TERRITORY T-HUBTeam administrationCurrent roles and permissions

Team administration

Team administration

Team administration follows a familiar SharePoint logic: selected client and project context on the left, roles and access review on the right with clear numbering.

Control roles and access in a traceable way

The page connects client space, project context, and role bundle in one readable management flow. This makes it immediately clear which groups have access, which rights are inherited, and where exceptions are documented.

Next path

Client

Portfolio-wide permission context

Current and prioritized client access

Project

Current or prioritized project permissions

Without a project filter, portfolio-wide access patterns are shown

Role bundle

Internal lead

inherits the delivery leads standard plus the mandate context of the client area

Active permission context

Project-bound team administration

Client and project numbers remain visible inside access review so role bundles stay clearly assigned to one client space and project path.

Client space

Portfolio-wide client view

Project context

Current or prioritized projects

No project explicitly selected

Direct entry

Internal lead

inherits the delivery leads standard plus the mandate context of the client area

Client

Project context

Team and role model

Internal lead

New users or groups receive an inherited role package first in the wizard. Project-specific deviations are then documented as controlled additional rights.

Inheritance logic

inherits the delivery leads standard plus the mandate context of the client area

Audience

Delivery lead + project owner

Scope

Project steering, internal zones, and moderated client exchange

Active grants

4

Permission subject view

Role package

T-HUB Core Admins

Maintains role standards, search visibility, and the inheritance of new permission profiles across all client workspaces.

Group address

[email protected]

Responsible

Contact 17

Inheritance sources

2

Active grants

4

Inherited from

Global platform policy
Client mandate standard

Granted rights

Manage role packages
/internal/information
/internal/projects
Client exchange controllable

Blocked rights

/internal/restricted only with extra role
no direct client access without approval profile