record types they can create (all types or specific types)
This ensures record creation is limited to authorised users and aligns with organisational security and governance requirements.
How Record Creation Permissions Work
Record creation permissions are controlled through two components:
- Permission Sets - Define the
canCreateRecordpermission - Role Assignments - Specify who gets the permission and which record types it applies to
Permission Hierarchy
The system evaluates record creation permissions as follows:
- Is the user a System Administrator? → Can create all record types
- Does the user have a Permission Set with
canCreateRecordenabled via a Role Assignment? → Can create the specified record types - Otherwise → Cannot create any records
Best Practice: Use Azure Entra ID Groups
Instead of assigning permissions to individual users, create Azure Entra ID security groups (e.g., "BC - Cabinet Submissions - Authors") and assign permissions to those groups. This makes permission management much easier as you can control access by simply adding or removing users from the group.
Configuration Steps
Step 1: Create a Permission Set with Record Creation Enabled
- Navigate to the Admin Panel (/#/adminPanel)
- Go to the Permission Sets tab
- Click Add Permission Set
- Give your permission set a meaningful name (e.g., "Author - Can Create")
- Enable the Can Create Record checkbox
- Enable any additional permissions users should have when creating records (e.g., "View Record", "Edit Record Metadata")
- Click Save

Additional Permissions Required
The canCreateRecord permission only controls whether users can initiate the record creation wizard. You'll typically also want to enable permissions like "View Record" and "Edit Record Metadata" so users can complete the record creation process and work with their records. You can do this in the same Permission Set, or stack multiple Permission Sets together to grant the access required.
Step 2: Create a Role Assignment to Grant the Permission
- In the Admin Panel, go to the Role Assignments tab
- Click Add Assignment
- Configure the assignment:
Content Type Scope
- All - Users can create records of any type
- Specific Record Type (e.g., "Cabinet Submission") - Users can only create records of this type
Unique Identifier and Description
- Unique Identifier: A meaningful name (e.g., "Cabinet-Submissions-Authors-Can-Create")
- Description: Explain the purpose (e.g., "Allows Cabinet Policy team to create Cabinet Submission records")
Permission Set
- Select the Permission Set you created in Step 1 with
canCreateRecordenabled
Who Gets the Permission
Choose one or more targeting options:
- Public Access: All Brief Connect users can create these records
- User ID: Specific users by Graph User ID or UPN
- AAD Group Name: Azure Entra ID security groups (recommended)
- Record Role Names: ⚠️ Not applicable for record creation (roles only exist on existing records)
Record Roles Don't Apply
The Record Role Names field is not used for record creation permissions since roles only exist on records that have already been created. Leave this field empty when configuring record creation permissions.
Additional Filtering (Optional)
For record creation permissions, the following fields are ignored and can be left empty:
- Organisation: Not applicable for record creation
- Stage: Not applicable for record creation
- Field conditions: Not applicable for record creation
These fields only apply to permissions on existing records.
- Click Save
Common Scenarios
Scenario 1: Allow All Users to Create Any Record Type (Default Behavior)
To maintain the default Brief Connect behavior where all users can create any record type:
- Create a Permission Set with
canCreateRecordenabled - Create a Role Assignment:
- Content Type Scope: All
- Permission Set: Your permission set with
canCreateRecord - Public Access: Enabled
- User ID: (empty)
- AAD Group Name: (empty)
Scenario 2: Restrict Record Creation to Specific Azure Entra ID Groups
To allow only specific groups to create any record type:
- Create a Permission Set with
canCreateRecordenabled - Create a Role Assignment:
- Content Type Scope: All
- Permission Set: Your permission set with
canCreateRecord - Public Access: Disabled
- AAD Group Name:
BC - Record Authors(or your group name)
Scenario 3: Different Groups Can Create Different Record Types
To allow different teams to create different record types:
For Cabinet Submissions:
- Create a Permission Set with
canCreateRecordenabled (e.g., "Author - Cabinet") - Create a Role Assignment:
- Content Type Scope: Cabinet Submission
- Permission Set: Author - Cabinet
- AAD Group Name:
BC - Cabinet Policy Team
For Ministerial Correspondence:
- Create a Permission Set with
canCreateRecordenabled (e.g., "Author - Correspondence") - Create a Role Assignment:
- Content Type Scope: Ministerial Correspondence
- Permission Set: Author - Correspondence
- AAD Group Name:
BC - Correspondence Team
Scenario 4: Specific Users Can Create Specific Record Types
To allow named individuals to create specific record types:
- Create a Permission Set with
canCreateRecordenabled - Create a Role Assignment:
- Content Type Scope: Cabinet Submission
- Permission Set: Your permission set with
canCreateRecord - User ID:
john.smith@agency.gov.au, jane.doe@agency.gov.au
User Experience
When a User Has Permission
- The Create Record button appears on the dashboard
- When clicked, they see only the record types they have permission to create
- They can complete the record creation wizard
When a User Lacks Permission
- The Create Record button is hidden on the dashboard
- If they try to access the create record URL directly, they receive an "Access Denied" error
Troubleshooting
Users Can't Create Records
Check the following:
- Are they members of the "All Users" Azure Entra ID group?
-
Without this, they can't access Brief Connect at all
-
Do they have a Permission Set with
canCreateRecordenabled? - Navigate to Admin Panel → Permission Sets
-
Verify a permission set exists with this permission enabled
-
Do they have a Role Assignment granting them that Permission Set?
- Navigate to Admin Panel → Role Assignments
-
Verify a role assignment exists that:
- Uses the permission set with
canCreateRecord - Targets the user (via Public Access, User ID, or AAD Group Name)
- Has the correct Content Type Scope for the record type they want to create
- Uses the permission set with
-
Are they in the correct Azure Entra ID group?
- If using AAD Group Name targeting, verify the user is a member of that security group
-
Check Entra ID to confirm group membership
-
Has the permissions cache been refreshed?
- Permissions are cached for performance
- Users may need to sign out and sign back in for changes to take effect
- System Administrators can check the user's effective permissions using the Admin Panel
Users Can Create Too Many Record Types
If users can create record types they shouldn't be able to:
- Check for overly broad Role Assignments
-
Look for assignments with Content Type Scope = "All" that are too broadly targeted
-
Are they System Administrators?
- System Administrators automatically have permission to create all record types
- Check Admin Panel → Administrator Access or the
AdminEntraIdenvironment variable
Changes Not Taking Effect
- Users may need to sign out and sign back in for permission changes to take effect
- The permissions cache is refreshed when users authenticate
- For immediate testing, open an incognito/private browser window
Related Documentation
Configuration Guides
- Permission Sets - Creating and managing permission sets
- Role Assignments - Assigning permissions to users
- Understanding User Permission Levels - Overview of permission levels
Advanced Topics
- Filtering by Field Values in Role Assignments - Conditional permissions (not applicable to record creation)
- Background Permissions Management - How permissions are processed
- Administrator Access Rights - System Administrator configuration