communications-mining
latest
false
Important :
Communications Mining is now part of UiPath IXP. Check the User Guide Introduction for more details.
UiPath logo, featuring letters U and I in white

Communications Mining User Guide

Last updated Mar 25, 2025

Role-based access control (RBAC)

The role-based access control (RBAC) in Communications Mining is integrated with the AuthZ authorization system RBAC service of Automation Cloud. This integration allows you to assign roles to Automation Cloud user groups in Communications Mining. For more details on Automation Cloud groups, check the About accounts and groups and Managing access pages.

The RBAC experience is available to all Communications Mining users in Automation Cloud. Initially, RBAC is available for any newly created tenants, followed by its availability for existing tenants once they have been migrated to the new experience.

Important: Until all existing tenants are migrated to the new RBAC experience, you will still have the manage access experience as presented in the Managing projects documentation.

Single sign-on (SSO) integration

If you integrate with Automation Cloud through SSO, you can manage permissions through Automation Cloud user groups. Next, you can apply these permissions in Communications Mining to ensure a seamless and consistent access control experience. For more details, check Understanding authentication models.

Migrating to the new RBAC experience

Beginning in the week of February 24, 2025, existing Communications Mining tenants will be migrated to the new role-based access control (RBAC) experience. RBAC is integrated with Automation Cloud through the AuthZ authorization system, and allows administrators to provision roles to Automation Cloud groups as well as users.

The goal of the new experience is for the Communications Mining access management to be properly integrated with Automation Cloud, and allow users to assign roles to Automation Cloud groups instead of just users.

Communications Mining does not yet support custom roles. Therefore, we have mapped the granular Communications Mining legacy permissions to a set of temporary legacy roles. These will be deprecated in the future, when custom roles are supported.

The legacy roles are an exact mapping of the old permissions that required migrating, to ensure that none of the underlying permissions of the users were changed in the migration. For a complete list of the roles, check Legacy roles.

Note: The Modify users, View users, and Upload file legacy permissions were deprecated in the meantime, as they are redundant in the new RBAC experience.

After the migration, your existing permissions are preserved; first through Automation Cloud roles. Then, we have used legacy roles to cover any gaps with additional permissions.

Note: Legacy roles are only required for the migration, and will be deprecated once AuthZ supports custom roles. Therefore, make sure you use non-legacy roles, except where absolutely necessary in the meantime. For a complete list of the roles, check Legacy roles.

Was this page helpful?

Get The Help You Need
Learning RPA - Automation Courses
UiPath Community Forum
Uipath Logo White
© 2005-2025 UiPath. All rights reserved.