Running 20+ events a year sounds impressive… until you’re the person holding it all together.
You’ve got:
multiple regions launching events at the same time
agencies building pages
vendors handling production
speakers uploading assets
onsite staff checking people in
and leadership asking for clean reporting
In that kind of setup, the real risk isn’t “too many users.”
It’s uncontrolled access.
Because when permissions aren’t clear, the same things keep happening:
Wrong people edit the wrong pages: A vendor tweaks an event page. A regional marketer changes a registration field. Suddenly your reporting breaks or your brand drifts.
Data exposure becomes a real fear: Someone who only needs check-in access can suddenly see dashboards or attendee data they shouldn’t.
Last-minute lockouts and chaos: The day before the event, you realize the wrong people have access and the right people don’t. Now you’re firefighting instead of running the show.
That’s why this guide exists.
The promise is simple: clear roles + permission profiles = speed and safety. You stop slowing down the team, and you stop risking the program.
InEvent is built around this idea with permission levels and customized access, including the ability to assign access based on role (admin, staff, speakers, and more).
And if your events touch enterprise accounts, this can’t be an afterthought. Permission management is one of the first places enterprise teams feel whether your event program is “tight” or “held together.”
User and permission management is the system for controlling who can view, edit, and operate different parts of your event environment, so the right people can do their jobs without gaining access to everything.
In event terms: it’s how you decide who can touch what.
And it applies to the stuff you deal with every day, like:
Registration (forms, fields, approvals, ticket settings)
Email communications (invites, confirmations, reminders)
Agenda and sessions (updates, speaker assignments, content uploads)
Speakers, sponsors, exhibitors (who can edit their profile or assets)
Check-in and onsite operations (scanning, badge flows, access control)
Reports and dashboards (who sees performance data and exports)
The moment you have more than one team involved, access control stops being a “settings thing” and becomes a workflow thing.
InEvent supports permission levels for common event roles and also offers permission profiles for customized access (especially useful when external agencies or partners need to manage specific areas without full access).
RBAC sounds technical, but it’s straightforward.
Roles are job functions, like:
event ops lead
marketing manager
onsite staff
speaker
agency partner
Permissions are what that role is allowed to do:
view only
edit event website
edit registration settings
send emails
scan attendees at check-in
see dashboards and reports
export attendee data
The goal is not to lock people out. The goal is to give the minimum access needed so work moves fast without risk.
That “minimum access” idea is called least privilege, and it’s a core best practice in RBAC: assign only what a person needs to do their job, not everything you might need “just in case.”
And events are exactly the kind of fast-moving environment where least privilege matters most, because:
Teams change weekly (contractors, temps, agencies)
deadlines are tight
mistakes show up publicly (registration, email, onsite)
data is sensitive (attendees, VIP lists, internal events)
Permission management sounds like an “enterprise thing” until you’re in the middle of a build and someone says:
“Hey, can you just give them access real quick?”
That’s how permission chaos starts.
And the truth is: every event team needs access control once there’s more than one person touching the event. The only difference is how fast it becomes painful.
Here are the teams that feel it the most.
Field marketing teams run events like a production line:
dinners
breakfasts
roadshows
partner events
trade show side events
exec series
The pace is fast. The turnaround is short. The team changes often.
Common risk include:sales support jumping in last minute
venue staff supporting check-in
temporary onsite staff scanning badges
If permissions aren’t structured, you end up over-granting access just to keep things moving. Then you spend the next week cleaning up mistakes.
This is where role-based access control for events matters. You want people to do their job (check-in, scanning, updates) without being able to edit core settings or access data they shouldn’t. InEvent supports permission levels for common event roles and also offers permission profiles for customized access when you need tighter control.
Enterprise event teams don’t just run events. You run governance.
You have:
brand standards
legal review
IT requirements
security questionnaires
procurement approvals
And when enterprise stakeholders review your event software, one of the first questions is simple:
“Who has access, and how is it controlled?”
Because in enterprise, access control is not optional. It’s part of risk management.
InEvent’s documentation explains permission profiles and customized access, including the ability to create profiles at the company level (across events) or event level (for a single event), which is important when different teams touch different parts of the program. (faq.inevent.com)
Agencies and production partners need access to deliver. But they rarely need full access.
They typically need to:
build and update event pages
manage content uploads
adjust schedules and sessions
support production workflows
What they usually shouldn’t have by default:
exports of attendee data
full admin access across the account
control over security settings or integrations
The biggest risk here is client data exposure. Even if nobody does anything “wrong,” overly broad access creates uncomfortable conversations.
This is why permission profiles matter. InEvent describes customized access as useful when external partners need to manage specific areas without full access. (faq.inevent.com)
Internal comms teams deal with a different type of sensitivity:
internal town halls
leadership updates
training sessions
employee programs
These can include:
internal-only documents
strategic updates
employee lists
restricted sessions
And these events are often recurring, which means you need repeatable access patterns:
consistent roles for moderators and staff
predictable permissions for content uploaders
safe access boundaries for internal-only settings
If internal teams don’t have a permission system, they end up defaulting to “give everyone admin,” which makes every event riskier than it needs to be.
Here’s the thing: permission mistakes don’t just create security problems.
They create event problems:
broken registration
off-brand pages
missing emails
incorrect reporting
last-minute “who changed this?” chaos
And the cost shows up in rework, risk, credibility, and slower approvals.
This is the most common one, and it usually comes from good intentions: “We just need to move fast.”
But it backfires because admin access means anyone can:
change settings that impact your attendee experience
edit registration fields that break reporting
trigger changes they don’t understand
A better approach is role-based access with controlled permissions, which InEvent supports through permission levels and customized access profiles. (inevent.com)
Cost: rework, mistakes, and extra approvals when stakeholders lose trust in the setup.
This one feels harmless until something goes wrong.
When logins are shared:
you can’t tell who made changes
offboarding becomes impossible
accountability disappears
Cost: risk and credibility. If procurement asks who has access, “shared logins” is an instant red flag.
When you manage multiple events, access should be scoped.
The rule should be:
Access to one event does not automatically grant access to every event.
This is a key concept in multi-event governance, and it’s also a trust builder for enterprise teams. (We’ll go deeper on company vs event level access in the next section.) InEvent supports separating access at different levels through permission profiles. (faq.inevent.com)
Cost: accidental edits across the wrong event, sensitive internal events exposed, and constant clean-up.
Onsite staff should not be “admins by default.”
They typically need:
check-in access
scanning access
maybe session tracking
But not:
registration configuration
dashboards
exports
integrations
InEvent’s permission levels include operational roles like staff and data collector, which helps teams keep onsite access tight.
Cost: data exposure risk and last-minute operational confusion.
This is where programs quietly become unsafe.
If you don’t have a process for:
adding people with the right role
removing access when they leave
auditing who still has access
…your account slowly becomes a permissions mess.
Cost: slower approvals (because stakeholders don’t trust access control), higher risk, and more time spent fixing access issues during critical event weeks.If permission management feels confusing, it’s usually because people mix up two different questions:
Who should have access to the platform as a whole?
Who should have access to this specific event?
That’s the difference between company-level access and event-level access.
And once you understand it, everything gets easier: cleaner governance, fewer mistakes, smoother agency collaboration, and faster approvals.
InEvent explains this separation directly as “company and event levels,” and it’s one of the foundations for scaling access across multiple events.
Company-level access is the “platform layer.”
It’s for people who need to manage things that affect multiple events or the way your organization uses the platform.
Who should have company-level access:
platform owners (the people responsible for the system working)
core admins
governance leads (ops lead, event tech lead, maybe an IT/security partner)
anyone responsible for standards across the portfolio
Why it matters for multi-event programs:
If you’re running a program (not a one-off), you need a few people who can:
enforce standards
manage overall structure
create consistent permission profiles
keep controls clean across teams and events
Otherwise, every event becomes its own mini kingdom. And that’s how brand drift and permission sprawl happen.
Event-level access is for one event. This is where most day-to-day work happens:
building the event website
managing registration and comms
updating agenda and speakers
running check-in and onsite operations
pulling event-specific reports
Who should have event-level access:
event owners
event producers
regional marketers
ops leads assigned to that specific event
onsite staff (with limited operational permissions)
Event-level access is how you keep the right people moving fast without giving them broad platform control.
This is the enterprise reassurance everyone cares about:
Access to one event does not mean access to all events.
When you have:
multiple regions
external agencies
internal events (town halls)
client events (if you’re an agency)
overlapping timelines
…you cannot afford a setup where someone gets access to everything just because they helped on one event.
InEvent’s company vs event levels are designed to support this separation so you can scale safely.Now let’s get practical: if you’re managing user and permission management in InEvent, what does it look like in real life?
Think of it as three layers:
Permission profiles (custom roles you define)
Permission bundles (groups of permissions that speed setup)
Permission levels (common role types like admin, staff, speaker)
InEvent documents these concepts clearly across its help center and product pages, which makes it easier to build a permission model you can actually stick to.
Permission profiles are how you stop making one-off permission decisions for every new person.
Instead of thinking: “What should I turn on for Sarah?”
You think: “What does the Marketing Manager role need?”
InEvent’s documentation explains that you can create permission profiles at:
Company level (useful when you want a consistent structure across multiple events)
Event level (useful when you need a custom setup for one event)
That’s part of InEvent’s “Permissions Profile and Customized Access” capability. (faq.inevent.com)
Why teams use this: Because external partners can do the work you need without getting full access.
Example:
An agency can update website sections and agenda content.
A vendor can support onsite workflows.
A speaker manager can handle speaker uploads.
But none of them need to see everything else.
InEvent also has a product page positioning permission profiles as administrative and customized access, which reinforces the enterprise use case.
Once you have profiles, the next challenge is speed.
Nobody wants to build permissions one tiny toggle at a time.
That’s where permission bundles come in.
In plain terms: A permission bundle is a pre-grouped set of permissions for a specific area of work.
So instead of selecting 25 individual permissions, you assign the bundle that matches the work:
content management
registration management
onsite operations
reporting access
and other platform areas
Why this matters:
you set up access faster
you reduce mistakes
you avoid accidental over-permissioning
your permission model stays consistent
InEvent publishes a “List of permission bundles” to help teams understand how permissions are grouped.
Permission levels are the common role types you’ll use repeatedly in event operations.
InEvent documents standard permission levels like:
Admin
Staff
Speaker
Data Collector
Translator
User
These levels are referenced in InEvent’s own materials, including its developer documentation.
When to use each (high-level):
Admin: platform/event owners responsible for configuration and governance
Staff: internal team members who manage parts of the event (without needing total control)
Speaker: presenters who need access to their session experience, uploads, and speaker tasks
Data Collector: operational roles like check-in and scanning (highly relevant onsite)
Translator: roles supporting language workflows (where applicable)
User: basic access level when someone needs limited interaction, not control
The key reality check here is simple:
Check-in staff shouldn’t see dashboards. They need to scan. They need to check people in. They don’t need the keys to the building.
InEvent provides role-based permission levels to support this kind of separation.
Sometimes attendees aren’t all the same.
You may need different access experiences for:
VIP attendees
sponsors
exhibitors
special session access
internal-only groups within a larger event
InEvent documents “permission levels for attendees,” which is useful when you need to control what certain attendee groups can see or access inside the event experience.
This is the part most event teams wish they had earlier.
Because in real life, permissions don’t fail because you “don’t know security.”
They fail because you’re busy, you’re moving fast, and someone needs access now.
So instead of making one-off decisions every time (“Just give them admin”), use these simple role models. Think of them as your default permission profiles in your event management software.
In InEvent, permission profiles are designed exactly for this: creating customized access so people can manage specific areas without gaining full control. You can create profiles at the company level (across events) or event level (for one event).
What this role is responsible for:
owning the event program end-to-end
setting standards and governance
approving major changes
making sure reporting and workflows stay consistent
What they should have access to:
all core event configuration
registration and comms
website and content
onsite workflows (check-in, badge settings where relevant)
dashboards and reporting
permissions management (assigning roles, approving access)
What they should not do in practice (even if they can):
become the bottleneck for every small change
Give other roles the access to execute day-to-day, so you stay focused on governance.
This is where a “full admin” type permission level makes sense, paired with clear responsibility. InEvent documents permission levels like Admin and Staff, which helps teams map roles without reinventing the wheel.
What this role is responsible for:
landing pages, messaging, and conversion
registration experience and form fields (with standards)
email comms (invites, confirmations, reminders)
sponsor visibility and brand consistency (where applicable)
What they should have access to:
event website and content updates
registration forms and relevant settings
email templates and comms workflows
agenda content (in partnership with ops)
What they should NOT have by default:
finance settings
security settings
integrations and system-level configurations (unless they own them)
broad export permissions (unless needed for the job)
Why? Because marketing should move fast without accidentally breaking governance. Permission profiles in InEvent are meant to give the “right access” without giving total control.
What this role is responsible for:
onsite execution
check-in workflows
operational staffing
session scanning and attendance operations
troubleshooting real-time issues
What they should have access to:
check-in setup and scanning workflows
badge / credential workflows (where your program includes them)
session tracking tools
operational dashboards needed to run the room
What they usually should NOT have by default:
ability to redesign registration forms without coordination
full control over emails (to avoid accidental sends)
global account settings
This is why platforms define operational roles like Staff and Data Collector. InEvent documents permission levels including Data Collector, which aligns closely with scanning and operational data collection use cases.
This is where most teams over-permission.
Temp staff need to do one thing well:
check people in
scan tickets/badges
help attendees get where they need to go
What they should have access to:
check-in and scanning only
the minimum attendee information required to do their job
What they should not have:
dashboards and reporting
attendee exports
registration editing
website editing
messaging tools
admin settings
This is where “least privilege” protects you. InEvent’s use of permission levels like Data Collector helps support minimal operational access for onsite roles.
Speakers don’t need “event access.” They need speaker access.
What speakers typically need:
view their session time and details
upload slides or assets (if enabled)
confirm bios/headshots
receive speaker instructions
What they should not have:
registration settings
attendee data access
ability to edit the full agenda
sponsor areas
reporting
InEvent includes a Speaker permission level in its documented permission levels list, which supports this kind of role separation.
This role is optional depending on your event format, but when it applies, it’s important to keep it tight.
What sponsors/exhibitors might need:
update their company description/logo
upload approved assets
manage limited booth content (if applicable)
What they should not have:
attendee exports (unless your sponsorship package explicitly includes lead access and you’ve set that up safely)
event-wide configuration
comms settings
reporting dashboards beyond their scope
If you support sponsor/exhibitor updates, treat it like a “self-service lane,” not full access.
This is one of the highest-stakes permission setups, because agencies are essential, but over-access creates risk.
What agencies often need:
update website sections and content
manage agenda/session updates
upload production assets
support event build tasks
What they often don’t need by default:
attendee exports
integration settings
global account settings
access to unrelated events
access beyond the project window
Best-practice setup:
grant access to specific areas (not the whole account)
scope access to a specific event (not your entire program)
make access time-bound in your process (remove access when the engagement ends)
InEvent’s permission profiles and customized access are specifically described as useful for giving external partners access to manage certain areas without full access.
If you’re selling events internally (or getting approvals from IT and procurement), this section is your leverage.
Because permission management is one of the easiest ways to show enterprise buyers:
“We run a tight program.”
Not just “we can make a nice event page.”
InEvent’s documentation emphasizes structured permission profiles, created at company or event level, to support controlled access across teams.
Here’s how to frame enterprise governance without overcomplicating it.
A simple mindset shift changes everything:
Access expires.
Not because you don’t trust people. Because event teams move fast:
contractors rotate
agency projects end
staffing changes happen between events
So the best model is:
role-based access (permission profiles)
consistent onboarding (assign role, don’t custom-build permissions every time)
consistent offboarding (remove access when the work ends)
This prevents “user-by-user chaos,” where nobody knows why someone has access six months later.
In multi-event environments, separation is not a “nice-to-have.”
It is governance.
You need to reduce two risks:
data exposure (people seeing information they shouldn’t)
accidental edits (someone changes the wrong event or wrong settings)
That’s why company vs event separation matters, and why permission profiles should be scoped cleanly.
InEvent documents the concept of separating company and event levels, which supports stronger governance in portfolio environments. (faq.inevent.com)
Enterprise teams often expect SSO as part of governance, especially when:
multiple teams need access
agencies rotate on and off
compliance reviews require controlled authentication
We’ll cover SSO and authentication expectations later in the full draft (with the dedicated InEvent SSO link), but the key point is simple:
If IT is involved, they want identity and access to be clean, auditable, and easy to control.
Once you move from “we run events” to “we run an event program,” permissions stop being a one-time setup.
They become part of how you scale.
Because multi-event portfolios add complexity fast:
multiple regions building at the same time
agencies supporting some events but not others
internal events living alongside external events
different stakeholder groups with different risk levels
If you don’t standardize permission management, two things happen:
every event gets built differently
your account slowly becomes an access free-for-all
The fix is simple in theory: standard roles + scoped access + repeatable governance.
InEvent supports this approach through company vs event levels and permission profiles you can create at either level.
If you want speed without chaos, build a standard role set you can reuse across every event.
Think of it like your event program’s “default team structure,” such as:
Program Lead / Admin
Marketing Manager
Ops Lead
Onsite Staff / Data Collector
Speaker
Agency Partner (limited)
When these roles are consistent across the portfolio:
onboarding is faster (“assign the role, don’t rebuild permissions”)
event launches speed up because teams already know their lane
new team members ramp quicker
you reduce the “who can do what?” back-and-forth during event week
This is exactly why permission profiles matter. InEvent describes permission profiles as customized access that can be created at the company level (useful across multiple events) or at the event level (for a specific event).
Here’s what most global and regional programs struggle with:
You want local teams to move fast.
But you can’t let every region rewrite the system.
Without guardrails, you get:
brand drift
inconsistent registration fields
emails that don’t match tone and compliance
reporting that becomes impossible to compare
The portfolio-friendly model is:
company-level owners set standards and create approved permission profiles
event-level teams can update what’s local (agenda, speakers, city content, venue details)
external partners get scoped access to specific areas and specific events
This only works when company and event levels are clearly separated, which InEvent documents as part of its platform structure.
Permission management isn’t just about security. It’s about operations.
When roles and access are standardized:
fewer people can accidentally change registration fields mid-stream
fewer events “drift” into custom setups that break reporting
fewer last-minute lockouts
fewer “who changed this?” surprises
And you get something leadership loves:
accountability.
Because when access is role-based and structured:
you know who owns what
changes aren’t random
event setup becomes repeatable
your reporting becomes more reliable across the portfolio
This is the part most event teams wish they had earlier.
Because in real life, permissions don’t fail because you “don’t know security.”
They fail because you’re busy, you’re moving fast, and someone needs access right now.
So instead of making one-off decisions every time (“Just give them admin”), use these role models as your default permission profiles in your event management software.
In InEvent, permission profiles are built for exactly this: customized access so people can manage what they need without getting full control. You can create permission profiles at the company level (across events) or event level (for one event).
Full access + governance responsibility
What this role is responsible for
Owning the event program end-to-end
Setting standards and governance
Approving major changes
Keeping workflows and reporting consistent across events
What they should have access to
Core event configuration
Registration and comms
Website and content
Onsite workflows (check-in, operational setup)
Dashboards and reporting
Permission management (assigning roles, approving access)
What they should NOT do in practice (even if they can)
Become the bottleneck for every small change
Give other roles enough access to execute daily work, so you stay focused on governance.
InEvent documents standard permission levels (like Admin/Staff), which makes role mapping much easier.
Website + registration + comms access (no finance/security settings)
What this role is responsible for
Landing pages, messaging, and conversion
Registration experience and form fields (within standards)
Email comms (invites, confirmations, reminders)
Sponsor visibility and brand consistency (where applicable)
What they should have access to
Event website and content updates
Registration forms and relevant settings
Email templates and comms workflows
Agenda content (in partnership with ops)
What they should NOT have by default
Finance settings
Security settings
System-level configurations (unless they own it)
Broad export permissions (unless required)
Permission profiles exist to give “right access,” not total access.
Check-in + onsite workflows + scanning
What this role is responsible for
Onsite execution
Check-in workflows
Staffing and operational readiness
Session scanning / attendance workflows
Real-time troubleshooting
What they should have access to
Check-in setup and scanning workflows
Session tracking tools
Operational views needed to run the room
What they should NOT have by default
Ability to redesign registration fields without coordination
Full control over outbound emails (to avoid accidental sends)
Global account settings
InEvent’s documented permission levels include roles like Staff and Data Collector, which align to common ops workflows.
Minimal access needed to operate check-in and scanning
This is where most teams over-permission.
Temp staff need to do one thing well:
Check people in
Scan tickets/badges
Keep lines moving
What they should have access to
Check-in and scanning only
The minimum attendee info needed to do the job
What they should not have
Dashboards and reporting
Attendee exports
Registration editing
Website editing
Messaging tools
Admin settings
Least privilege protects you here, especially in fast-moving onsite environments.
(Permission Levels)
Upload content + view schedule + limited access
Speakers don’t need “event access.” They need speaker access.
What speakers typically need
View session time and details
Upload slides/assets (if enabled)
Confirm bio/headshot
Receive speaker instructions
What they should not have
Registration settings
Attendee data
Full agenda editing
Sponsor areas
Reporting dashboards
InEvent includes Speaker as a defined permission level in its documentation.
Limited assets and booth updates (if applicable)
This role depends on your event format, but when it applies, keep it tight.
What sponsors/exhibitors might need
Update company description/logo
Upload approved assets
Edit limited booth content (if applicable)
What they should not have
Attendee exports (unless explicitly included and configured safely)
Event-wide configuration
Comms settings
Portfolio dashboards
Treat sponsor/exhibitor access like a self-service lane, not full access.
Controlled access, scoped to the event, time-bound, no exports unless necessary
This is one of the highest-stakes setups, because agencies are essential, but over-access creates risk.
What agencies often need
Update website sections and content
Manage agenda/session updates
Upload production assets
Support build tasks
What they often don’t need by default
Attendee exports
Integration settings
Global account settings
Access to unrelated events
Access beyond the project window
Best-practice setup
Grant access to specific areas (not the entire account)
Scope access to a specific event (not your whole program)
Make access time-bound in your process (remove access when engagement ends)
This is exactly the type of “external partner access” use case InEvent calls out for permission profiles.
If you’re getting approvals from IT and procurement, this section is your leverage.
Because permission management is one of the easiest ways to prove:
“We run a tight program.”
Not just “we can make a nice event page.”
InEvent’s documentation supports structured permission profiles at the company or event level to control access across teams.
“Access expires” mindset
A simple rule that saves you later:
Access expires.
Not because you don’t trust people. Because event teams change fast:
Contractors rotate
Agency projects end
Staffing changes between events
So the best model is:
Role-based access (permission profiles)
Consistent onboarding (assign a role, don’t custom-build permissions every time)
Consistent offboarding (remove access when the work ends)
This prevents user-by-user chaos where nobody knows why someone still has access six months later.
Prevents data exposure + accidental edits
In multi-event environments, separation isn’t a “nice-to-have.” It’s governance.
You’re protecting against:
Data exposure (people seeing info they shouldn’t)
Accidental edits (someone changes the wrong event/settings)
That’s why separating company vs event levels matters. InEvent documents this structure clearly.
Enterprise teams often expect SSO as part of governance, especially when:
Multiple teams need access
Agencies rotate on/off
Compliance requires controlled authentication
We’ll cover SSO and authentication expectations later in the full draft (with the dedicated InEvent SSO link), but the key idea is simple:
If IT is involved, they want identity and access to be clean, auditable, and easy to control.
If you’re running more events with more people involved, you’ve probably felt it:
Too many users. Too much risk. Not enough control.
And the worst part is it usually shows up at the worst time: the final week before launch, when someone changes the wrong setting, the wrong partner sees something they shouldn’t, or check-in staff have the wrong access onsite.
You don’t need stricter people. You need a cleaner system.
InEvent’s permission profiles are built to help you assign customized access at the company or event level, so internal teams and external partners can work without getting full control.
We’ll map your real team structure (field marketing, ops, agencies, internal stakeholders) to permission profiles and show you what a clean governance setup looks like in practice.
User and permission management in event software is how you control who can view, edit, and operate different parts of your event platform, so people can do their work without getting access to everything. It’s what keeps your website, registration, attendee data, onsite workflows, and reports from turning into a free-for-all when multiple teams are involved. InEvent supports this through permission levels and customized permission profiles.
Permission profiles are reusable access setups you create for roles (like Marketing Manager, Ops Lead, Onsite Staff, Agency Partner). Instead of giving access user-by-user every time, you assign a profile that already has the right permissions. InEvent’s documentation explains permission profiles and customized access, and that you can create them at the company level (for multiple events) or the event level (for a specific event).
If you want the product framing: InEvent also positions this as administrative, customized access via permission profiles.
Company-level access controls what someone can do across the broader organization account (useful for governance and multi-event programs). Event-level access controls what someone can do inside one specific event (useful for event owners, producers, regional teams, and partners). The key benefit is separation: you can keep access scoped so the right people can work on the right events. InEvent documents the difference as “company and event levels.”
It depends on the job, but the best practice is least privilege: give staff only what they need to operate.
A simple starting point:
Onsite check-in/scanning staff: check-in and scanning only
Ops lead: onsite workflows, session scanning, operational views
Marketing: website, registration, comms (not security/system settings)
Event owner/program lead: full access + governance responsibility
InEvent documents standard permission levels (Admin, Staff, Speaker, Data Collector, Translator, User) which helps teams map access to real event roles.
Give agencies access based on the work they’re doing, not “just in case.”
Best practice:
scope them to the specific event(s) they’re supporting
give access to specific areas (pages/content/agenda) rather than everything
avoid exports unless it’s explicitly required and approved
remove access when the engagement ends
This is exactly the use case InEvent describes for permission profiles and customized access: external partners can manage specific areas without full access.