Skip to content
  • There are no suggestions because the search field is empty.

Understanding Cognidox security concepts

Learn how to use Limited Access Groups and Private Workspaces in Cognidox

Cognidox’s default approach to security is open and collaborative, but some situations demand tighter controls. In this article, we explore how to manage access for external users, restrict visibility at the category level, and prevent accidental overexposure of sensitive data using Limited Access Groups and Private Workspaces.

 

Back to top

Why Openness Isn’t Always Ideal

While Cognidox encourages openness, certain users—such as contractors, clients, or suppliers—should not have unrestricted access to your internal content. To manage this, Cognidox provides structures that reverse the typical permissions model, limiting access until it's explicitly granted.

Back to top


Limited Access Groups: Controlling Visibility for External Users

A Limited Access Group is a special type of user group in Cognidox designed for third parties. Unlike regular users, members of these groups:

  • Have no access by default.

  • Must be granted explicit rights to access documents or categories.

This inverted model helps you maintain tighter control over what external users can see and do within the system.

Back to top


Private Workspaces: Restricting Categories

Private Workspaces offer category-level access restrictions. They’re ideal for internal use cases such as:

  • Confidential departmental content (e.g. HR, Finance)

  • Segregated access for different project teams or partners

A Private Workspace:

  • Starts from a top-level category.

  • Can include sub-categories restricted to specific users or groups.

  • Allows precise segmentation of visibility.

Back to top


Important Considerations for Workspaces

Private Workspaces are powerful—but misconfiguring them can cause issues:

  • If no users are assigned, the data becomes invisible to everyone, even in searches.

  • Always assign at least one manager with access to avoid being locked out.

  • Plan workspace structure before creating sub-categories to avoid unintentional exposure.

Back to top


Further information

Other knowledge base articles

Online help pages

There are plenty of help pages on this topic. Here are some examples:

Back to top