Signal has five predefined roles that determine what users can do within the system. Each role is designed for specific staff responsibilities and provides appropriate access to safeguarding information and features based on a hierarchical permission structure.
Roles cannot be customized. This ensures consistent, secure access control across all Signal schools and simplifies compliance auditing.
Complete system controlFull access to all features including tenant management, user administration, and the ability to assign the Owner role to others.
DSL
Designated Safeguarding LeadAccess to all safeguarding features including students and incidents. Same permissions as Deputy DSL in current implementation.
Deputy DSL
Deputy Designated Safeguarding LeadCan manage incidents, students, and perform safeguarding tasks including deletions and document management.
Admin
System AdministratorAccess to configuration, user management, categories, policies, and transfers, but limited safeguarding data management capabilities.
Viewer
Standard accessCan view and create incidents, view students, manage alerts, and complete assigned actions.
Critical: Limit Owner accounts to 1-2 trusted senior staff members. This role can remove other users, change all settings, and delete any data. For most administrative tasks, the Admin role provides sufficient access.
In the current implementation, DSL has the same permissions as Deputy DSL. Both roles have full access to safeguarding features but cannot manage tenant members or update tenant settings.
Deputy DSL has identical permissions to DSL in the current implementation. This role provides comprehensive safeguarding capabilities without access to system configuration or user management.
All capabilities listed under the DSL role apply equally to Deputy DSL. These roles are treated identically in the permission system, though they may differ in organizational hierarchy.
Cannot delete incidents (requires Deputy DSL or higher)
Cannot delete action records (requires Deputy DSL or higher)
Cannot manage incident exclusion settings (requires Deputy DSL or higher)
Tenant Control
Cannot update tenant details (requires Owner)
Cannot remove members from the tenant (requires Owner)
Cannot assign the Owner role to users (requires Owner)
Advanced Safeguarding
Cannot generate AI action recommendations (requires Deputy DSL or higher)
Limited access to specialized safeguarding document management
The Admin role is focused on configuration and user management rather than day-to-day safeguarding work. For staff who need both administrative and safeguarding capabilities, consider assigning both Admin and DSL/Deputy DSL roles.
Cannot delete incidents (requires Deputy DSL or higher)
Cannot delete students (requires Admin or Owner)
Cannot delete actions (requires Deputy DSL or higher)
Cannot delete documents from incidents or students
Advanced Actions
Cannot create new actions (requires Deputy DSL or higher)
Cannot update action details (requires Deputy DSL or higher)
Cannot generate AI action recommendations (requires Deputy DSL or higher)
Can only complete actions, not manage them
Configuration
Cannot manage categories, policies, or system settings (requires Admin or higher)
Cannot manage transfers (requires Admin or higher)
Cannot manage users or tenant settings (requires Admin or higher)
Student Management
Cannot create new students (requires Admin or higher)
Cannot update student details (requires Admin or higher)
Cannot assign student groups (requires Admin or higher)
The Viewer role can create and edit incidents, which is different from traditional “read-only” access. This role is designed for staff who need to record safeguarding concerns but should not manage system configuration or delete records.
Signal uses a hierarchical authorization model where policies grant access based on role privilege levels:
1
Owner Policy
Only Owner role can access Owner-restricted endpoints (tenant updates, member removal).
2
DSL Policy
Both Owner and DSL roles can access DSL-restricted endpoints. Currently, no endpoints use DSL-only restrictions.
3
Deputy DSL Policy
Owner, DSL, and Deputy DSL roles can access Deputy DSL-restricted endpoints (incident/action deletions, document management).
4
Admin Policy
Owner, DSL, Deputy DSL, and Admin roles can access Admin-restricted endpoints (user management, categories, policies, transfers).
5
Viewer Policy
All roles (Owner, DSL, Deputy DSL, Admin, and Viewer) can access Viewer-restricted endpoints (viewing/creating incidents, managing alerts).
This means that higher-privilege roles automatically inherit all permissions from lower-privilege roles. An Owner can do everything an Admin can do, plus Owner-specific tasks.
In addition to the five active roles, Signal has a special Member role:
Member (System Role)
Purpose: Default placeholder role for new tenant members who haven’t been assigned an active role yet.Behavior: Users with only the Member role cannot log in to Signal. They appear in the tenant member list but cannot access any features.Usage: When a user is added to a tenant, they initially receive the Member role. An Admin or Owner must then assign them one of the five active roles (Owner, DSL, Deputy DSL, Admin, or Viewer) before they can use the system.
The Member role is not selectable in the UI and does not appear in role dropdowns. It exists solely as a system placeholder to ensure new users don’t accidentally have access before proper role assignment.
What will they do in Signal? Record concerns (Viewer), manage safeguarding cases (DSL/Deputy DSL), configure the system (Admin), or control the tenant (Owner)?
2
Apply the principle of least privilege
Give users the minimum access they need to do their job effectively. Most staff should be Viewers.
3
Consider role combinations
Users can have multiple roles. A business manager might have both Admin (for configuration) and Viewer (for incident access) roles.
4
Limit high-privilege roles
Owner should be 1-2 people maximum. DSL/Deputy DSL should be limited to your actual safeguarding leads. Admin should be limited to senior staff who manage the system.
5
Review regularly
Audit role assignments termly. When staff change responsibilities, update their roles accordingly.
Admin (2-3): Business Manager, IT Manager, Data Manager
Viewer (50-100): Heads of Year, Form Tutors, Teaching staff, Support staff, Attendance team
Rationale: Larger schools need more Deputy DSLs to handle case volume. Most staff remain Viewers to record concerns for their students.
Typical setup for a MAT central team:
Owner (1): Trust Safeguarding Lead
DSL (1): Trust DSL
Deputy DSL (0-1): Deputy Trust DSL (if needed)
Admin (2-3): Trust IT Director, Trust Data Manager, Trust Business Manager
Viewer (5-10): Trust CEO, Education Directors, Compliance team
Individual schools: Each school has their own Owner (1), DSL (1), Deputy DSL (2-6), Admin (1-3), and Viewer (15-100) as per single-school examples above.Rationale: Central team has oversight, but operational safeguarding is managed at school level with appropriate role assignments.
Only users with the Admin role or higher can change user roles (Owner, DSL, Deputy DSL, or Admin).
Only Owners can assign or remove the Owner role. Admins can assign all other roles (DSL, Deputy DSL, Admin, Viewer) but cannot create new Owners.
1
Navigate to Users
Go to Settings → Users in Signal.
2
Find the user
Search for the user by name or email in the tenant members list.
3
Edit the user
Click on the user to open their details, then click Edit Roles.
4
Select new role(s)
Choose the role(s) from the available options. Users can have multiple roles.
5
Save changes
Click Save. The user’s roles will be updated immediately.
Role changes take effect immediately. If a user is currently logged in, they may need to refresh their browser or log in again to see updated permissions.
Only 1-2 people should have Owner access. This role can remove other users and change all tenant settings. For most tasks, Admin is sufficient.
Assign DSL/Deputy DSL to safeguarding leads only
These roles can delete incidents and manage sensitive safeguarding data. Only assign them to staff with formal safeguarding lead responsibilities.
Use Admin for configuration staff
Business managers, IT staff, and data managers who configure the system but don’t manage safeguarding cases should have the Admin role.
Most staff should be Viewers
The Viewer role is appropriate for teachers, TAs, pastoral staff, and anyone who needs to record safeguarding concerns but not manage system configuration.
Consider multiple roles when needed
A user can have multiple roles. For example, a business manager who also records incidents might have both Admin and Viewer roles.
Review roles termly
At least once per term, audit who has which roles. Remove high-privilege roles from staff who no longer need them.
Document role decisions
Keep a record of why specific users have specific roles. This demonstrates appropriate access controls during inspections.
Check: Does the user have only the Member role?Solution: Assign them one of the five active roles (Owner, DSL, Deputy DSL, Admin, or Viewer). Users with only Member cannot log in.
A Viewer needs to delete an incident
Issue: Viewers cannot delete incidents. Only Deputy DSL and higher can delete.Solutions:
Have a DSL or Deputy DSL delete the incident for them (recommended for one-time needs)
If they regularly need to delete incidents, assign them the Deputy DSL role
An Admin needs to delete incidents
Issue: Admins can configure the system but cannot delete safeguarding records.Solution: Assign them the Deputy DSL role in addition to Admin. They’ll retain Admin configuration access and gain safeguarding deletion permissions.
We need more granular permissions
Example: “We want a role between Viewer and Deputy DSL that can create actions but not delete incidents”Explanation: Signal’s five roles cannot be customized. The permission structure is hierarchical and fixed to ensure consistent access control.Workaround: Choose the role that best matches the user’s primary responsibility. Consider using multiple roles if they need a combination of permissions from different levels.
A user needs to add students but not manage transfers
Issue: Student creation and transfer management are both Admin-level permissions.Solution: Assign the Admin role. While they’ll have access to transfers, their actual usage can be monitored through audit logs. This is an intentional bundling of configuration capabilities.
For developers and technical administrators: Signal’s authorization system uses policy-based authorization with hierarchical role requirements. Each policy (Owner, DSL, Deputy DSL, Admin, Viewer) allows access to users with that role or higher privilege. This is implemented in the IdentityServiceExtensions policy configuration.