Table-level roles override both workspace and database assignments. This makes them ideal for compliance requirements, protecting confidential data, and creating exceptions for individual tables that need tighter security than their parent database.
This guide covers how to assign roles at the table level for granular access control, protect sensitive tables like payroll or personal data, and override database and workspace permissions for maximum security.
Paid feature: Role-based permissions are available on Baserow Advanced and Enterprise plans. View pricing details.
Table-level roles provide granular permission control in Baserow, letting you restrict access to specific sensitive tables, like salary data, client contracts, or personal information; even when members have broader access to the database or workspace.
Use table-level permissions when workspace and database roles are too broad for your security needs.
Prerequisites: Members must first be invited to the workspace before you can assign table-level roles. You cannot invite members directly to a table.
Use workspace-level roles when:
Use database-level roles when:
Use table-level roles when:
Learn more about role hierarchy.
Table-level roles have high priority in Baserow’s permission hierarchy. Table-level “No Access” role can block even workspace Admins from accessing table data. This is to protect ultra-sensitive data.
Example: A workspace Admin can access everything by default. Salary Table has “No Access” for the workspace admin at the table level. The workspace admin cannot access the Salary Table despite being a workspace Admin.
The table members list shows only explicit table-level assignments, not inherited access. Always check the workspace and database roles when troubleshooting table access.
This means a workspace Editor can edit all tables, but won’t appear in individual table member lists unless you assign a table-specific role. The table member list shows only exceptions to database/workspace defaults. This matters because you might think a table has limited access, but workspace/database roles still grant access.
To truly restrict, assign “No Access” at the table level to override inherited permissions and lock down sensitive tables from members who have Editor or Admin access at the workspace/database level.
To assign roles at the table level,
Navigate to the table you want to manage
Click the three-dot menu (⋮) next to the table name in the sidebar
Select Manage members from the dropdown

In the Manage Members modal, click Select Members
Search and select members and/or teams using individual checkboxes, Select all button for bulk selection. The modal shows the total members selected
Choose the role from the dropdown:
Click Invite members/teams (button shows total selected)
The role applies immediately to this specific table only.
The Manage Members modal displays all members and teams with explicit table-level role assignments.
This list shows only explicit table assignments. Members with workspace or database-level access may still access this table, but it won’t appear here unless they have a table-specific role.
To see all effective table access:
The combination determines final access.

Changes apply immediately to this table only.
To revoke table-level access:
The workspace member loses the table-level override and falls back to the database-level role (if any). If no database role, they fall back to the workspace role. If no roles at any level, they lose all table access.
Removing table-level access cannot be undone directly; you must re-assign the role.
Most tables are accessible, but some tables are locked down. If a database contains salary information, workspace members with access can manage most data, but certain data have special restrictions.
Implementation:
A customer database containing personally identifiable information needs strict PII protection to meet GDPR/HIPAA requirements while maintaining operational access.
Implementation:
Confidential information receives ultimate protection; even workspace admins can’t access these tables.
Implementation:
A financial audit requires a compliance-ready audit trail that can only be modified by auditors.
Implementation:
Configure the database with production secrets to protect API keys and credentials. Developers can work freely, but can’t access or expose production secrets.
Implementation:
This is because they have workspace or database-level access that isn’t overridden at the table level. Check workspace and database roles. To restrict, assign “No Access” at the table level.
This is because a workspace member may have a more specific role at the same table level (individual overrides team). Check if the member has an individual table-level role that overrides the team “No Access” assignment.
Table Admins can only manage table access, not workspace or database membership. Only workspace Admins can invite members to the workspace. Have a workspace Admin invite a member first, then the table Admin can assign table access.
This is because the table has explicit “No Access” for that admin at the table level. Table-level “No Access” overrides the workspace Admin role. This is intentional for ultra-sensitive data. If access is needed, have another table Admin modify the table-level permissions.
This is because they have inherited access from workspace or database roles. Removing table-level roles means they fall back to database/workspace roles. To block access, assign “No Access” at the table level instead of removing the assignment.
Yes. Assigning “No Access” at the table level blocks even workspace Admins. This is a powerful way to protect ultra-sensitive data.
No. Members must first be invited to the workspace before you can assign table-level roles. Workspace membership is always required.
No. Explicit table-level roles always override database and workspace roles. Changing the database role only affects tables where no table-level override exists.
Check three places:
Use audit logs for tracking permission changes.
Assign roles at other levels:
Understand the system:
Manage access:
Compliance and security:
Still need help? If you’re looking for something else, please feel free to make recommendations or ask us questions; we’re ready to assist you.