A Glossary of User Permissions and Access Control in Keap Explained

In the fast-paced world of HR and recruiting, managing sensitive data and ensuring operational efficiency are paramount. Keap, a powerful CRM and marketing automation platform, offers robust features for user permissions and access control. This glossary is designed to demystify these critical terms, providing HR and recruiting professionals with a clear understanding of how to safeguard information, streamline workflows, and maintain compliance within their Keap environment.

User Role

A User Role in Keap defines a predefined set of permissions and access levels assigned to a user within the system. Instead of configuring individual permissions for each user, roles allow administrators to group common access requirements for different positions or functions (e.g., Recruiter, HR Manager, Marketing Specialist). For HR and recruiting professionals, understanding user roles is crucial for quickly onboarding new team members with the correct access to candidate data, recruiting pipelines, and confidential employee information, while ensuring that each user can only perform actions relevant to their responsibilities. This standardized approach simplifies administration and enhances data security.

Access Level

Access Level refers to the breadth and depth of a user’s ability to view, modify, or interact with specific modules, records, or functionalities within Keap. While a User Role might define the general scope (e.g., “Recruiter”), the Access Level dictates the specifics, such as whether a recruiter can only view candidate records in their assigned pipeline, or if they can also edit contact information, create new tasks, or export data. Properly configuring access levels is vital for segregating duties, protecting sensitive personal identifiable information (PII), and preventing unauthorized data manipulation, which is a cornerstone of compliance in recruiting operations.

Permissions

Permissions are the granular authorizations granted to users or roles, dictating specific actions they can perform on particular data types or system features. These are the “keys” that unlock individual functionalities, such as “edit contact,” “delete invoice,” “send email broadcast,” or “view all tasks.” In an HR context, granular permissions are essential for compliance (e.g., GDPR, CCPA). For instance, an HR assistant might have permission to add new candidate contacts but not to view salary information, while a hiring manager might view all applicant details for their department but not modify system-wide email templates. This level of control ensures data integrity and operational security.

Admin User

An Admin User in Keap possesses the highest level of access and control over the entire system. This role can typically manage all settings, users, data, integrations, and financial aspects of the Keap account. For HR and recruiting firms, assigning Admin User status should be done with extreme caution, usually reserved for IT managers, operations leads, or senior leadership. An admin can create and modify user roles, adjust security settings, manage all contacts and campaigns, and oversee critical automation workflows. Their actions have system-wide implications, making their accountability and adherence to security protocols paramount for data protection and operational continuity.

Standard User

A Standard User is typically assigned a limited set of permissions necessary to perform their day-to-day operational tasks within Keap, without having access to critical administrative functions or sensitive global settings. For most recruiters, HR specialists, or sales representatives, a standard user profile is appropriate. They can manage their assigned contacts, update lead statuses, send emails, and run reports based on their specific responsibilities. This role adheres to the principle of least privilege, minimizing the risk of accidental errors or unauthorized data access, while still empowering teams to execute their core functions efficiently within the Keap environment.

Role-Based Access Control (RBAC)

Role-Based Access Control (RBAC) is a security mechanism that restricts system access to authorized users based on their role within an organization. Rather than assigning permissions individually, access is granted based on the user’s defined role (e.g., “Recruiting Coordinator,” “Talent Acquisition Manager”). This framework simplifies permission management, especially in larger HR and recruiting departments, by ensuring that individuals automatically receive the appropriate access rights upon being assigned a role. RBAC enhances security by ensuring consistency and reducing the chances of human error in permission allocation, streamlining onboarding and offboarding processes for Keap users.

Least Privilege Principle

The Least Privilege Principle is a fundamental security concept dictating that users should only be granted the minimum necessary access rights to perform their job functions, and no more. In the context of Keap for HR and recruiting, this means providing a recruiter with access only to the candidate data, pipelines, and communication tools they explicitly need, rather than granting blanket access to all system features or confidential employee records. Adhering to this principle significantly reduces the attack surface for potential security breaches, limits the impact of accidental data misuse, and strengthens compliance with data protection regulations, by minimizing exposure to sensitive information.

Data Segmentation

Data Segmentation, in terms of user permissions, refers to the ability to restrict a user’s access to specific subsets or categories of data within Keap. For HR and recruiting, this is critical for confidentiality and compliance. For example, a recruiter specializing in IT roles might only be able to view and manage candidates within the “IT Department” tag or pipeline, while an HR generalist might access employee records for their specific division only. This ensures that sensitive information, such as candidate salary expectations or employee performance reviews, is only visible to authorized personnel, preventing unauthorized disclosures and supporting a structured, secure approach to data management.

Confidentiality

Confidentiality, in the realm of user permissions, refers to the crucial practice of ensuring that sensitive information, such as candidate resumes, personal identifiable information (PII), or employee performance data stored in Keap, is accessible only to authorized individuals. Strong access controls and granular permissions are the technical backbone of maintaining confidentiality. By implementing the principle of least privilege and robust role-based access, HR and recruiting professionals can prevent unauthorized viewing, sharing, or alteration of critical data, thereby protecting candidate and employee privacy, safeguarding proprietary hiring strategies, and upholding ethical data handling practices across the organization.

Audit Trail

An Audit Trail is a chronological record of all activities and changes made within the Keap system, including who performed the action, what was changed, and when. For HR and recruiting, an audit trail is invaluable for security, compliance, and accountability. It logs events such as user logins, contact record modifications, email sends, campaign changes, and permission alterations. If there’s ever a question about data integrity, unauthorized access, or compliance with regulations like GDPR, the audit trail provides indisputable evidence. This feature allows administrators to monitor user behavior, identify suspicious activities, and reconstruct events, offering crucial insights for investigation and system security.

User Provisioning

User Provisioning is the process of setting up and configuring new user accounts within Keap, granting them the appropriate roles, permissions, and access levels as dictated by their job function. This includes creating their login credentials, assigning them to relevant teams or departments, and ensuring they have access to the necessary data and tools from day one. In HR and recruiting, efficient user provisioning is vital for quickly integrating new hires into the Keap ecosystem, ensuring they can immediately begin contributing to recruiting efforts. Automated provisioning, often through integrations, helps maintain consistency and reduces manual errors in setting up access rights.

User Deprovisioning

User Deprovisioning is the critical process of revoking or removing a user’s access to the Keap system when they leave the organization or change roles. This involves deactivating their account, unassigning their licenses, and ensuring that all their access rights to sensitive data, campaigns, or automation tools are immediately terminated. For HR and recruiting professionals, swift and thorough deprovisioning is paramount for data security, preventing former employees or unauthorized individuals from accessing confidential candidate pipelines, proprietary recruitment strategies, or employee PII. Neglecting deprovisioning can lead to significant security vulnerabilities and compliance breaches, making it a key part of an offboarding checklist.

API Access Permissions

API Access Permissions in Keap control what external applications or custom integrations can do with your Keap data via its Application Programming Interface (API). For HR and recruiting teams leveraging automation platforms like Make.com, understanding these permissions is crucial. They dictate whether an integration can only read contact information, create new records, update existing fields, or perform more sensitive actions like bulk data exports. Properly configured API permissions are vital for maintaining security while connecting Keap with ATS systems, HRIS, or other recruiting tools, ensuring that automated workflows operate within defined data access boundaries and do not inadvertently compromise sensitive information.

Reporting Permissions

Reporting Permissions within Keap govern which users or roles have the authority to access, view, create, or export various performance and activity reports. For HR and recruiting professionals, this is essential for managing sensitive metrics related to candidate sourcing, hiring funnel efficiency, recruiter performance, and financial data. For example, a junior recruiter might only see reports for their own assigned leads, while a recruiting director would have access to aggregated team performance and overall pipeline health reports. Granular reporting permissions prevent unauthorized individuals from viewing confidential company performance data or accessing personal recruitment metrics without proper authorization.

Campaign Permissions

Campaign Permissions in Keap determine who can create, edit, activate, pause, or delete marketing and recruiting campaigns. For HR and recruiting teams, campaigns are used for talent nurturing, onboarding sequences, or internal communications. Controlling these permissions is vital to prevent accidental campaign launches, ensure brand consistency in outreach, and protect sensitive communication strategies. For instance, only a designated marketing or senior recruiting professional might have the authority to launch a new email sequence for a critical hiring initiative, while others can only contribute content or view performance metrics, ensuring controlled and strategic communication efforts.

If you would like to read more, we recommend this article: Critical Keap Data Recovery for HR & Recruiting Business Continuity

By Published On: December 14, 2025

Ready to Start Automating?

Let’s talk about what’s slowing you down—and how to fix it together.

Share This Story, Choose Your Platform!