Access Control

Restrict which models, blocks, and platform features each group of users can access

Access Control lets workspace admins define permission groups that restrict what each set of workspace members can do — which AI model providers they can use, which workflow blocks they can place, and which platform features are visible to them. Permission groups are scoped to a single workspace: a user can be in different groups (or no group) in different workspaces. Restrictions are enforced both in the workflow executor and in Mothership, based on the workflow's workspace.


How it works

Access control is built around permission groups. Each group belongs to a specific workspace and has a name, an optional description, and a configuration that defines what its members can and cannot do. A user can belong to at most one permission group per workspace, but can belong to different groups in different workspaces.

When a user runs a workflow or uses Mothership, Sim reads their group's configuration and applies it:

  • In the executor: If a workflow uses a disallowed block type or model provider, execution halts immediately with an error. This applies to both manual runs and scheduled or API-triggered deployments.
  • In Mothership: Disallowed blocks are filtered out of the block list so they cannot be added to a workflow. Disallowed tool types (MCP, custom tools, skills) are skipped if Mothership attempts to use them.

Setup

1. Open Access Control settings

Go to Settings → Enterprise → Access Control in the workspace you want to manage. Each workspace has its own set of permission groups.

Access Control settings showing a list of permission groups: Contractors, Sales, Engineering, and Marketing, each with Details and Delete actions

2. Create a permission group

Click + Create and enter a name (required) and optional description. You can also enable Auto-add new members — when active, any new member who joins this workspace is automatically added to this group. Only one group per workspace can have this setting enabled at a time.

3. Configure permissions

Click Details on a group, then open Configure Permissions. There are three tabs.

Model Providers

Controls which AI model providers members of this group can use.

Model Providers tab showing a grid of AI providers including Ollama, vLLM, OpenAI, Anthropic, Google, Azure OpenAI, and others with checkboxes to allow or restrict access The list shows all providers available in Sim.

  • All checked (default): All providers are allowed.
  • Subset checked: Only the selected providers are allowed. Any workflow block or agent using a provider not on the list will fail at execution time.

Blocks

Controls which workflow blocks members can place and execute.

Blocks tab showing Core Blocks (Agent, API, Condition, Function, Knowledge, etc.) and Tools (integrations like 1Password, A2A, Ahrefs, Airtable, and more) with checkboxes to allow or restrict each Blocks are split into two sections: Core Blocks (Agent, API, Condition, Function, etc.) and Tools (all integration blocks).

  • All checked (default): All blocks are allowed.
  • Subset checked: Only the selected blocks are allowed. Workflows that already contain a disallowed block will fail when run — they are not automatically modified.

The start_trigger block (the entry point of every workflow) is always allowed and cannot be restricted.

Platform

Controls visibility of platform features and modules.

Platform tab showing feature toggles grouped by category: Sidebar (Knowledge Base, Tables, Templates), Workflow Panel (Copilot), Settings Tabs, Tools, Deploy Tabs, Features, Logs, and Collaboration Each checkbox maps to a specific feature; checking it hides or disables that feature for group members.

Sidebar

FeatureEffect when checked
Knowledge BaseHides the Knowledge Base section from the sidebar
TablesHides the Tables section from the sidebar
TemplatesHides the Templates section from the sidebar

Workflow Panel

FeatureEffect when checked
CopilotHides the Copilot panel inside the workflow editor

Settings Tabs

FeatureEffect when checked
IntegrationsHides the Integrations tab in Settings
SecretsHides the Secrets tab in Settings
API KeysHides the Sim Keys tab in Settings
FilesHides the Files tab in Settings

Tools

FeatureEffect when checked
MCP ToolsDisables the use of MCP tools in workflows and agents
Custom ToolsDisables the use of custom tools in workflows and agents
SkillsDisables the use of Sim Skills in workflows and agents

Deploy Tabs

FeatureEffect when checked
APIHides the API deployment tab
MCPHides the MCP deployment tab
A2AHides the A2A deployment tab
ChatHides the Chat deployment tab
TemplateHides the Template deployment tab

Features

FeatureEffect when checked
Sim MailerHides the Sim Mailer (Inbox) feature
Public APIDisables public API access for deployed workflows

Logs

FeatureEffect when checked
Trace SpansHides trace span details in execution logs

Collaboration

FeatureEffect when checked
InvitationsDisables the ability to invite new members to the workspace

4. Add members

Open the group's Details view and add members by searching for users by name or email. Only users who already have workspace-level access can be added. A user can only belong to one group per workspace — adding a user to a new group within the same workspace removes them from their current group for that workspace.


Enforcement

Workflow execution

Restrictions are enforced at the point of execution, not at save time. If a group's configuration changes after a workflow is built:

  • Block restrictions: Any workflow run that reaches a disallowed block halts immediately with an error. The workflow is not modified — only execution is blocked.
  • Model provider restrictions: Any block or agent that uses a disallowed provider halts immediately with an error.
  • Tool restrictions (MCP, custom tools, skills): Agents that use a disallowed tool type halt immediately with an error.

This applies regardless of how the workflow is triggered — manually, via API, via schedule, or via webhook.

Mothership

When a user opens Mothership, their permission group is read before any block or tool suggestions are made:

  • Blocks not in the allowed list are filtered out of the block picker entirely — they do not appear as options.
  • If Mothership generates a workflow step that would use a disallowed tool (MCP, custom, or skills), that step is skipped and the reason is noted.

User membership rules

  • A user can belong to at most one permission group per workspace, but may be in different groups across different workspaces.
  • Moving a user to a new group within a workspace automatically removes them from their previous group in that workspace.
  • Users not assigned to any group in a workspace have no restrictions applied in that workspace (all blocks, providers, and features are available to them there).
  • If Auto-add new members is enabled on a group, new members of that workspace are automatically placed in the group. Only one group per workspace can have this setting active.

Common Questions

Any workspace admin on an Enterprise-entitled workspace can create, edit, and delete permission groups for that workspace. The workspace's billed account must be on the Enterprise plan.
The workflow is not modified — it still exists and can be edited. However, any run that reaches a disallowed block will halt immediately with an error. The block must be removed or the user's group configuration must be updated before the workflow can run successfully.
A user can belong to at most one permission group per workspace, but can belong to different groups in different workspaces. Adding a user to a new group within the same workspace automatically removes them from their previous group in that workspace.
Users with no group in a given workspace have no restrictions in that workspace. All blocks, model providers, and platform features are fully available to them there. Restrictions only apply in the specific workspaces where they are assigned to a group.
Yes. Mothership reads the user's permission group for the active workspace before suggesting blocks or tools. Disallowed blocks are filtered out of the block picker, and disallowed tool types are skipped during workflow generation.
Access Control operates at the feature and block level within a workspace. To restrict who can access the workspace itself, use workspace invitations and permissions. To apply different restrictions to different workflows, put them in different workspaces with distinct permission groups.
When a group has Auto-add new members enabled, any new member who joins the workspace is automatically added to that group. Only one group per workspace can have this setting enabled at a time.

Self-hosted setup

Self-hosted deployments use environment variables instead of the billing/plan check.

Environment variables

ACCESS_CONTROL_ENABLED=true
NEXT_PUBLIC_ACCESS_CONTROL_ENABLED=true

You can also set a server-level block allowlist using the ALLOWED_INTEGRATIONS environment variable. This is applied as an additional constraint on top of any permission group configuration — a block must be allowed by both the environment allowlist and the user's group to be usable.

# Only these block types are available across the entire instance
ALLOWED_INTEGRATIONS=slack,gmail,agent,function,condition

Once enabled, permission groups are managed through Settings → Enterprise → Access Control the same way as Sim Cloud.

On this page