Agent Guides
Access Control
Invitations
11 min
use the invitations feature to invite other users to become administrators or collaborators for a specific agent in pusaka (i e , become user agents) by specifying a user’s name, email, role, and permissions, you can assign access to manage, contribute, or monitor the ai agent’s behavior overview invite users add one or more invitees by entering their name and email, and assigning roles and permissions filter search and filter existing invitations by name, email, or status monitor invitations review status updates and access configurations after sending invites 1\ creating a new invitation click “new invitation” opens the invitation form for adding collaborators complete the form fields name (required) the full name of the person you're inviting email (required) their email address (used to send the invitation) roles (required) select a role such as contributor permissions (optional) choose access levels using permission codes if needed add additional recipients click add recipient to include more invitees in a batch invite click “invite” finalizes the invitation(s) and dispatches emails to recipients 2\ managing invitations invitations filter and search filter by name or email use the search bar to quickly locate a specific invitation status filter identify invites by their current status (e g , pending , active ) invitations table columns column description name the invitee's full name email the email address the invitation was sent to status shows if the invite is pending or active invitation date when the invitation was created roles designated role for the invitee (e g , owner, contributor) permissions permission code(s) applied to limit or allow access 3\ editing or removing invitations edit role/permissions if the invitation is still pending, you may update roles or access settings revoke access delete a pending invitation to prevent access resend invite re invite a user who has not yet accepted the invitation (if supported by your system) best practices ✅ use specific role labels choose descriptive roles like owner , contributor , or reviewer to clarify responsibilities 🔒 apply permission codes thoughtfully restrict sensitive data access to users with a business need 📋 track status regularly monitor outstanding invitations and follow up with invitees 🔄 review periodically ensure roles and permissions stay aligned with users’ responsibilities next steps after sending invitations head to user agents to see accepted users and their active roles audit your permissions list to validate access scopes begin collaborating with your newly added team to train, configure, and analyze agent behavior