Managing Access to Cloned Voices

Use access controls to protect cloned voices created for specific projects and prevent them from being used unintentionally in other projects.

Overview

Cloned voices created for individual projects can be restricted at the folder level.

This allows you to control where these voices can be used and who can manage access to them.

Required permissions

Only users with the Can edit voice folders permission can manage access to cloned voice folders.

Grant permission to a Manager (Admin only)

Step 1. Open the Manager profile

Go to Users, select the Manager you want to grant access to.

Step 2. Enable the permission

In the Permissions section, enable Can edit voice folders.

The Manager can now configure access to cloned voice folders.

What Managers with this permission can do

Managers with Can edit voice folders permission can:

  1. Make a cloned voice folder available to all projects or restrict it.

  2. Select specific projects where voices from the folder can be used.

Manage access to cloned voice folders

(Available to Managers with the required permission)

Step 1. Open the Cloned voices tab

  1. Go to the Voices page.

  2. Switch to the Cloned voices tab.

Step 2. Open folder settings

Hover over the folder you want to configure.

Click Edit folder.

Step 3. Configure folder access

Option A. Allow usage in all projects

Leave Restrict usage to specific projects disabled.

Voices from this folder will be available in all projects.

Option B. Restrict usage to specific projects

  1. Enable Restrict usage to specific projects.

  2. Select one or more projects where the voices should be available.

You can also enable the restriction without selecting any projects.

In this case, the folder will be hidden and unavailable in all projects.

Step 4. Save changes

Save your settings to apply the restrictions.

Result

  • Voices from restricted folders are available only in the selected projects.

  • In all other projects, these voices are hidden:

    • from Voice selection tasks,

    • from Lip-sync tasks,

    • and from users without the required permission.

  • A lock icon is displayed next to folders with restricted access.