Get AI summaries of any video or article — Sign up free
Notion at Work: The Full Scope of Sharing and Permissions thumbnail

Notion at Work: The Full Scope of Sharing and Permissions

Notion·
5 min read

Based on Notion's video on YouTube. If you like this content, support the original creators by watching, liking and subscribing to their content.

TL;DR

Notion’s sharing hierarchy runs from public pages to invited guests, workspace members, and groups, with page-level permissions controlling what each group can do.

Briefing

Notion’s sharing model hinges on a practical “hierarchy” of who can see what—public pages, invited guests, workspace members, and groups—plus a crucial rule: sharing a database view effectively grants access to the full underlying database. That combination determines how safely teams can collaborate and how carefully admins must structure permissions to avoid accidental overexposure.

At the top level, pages can be made public or shared with specific people. Public sharing is controlled through a share menu that toggles “public access” and sets an access level: “can read” for anonymous visitors, or “can’t comment” vs comment-enabled access for logged-in users. Admins can also allow search engines to index the page (disabled by default) and decide whether duplication is allowed (enabled by default), letting logged-in users copy the page as a template. Once public access is configured, a unique URL can be copied and shared; settings can be revisited later to revoke public access.

For controlled access, Notion requires invitees to be signed in. If an email isn’t tied to an existing account, the invite prompts account creation and onboarding. The system distinguishes between “guests” (typically contractors, clients, or partners) and “members” (team/enterprise workspace participants). Both can be granted page-level permissions, but the permission granularity matters: “can read” and “can comment” limit what users can do, while “can edit” allows changes without granting sharing power, and “full access” includes the ability to invite others—often too permissive for external collaborators.

Permissions also extend beyond individual people through workspace-wide access and groups. A page can be toggled to “workspace access,” which moves it into the workspace category for all members, with a default permission of full access that can be reduced to can read or can comment. Groups—created by admins—let teams grant access to a set of users as a unit (for example, a marketing group), avoiding repetitive per-person sharing.

A key nuance appears in how Notion handles page structure and database relationships. When a page is shared, sub-pages created within it via page blocks are shared too. More importantly, sharing a view of a database or a linked database can expose more than intended: the full original database becomes accessible. The presenter flags a hoped-for improvement—sharing database views without granting access to the entire database—but for now recommends workarounds such as building client “portal” pages with simplified, filtered representations rather than exposing a master database wholesale.

Admin controls round out the model. Admins can manage guests and members, convert guests to members on team/enterprise plans, remove users, and create or manage groups. Security settings can restrict sharing behaviors, including preventing public sharing and disabling guests from sharing with non-members. In the Q&A, several practical scenarios are addressed: external sharing can’t be made truly “unshareable” if someone has full access; requiring sign-in and limiting permissions can prevent further sharing. For database-linked structures, linked databases remain protected unless explicitly shared. Finally, Notion can function as a private community space (often better than Facebook groups for structured collaboration), though membership-site features like dated releases aren’t automated—tiered access can be approximated using groups and page-level permissions.

Cornell Notes

Notion’s sharing system is organized into a hierarchy: public pages, invited guests, workspace members, and groups. Each category can be granted page-level permissions such as can read, can comment, can edit, or full access (which includes the ability to invite others). A major security constraint is that sharing a database view grants access to the full underlying database, and sharing a page also shares its sub-pages. Linked databases are protected unless they’re shared as well, so client-facing “filtered” experiences often require separate portal pages rather than exposing master databases. Admin settings add guardrails by limiting public sharing and guest sharing, and groups help scale permissions across teams.

What are the main permission levels for a shared page, and why does “full access” matter?

Notion’s share menu offers can read, can comment, can edit, and full access. Can read lets others view. Can comment allows logged-in users to leave comments. Can edit allows editing but not sharing. Full access is the most powerful because it lets the user invite others—so granting full access to external guests (clients/contractors) can unintentionally widen who can access the content.

How does public page sharing work, and what settings affect discoverability and reuse?

Public sharing is enabled by toggling public access in the share menu and selecting an access level (default is can read). There’s an option to allow search engine indexing (disabled by default), which determines whether the page can appear in search results. Duplication is enabled by default, allowing logged-in users to duplicate the page as a template; it can be disabled if reuse is undesirable. A unique URL is generated via “copy page link,” and public access can be turned off later from the share menu.

Why is sharing a database view risky under the current model?

Sharing a view of a database (or a linked database scenario) grants access to the full original database, not just the filtered slice shown in the view. That means a client-facing page that uses a database view can inadvertently expose unrelated records. The workaround described is to avoid putting all projects into one master database when different people should see different subsets, and instead create separate client portal pages with simplified representations.

How do guests and members differ, and how can admins control who can join a workspace?

Guests are typically external collaborators (contractors, clients, partners). Members are internal team participants tied to the workspace. Admins can manage guests and members through workspace settings: on team/enterprise plans, guests can be converted to members or removed. Admins can also restrict onboarding using allowed email domains, letting users with approved domains join when they create accounts, and can send a workspace URL for joining.

What’s the practical way to share with a specific person without letting them share further?

The Q&A emphasizes that a share link is inherently shareable, so the safer approach is to invite the person directly and require sign-in by using invite-by-email. Then set their access level to can read or can comment (or can edit if needed) rather than full access. This prevents them from sharing the page with others because they don’t have the permission that enables inviting others.

How do linked databases behave when sharing filtered client content?

Linked databases remain protected unless they are shared explicitly. Even if a client portal page uses a filtered view of a master database, the underlying database access rules apply, and linked databases accessed through relation properties won’t be visible to the external user unless those linked databases are shared as well.

Review Questions

  1. If a user is granted full access to a page, what additional capability does that permission include beyond editing?
  2. What security limitation affects database views, and how does it influence how teams design master databases and client portals?
  3. How can admins use groups to manage permissions at scale without inviting each person individually?

Key Points

  1. 1

    Notion’s sharing hierarchy runs from public pages to invited guests, workspace members, and groups, with page-level permissions controlling what each group can do.

  2. 2

    Public access can be configured with can read vs comment-enabled access, optional search indexing, and duplication behavior (enabled by default).

  3. 3

    Invitees must sign in; if they lack an account, the invite triggers onboarding, and their access is governed by the permission level granted.

  4. 4

    Sharing a database view grants access to the full underlying database, so filtered client experiences often require separate portal pages or separate data structures.

  5. 5

    Linked databases accessed via relation properties stay protected unless those linked databases are shared explicitly.

  6. 6

    Admins can scale permissions using workspace access toggles and groups, and can restrict sharing via security settings (e.g., blocking public sharing and guest sharing).

  7. 7

    To prevent further sharing by an external person, avoid full access and use invite-by-email so access is tied to a signed-in account.

Highlights

The permission model includes a “full access” option that allows invitees to share further—making it a common source of accidental overexposure.
Database views aren’t “view-only” under the current model: granting access to a view effectively grants access to the entire underlying database.
Linked databases remain locked unless explicitly shared, so client portals must account for relation-based data paths.
Groups let admins grant consistent access to sets of users (like marketing) without managing permissions one person at a time.
Security settings can block public sharing and restrict guest sharing, adding an extra layer beyond per-page permissions.

Topics

  • Notion Sharing Hierarchy
  • Page Permissions
  • Database Views
  • Guest vs Member Access
  • Admin Security Controls

Mentioned