Scope overrides allow you to modify inherited permissions at specific points in your scope hierarchy. This enables fine-grained control without restructuring your entire role and permission model.
Example: Editors Can’t Delete in Archived Projects
Copy
# Editor role has delete permission at org levelcurl -X POST 'https://api.example.com/role-permissions' \ -d '{"roleId": "role_editor", "permissionId": "perm_delete"}'# But not in archived projectscurl -X POST 'https://api.example.com/scope-overrides/role-permissions' \ -d '{ "childScopeId": "scope_archived_projects", "roleId": "role_editor", "permissionId": "perm_delete", "state": "disabled" }'
Example: Agents Can Read But Not Write in Sensitive Areas
Copy
# Agent role has both read and writecurl -X POST 'https://api.example.com/role-permissions' \ -d '{"roleId": "role_agent_writer", "permissionId": "perm_read"}'curl -X POST 'https://api.example.com/role-permissions' \ -d '{"roleId": "role_agent_writer", "permissionId": "perm_write"}'# Disable write for this role in customer data scopecurl -X POST 'https://api.example.com/scope-overrides/role-permissions' \ -d '{ "childScopeId": "scope_customer_data", "roleId": "role_agent_writer", "permissionId": "perm_write", "state": "disabled" }'
# Role overridescurl -X GET 'https://api.example.com/scope-overrides/roles/scope_production'# Permission overridescurl -X GET 'https://api.example.com/scope-overrides/permissions/scope_production'# Role-permission overridescurl -X GET 'https://api.example.com/scope-overrides/role-permissions/scope_production'
# Delete by IDcurl -X DELETE 'https://api.example.com/scope-overrides/roles/override_123'# Delete by scope and rolecurl -X DELETE 'https://api.example.com/scope-overrides/roles/scope_production/role_admin'# Delete role-permission override by all IDscurl -X DELETE 'https://api.example.com/scope-overrides/role-permissions/scope_production/role_editor/perm_delete'