Database roles provide the middle layer of Baserow’s permission hierarchy, offering more control than workspace-wide roles while being easier to manage than table-by-table assignments.
This guide covers how to assign roles at the database level to create department-specific access, protect sensitive databases, and override workspace-wide defaults for targeted permission control.
Paid feature: Role-based permissions are available on Baserow Advanced and Enterprise plans. View pricing details.
Database-level roles let you create permission boundaries around specific databases, giving members and teams different access to individual projects, departments, or client workspaces without changing their workspace-wide permissions.
When you assign a role at the database level, it applies to all tables within that database and overrides any workspace-wide role assignments. This creates natural permission boundaries; perfect for departmental databases (HR, Finance, Sales), client-specific projects, or sensitive data that requires restricted access.
Prerequisites: Members must first be invited to the workspace before you can assign database-level roles. You cannot invite members directly to a database.
Database-level roles override workspace-level roles but are overridden by table-level roles.
Learn more about role hierarchy.
The database members list shows only explicit assignments, not inherited access. Always check both workspace and database role assignments when troubleshooting access
A workspace Admin can access all databases, but won’t appear in individual database member lists unless you explicitly assign a database-level role. The database member list shows only exceptions to workspace defaults.
This matters because you might think a database has no members, but workspace-wide roles still grant access. To truly restrict a database, assign “No Access” to workspace members at the database level.
To grant database access to members or teams:
Navigate to the database you want to manage
Click the three-dot menu (⋮) next to the database name in the sidebar or home page
Select Manage members from the dropdown
In the Manage Members modal, click Select Members

Search and select members and/or teams using individual checkboxes, or the Select all button for bulk selection. The modal shows the total members selected
Choose the role from the dropdown
Click Invite members/teams
The role applies immediately to all tables in the database.
Assign roles to teams rather than individual members when multiple people need the same database access; it’s easier to manage as team membership changes.
The Manage Members modal displays all members and teams with explicit database-level role assignments.
This list only shows explicit database assignments. Members with workspace-level access may still access this database, but it won’t appear here unless they have a database-specific role assignment.
To see all effective access:

Changes apply immediately to all tables in the database.
To revoke database-level access:
The workspace member loses database-level override and falls back to their assigned workspace-level role (if any). If the workspace-wide role is also restrictive, the member loses all database access
Removing database-level access cannot be undone directly; you must re-assign the role.
This strategy involves creating a separate, dedicated database for each department to establish clear data boundaries and manage access at a high level.
This approach is best for organizations that need to strictly separate sensitive information (like financial records or employee data) from more public, company-wide data.
You can configure this model in two common ways:
This strategy is ideal for agencies, freelancers, or service providers who need to grant external clients read-only access to their specific project data. It ensures perfect isolation, as each client can only access the database they have been explicitly invited.
This approach is best for securely sharing project progress, deliverables, or reports with external stakeholders without letting them see other clients’ information or internal company data.
Implementation:
This setup creates secure, isolated silos where clients can view their own project data, and your internal team retains full editorial control across all projects.
This strategy involves duplicating your main database to create a distinct “staging” or “development” environment. This allows your team to test new integrations, experiment with field types, or build new application features without any risk of breaking your live, customer-facing “production” data.
This approach is best for development teams, citizen developers, or admins who need a safe sandbox to build and test workflows before deploying them to the main database.
Implementation:
This strategy mirrors a typical company’s organizational chart, providing hierarchical access. A “Leadership” or “Admin” team is given a “bird’s-eye view” with access to all data, while individual teams (like Marketing or Sales) are granted full access only to their specific departmental databases.
This approach is best for organizations that need to centralize high-level oversight for an executive team while keeping daily operations and data management siloed within their respective departments.
Implementation:
This is because they may have workspace-level access that isn’t overridden at the database level. Check their workspace roles. To restrict, assign “No Access” at the database level.
This is because they may have table-level role assignments that override database removal. Check individual table permissions and remove table-level access.
Database Admins can only manage database access, not workspace membership. Only workspace Admins can invite members to the workspace. Have a workspace Admin invite a member first, then a database Admin can assign database access.
Yes. When you create a new table in a database, all database-level roles automatically apply to that table unless you set table-specific overrides.
No. Members must first be invited to the workspace before you can assign database-level roles. Workspace membership is required.
They’re effectively the same; both prevent database access. “No Access” explicitly blocks access, while removing the assignment removes the override (falling back to workspace role).
Yes. A database Admin can assign “No Access” to workspace Admins at the database level, effectively creating a private database even if workspace Admins can’t access it (unless they override at the table level).
Set “No Access” at the database level for all workspace members except the specific team that should have access. This overrides workspace-level permissions.
No. Explicit database-level roles always override workspace roles. Changing workspace role only affects databases where no database-level override exists.
Assign roles at other levels:
Understand the system:
Manage access:
Still need help? If you’re looking for something else, please feel free to make recommendations or ask us questions; we’re ready to assist you.
Contact support for questions about Baserow or help with your account