# Invite and manage participants

Manage workspace membership by inviting users, assigning roles, and controlling access to ensure effective team collaboration and data security.

## Participant invitation[​](#participant-invitation "Direct link to Participant invitation")

### Individual invitations[​](#individual-invitations "Direct link to Individual invitations")

Workspace administrators can invite participants and assign workspace admin roles:

* **Selective invitations** - invite specific users based on project or team needs
* **Role assignment** - designate workspace admin privileges during invitation
* **Permission control** - set appropriate access levels for new participants

### Mass invitations[​](#mass-invitations "Direct link to Mass invitations")

Speed up the invitation process for multiple workspaces:

* **Bulk operations** - invite participants to multiple workspaces simultaneously
* **Efficiency** - reduce administrative overhead for large-scale deployments
* **Consistency** - ensure uniform access across related workspaces

## Participant management[​](#participant-management "Direct link to Participant management")

### Administrative actions[​](#administrative-actions "Direct link to Administrative actions")

In the workspace participants list, you can perform these management actions:

#### Workspace admin management[​](#workspace-admin-management "Direct link to Workspace admin management")

* **Promote to admin** - mark participants as workspace administrators
* **Remove admin role** - revoke workspace admin privileges while maintaining participant access
* **Role changes** - adjust administrative responsibilities as team needs change

#### Access control[​](#access-control "Direct link to Access control")

* **Block participants** - restrict access to workspace data and applications
* **Data preservation** - maintain records and comments created by blocked users for historical integrity
* **Selective blocking** - block users without removing them when they have created or edited content

### Blocking considerations[​](#blocking-considerations "Direct link to Blocking considerations")

#### When blocking is appropriate[​](#when-blocking-is-appropriate "Direct link to When blocking is appropriate")

* **Security concerns** - address potential data breaches or unauthorized access
* **Policy violations** - respond to workspace or organizational policy violations
* **Temporary restrictions** - provide cooling-off periods for conflict resolution

#### Data integrity preservation[​](#data-integrity-preservation "Direct link to Data integrity preservation")

* **Historical records** - maintain complete audit trails and data history
* **Comment preservation** - retain all user contributions for reference
* **Work continuity** - ensure ongoing work is not disrupted by access changes

## Best practices[​](#best-practices "Direct link to Best practices")

### Invitation strategy[​](#invitation-strategy "Direct link to Invitation strategy")

* **Clear criteria** - establish guidelines for who should be invited to the workspace
* **Role planning** - plan administrative roles before making assignments
* **Documentation** - maintain records of invitation decisions and role assignments

### Access management[​](#access-management "Direct link to Access management")

* **Regular review** - periodically assess participant access and roles
* **Gradual escalation** - start with minimal permissions and increase as needed
* **Clear communication** - inform participants about access changes and their implications

### Security considerations[​](#security-considerations "Direct link to Security considerations")

* **Principle of least privilege** - grant only necessary access to participants
* **Monitoring** - track participant activity and access patterns
* **Incident response** - have procedures for addressing security concerns

Effective participant management ensures your workspace has the right people with appropriate access levels to achieve your team's goals while maintaining security and data integrity.
