This guide explains how data is shared across collections and how to access data from different collections. It breaks down different user scenarios, explains what permissions they might have, and describes what access and responsibilities they would have.
Overview
Specify supports data from multiple collections within a single database. For example, specimen records for fish and for birds are combined within the same data tables of a single database. For institutions with multiple collections, this storage model enables, but does not necessarily grant, access to data across multiple disciplines for most users. Users typically have login and access privileges only for their collectionâs data.
Access to data across collections, disciplines, or divisions is an important capability for museums with centralized registration, accession, or conservation activities. It also allows others with a legitimate interest in the institutionâs complete holdings, such as research directors, to analyze and report on the institutionâs entire holdings.
In Specify, there are data tables and data entry forms for entering âInstitutionâ and âDivisionâ-level information, where a âDivisionâ usually (but not always) represents a single taxonomic discipline. Each âDivisionâ or âDisciplineâ may have multiple collections; for example, Ichthyology may have a voucher and tissue collection, and Ornithology may have voucher, tissue, and egg âCollectionsâ.
Figure 1 â Specifyâs Institution, Division, Discipline and Collection hierarchy
How are Specify Data Shared Across Collections?
For a Specify user, data elements have visibility or âscopeâ relative to other data elements and with respect to the administrative context of a âCollectionâ.
The figure below shows an overview of the âscopeâ of various records in Specify. As we move left to right in the figure, the scope is reduced. The data types shown in the âDisciplineâ column are scoped to that âDisciplineâ, available to all âCollectionsâ defined under it. All âCollection Objectsâ in those âCollectionsâ can access those data items.
Put another way, all âCollectionsâ within a âDisciplineâ share the same âTaxonâ Tree (or multiple taxon trees), âLocalitiesâ, âCollecting Eventsâ, etc. One level down, each âCollectionâ has its own set of âCollection Objectsâ, âPreparation Typesâ, and âPick Listsâ.
Given the example in Figure 1, for the Ichthyology âDisciplineâ, both the Wet and Dry âCollectionâ would share a âTaxonâ Tree, âGeographyâ Tree, âAgentsâ (e.g. collectors, authors, annotators), etc.
The Wet âCollectionâ would have its own set of âPreparation Typesâ and âPick Listsâ, which would be different from the Dry âCollectionââs. While these can be different, there is no barrier to duplicating values across âCollectionsâ, âCollecting Eventsâ, âCollecting Tripsâ, and âLocalitiesâ are all scoped to the âDisciplineâ.
For a complete, detailed list of which tables are scoped to which level, please see our full Institutional Scoping in Specify documentation.
Security and Data Access in Specify 7
Specify 7 uses a role-based access system that provides granular control over what users can see and do. Administrators (like an Institution Administrator or Collection Administrator) create Roles (e.g., âCurator,â âData Entry,â âStudent Volunteerâ) and assign specific permissions to them.
These permissions are additive. By default, a new user has no permissions. A user is then assigned one or more roles, and their total permissions are the sum of all permissions granted by those roles. For example, you could assign a user a âData Entryâ role that grants access to âCollection Objectâ forms and a âGeoreferencerâ role that grants access to the âLocalityâ table.
This system controls:
- Access to Specify components (like the Query Builder, Workbench, or Schema Configuration).
- Access to data tables, including permissions for Create, Read, Update, and Delete (CRUD) operations.
Introduction to Permissions
Security and Accounts Documentation
Specify User Scenarios
| User Scenario | Assigned Roles (Example Combination) | Description of Access & Responsibilities |
|---|---|---|
| 1. Institution Admin | Institution Admin (Status) |
This user is a âsuper administratorâ with unrestricted power. They have all permissions in all collections. They can create/delete collections, manage all user accounts, assign Collection Admins, download database backups, and access institution-wide settings. This role is for top-level technical staff only. |
| 2. Collection Manager | Collection Admin, Security Admin |
This is the primary manager for a single collection. They can manage user accounts and assign roles for their collection. They have full data access, can edit forms (Edit Forms), manage Pick Lists, and oversee all collection activities. They are the admin within their collection, but not for the whole institution. |
| 3. Lead Curator | Full Data Access, Edit Taxon Tree, Edit Forms and Global Preferences, Run Queries |
This user has full âpower-userâ access to the data and its structure. They can perform all data operations (Create, Read, Update, Delete), manage the Taxon tree, and configure data entry forms and global preferences. They typically do not manage user accounts. |
| 4. Data Entry Staff | Full Data Access (minus Delete), Full WorkBench access, Bulk Attachment Import, Run Queries |
This user is focused on day-to-day data input and editing. They have permission to add and edit records, use the WorkBench for data uploads, and run queries. They cannot delete records (a common safety restriction) or change the database structure (forms, pick lists). |
| 5. Registrar | Manage Interactions, Full Data Access, Print Reports, Run Queries |
This user is specialized in managing transactions. They have full data access, with a specific focus on the roles needed to create, update, and track Loans, Gifts, and other Interactions. They can also print reports (e.g., loan invoices) and run queries. |
| 6. IT / Security Auditor | Inspect Audit Log, Security Admin, Read-Only Access |
This user is responsible for system oversight, not collections data. They can view the Audit Log to track user activity and view security configurations (Security Admin), but they do not have permission to modify any collections data. |
| 7. Student Intern | Read-Only Access, Run Queries, Create Data Sets |
This user has a limited, âsafeâ role. They can look up any data and run queries to build Record Sets (e.g., for a class project or research task), but they cannot add, edit, or delete any records in the database. |
| 8. Visiting Researcher | Read-Only Access, Run Queries, Export Data, Print Reports |
This is a typical âguestâ account. The user can search and explore the collectionâs data, run complex queries, export datasets for their research, and print reports (like labels). They cannot make any changes to the data. |
Access To Multiple Collections
The Specify 7 role-based system fully supports users who need different levels of access across multiple collections.
Because roles are assigned to a user per collection, a single user account can have different roles for each collection they are a member of. For example, the same user could be a âCollection Administratorâ for the Botany Collection but have a read-only âGuestâ role in the Entomology Collection, all while using a single login.
Who Can See My Collection Data?
When a user logs in to Specify 7, they select a single âCollectionâ to work in. This sets the âcontextâ or âscopeâ for their session.
All searches and queries are constrained by this scope. For example, if you run a query for âCollection Objectsâ, it will only return results from the âCollectionâ you are currently logged into. If you search for an âAgentâ, it will search all âAgentsâ within the current âDisciplineâ (since âAgentâ is scoped at the âDisciplineâ level).
Your ability to see or interact with any data is determined by the permissions granted to your Role for that specific collection.
What About Sensitive Data?
Access control in Specify 7 is handled at the table level. For example, you can use a Role to prevent a user from reading, updating, or deleting any data in the âLocalityâ table, but you cannot use it to hide specific âLocalityâ records while showing others.
Summary
Specify 7 enables a single database to house all the data for an institution, organized by âInstitutionâ, âDivisionâ, âDisciplineâ, and âCollectionâ. The scope of data (e.g., âTaxonâ at the âDisciplineâ level, âCollection Objectâ at the âCollectionâ level) determines how it is shared between collections.
A powerful role-based access system provides secure, granular control over user permissions. Access is granted by assigning one or more Roles to a user for each âCollectionâ, and these permissions are additive. This flexible system replaces the rigid user âgroupsâ from Specify 6.
Frequently Asked Questions
| Question | Answer |
|---|---|
| âWhen I search can I see âCollection Objectsâ from other collections?â | No. âCollection Objectsâ belong to only one âCollectionâ. When you log in, you choose a âCollectionâ, and all your searches for âCollection Objectsâ are limited to that collection. |
| âCan I assign the same âAgentâ as a Collector in two different âCollectionsâ?â | Yes, as long as both âCollectionsâ are in the same âDisciplineâ. The âAgentâ table is scoped at the âDisciplineâ level, so all âCollectionsâ in that âDisciplineâ share the same list of âAgentsâ. |
| âWhen I log in do I have the same permission for every âCollectionâ within a âDisciplineâ?â | Not necessarily. In Specify 7, permissions are assigned to your user account per collection. You could be a âCollection Administratorâ in one collection and have a read-only âGuestâ role in another, even if both âCollectionsâ are in the same âDisciplineâ. |
| âCan I share my âTaxonomic Treeâ with the teaching âCollectionâ?â | Yes, if both the âmainâ âCollectionâ and teaching âCollectionâ are in the same âDisciplineâ. The âTaxonâ tree (âTaxonomic Treeâ) is scoped at the âDisciplineâ level. |
| âCan a Guest user create a report to show all of the âCollection Objectsâ in a âCollectionâ?â | This depends entirely on how you configure the âGuestâ role in the âSecurity and Accountsâ panel. If you create a âGuestâ role and do not grant it permission to execute reports, then no. If you do grant that permission, then yes. You have full control over what each role can do. |


