Skip to main content

Organizations and users glossary

Learn the meanings of organization and user-related terms.

Definitions of organization-related terms. Refer to the main glossary for definitions of terms across Retool.

A

No glossary entries found.

B

No glossary entries found.

C

Configuration Variables

Environment-specific values and secrets that you can reference in Retool resource configurations, apps, workflows, and queries.

CORS

Wikipedia: Cross-origin resource sharing (CORS) is a mechanism to safely bypass the same-origin policy; that is, it allows a web page to access restricted resources from a server on a domain different than the domain that served the web page.

D

No glossary entries found.

E

End user

An enabled user who did not build or edit an app or workflow during the billing cycle. End users are billed at a lower rate than standard users.

External user

Users whose email domains fall outside of what you define as 'internal'. External users are billed at a lower rate than standard users, and their permissions are usually more restricted.

F

No glossary entries found.

G

No glossary entries found.

H

Hosting

The method by which Retool is hosted or deployed for your organization.

I

No glossary entries found.

J

No glossary entries found.

K

No glossary entries found.

L

No glossary entries found.

M

No glossary entries found.

N

No glossary entries found.

O

Organization

Organizations are how Retool group users, apps, resources, etc. Each Retool user is a member of an organization. Organization admins can add or remove users, manage access, and change its configuration.

P

No glossary entries found.

Q

No glossary entries found.

R

Retool Cloud

The cloud-hosted version of Retool.

S

Security hardening

Wikipedia: In computer security, hardening is usually the process of securing a system by reducing its attack surface, which is larger when a system performs more functions; in principle a single-function system is more secure than a multipurpose one. Reducing available ways of attack typically includes changing default passwords, the removal of unnecessary software, unnecessary usernames or logins, and the disabling or removal of unnecessary services.

Standard user

An enabled user who built or edited an app or workflow during the billing cycle.

T

No glossary entries found.

U

No glossary entries found.

V

No glossary entries found.

W

No glossary entries found.

X

No glossary entries found.

Y

No glossary entries found.

Z

No glossary entries found.