By: Money Navigator Research Team
Last Reviewed: 09/02/2026

FACT CHECKED
Quick Summary
In Tide:
- Admin is full account control
- Team Member access depends on the permission set assigned
- Cashier is payment-taking access without broader account controls
Differences most often show up when a business adds additional users, upgrades permissions so someone can make payments, or tries to add another Admin for a limited company director (where director status can be part of the check).
The practical impact is control: the role you assign affects who can see balances, download statements, send money, or change account-level settings.
This article is educational and not financial advice.
What Tide means by Admin, Team Member and Cashier
Tide describes its permissions framework through its Team Access feature, where an account Admin can invite additional users and assign an access level. In practice, “role” and “access level” often get used interchangeably in everyday conversation, but the app’s behaviour is driven by the specific access granted.
A practical way to interpret the labels is:
Admin = full control of the account and most (or all) features.
Team Member = a non-admin user whose abilities depend on the assigned access level (for example, view-only versus “send & pay”).
Cashier = a type of team member role focused on collecting card payments, with other account features restricted.
Admin role: what it usually includes (and why it’s treated differently)
Tide states that the “first Admin” is the person who opened the account, and that “Admin” is the highest level of account access in Team Access.
Tide also notes that Admins can manage users, activate products and services, and (in some cases) close the business account if they are the only remaining Admin. These points are set out in Tide’s explanation of what an Admin is and what they can do within Team Access.
For limited companies, Tide’s Admin guidance also describes an extra constraint: adding Admin access to another director is linked to director status, with checks against Companies House information.
This is one reason “adding an Admin” can behave differently from “adding a team member”, and it is part of the wider sign-up and legal-entity context covered in Tide limited company vs sole trader sign-up differences.
Team Member access: one label, several different permission sets
In Team Access, Tide lists multiple access levels that an Admin can assign to team members (for example, view-only, payment-capable options, and specialist roles such as accountant or cashier).
That matters because “Team Member” is not a single fixed permissions bundle; it’s a category of user whose access depends on what was selected when they were invited or updated.
If someone says “my team member can’t do X”, the immediate follow-on is usually “which access level were they given?”. In Tide’s own design, the access level is the deciding factor for whether a user can only view information, or can also draft/approve payments, manage cards, or perform other actions.
Tide can update labels and available access levels over time, so its published help content and in-app options are the reference point for what is current.
Cashier role: taking payments without broader account access
Tide describes “Cashier” as a team member role that can collect payments using Tide Card Reader or Tap to Pay on iPhone.
Tide also states that Cashiers do not have the option to view account balances, access statements, or initiate bank transfers, and that settlements details for card reader / Tap to Pay are unavailable for this role.
These restrictions are described in Tide’s Cashier role guide: What is a Cashier, and who can I give this team member role to? in its support centre.
Tide also states that Cashiers must be 18 or over and have an active UK mobile number. In practical terms, Cashier is designed for operational payment taking (front-of-house) rather than account administration (back office). It is a permissions boundary that limits what the role can see and do inside the main business account.
Adding or changing roles: what typically triggers (re)checks
When an Admin invites a new user in Team Access, Tide describes a process where the invited person accepts an email link, downloads the app, and goes through onboarding checks (including identity and address details).
Tide also notes that approval can take up to two days, while often being much faster, in its guide on adding a new team member or changing an existing user’s access level for Team Access.
Role changes can sometimes create extra friction for three broad reasons:
Identity and eligibility checks for the invited user (especially where the access level permits payments or other sensitive actions).
Company structure checks when Admin access is being granted in a limited company context.
Risk and control alignment, where permissions are tightened or expanded in line with product rules (for example, a narrow cashier role versus a payment-capable role).
If a role invite or onboarding step takes longer than expected, it often sits in the same family of checks covered in Tide application delays: common checks that slow sign-up, even though the trigger is “adding a user” rather than “opening the account”.
Why role design matters: operational control and accountability
Role-based access is not only a convenience feature. It affects who can move money, change payees, manage membership settings, or perform other account actions.
In cyber and operational resilience standards, a common principle is limiting permissions to what is necessary for a given task (often called “least privilege”), as set out in the UK Government Security guidance on Identity and Access Control in its cyber security policy handbook.
Tide also highlights that actions taken by certain team roles can still be binding to the business. That distinction – narrow permissions, but business-level responsibility – is part of why roles tend to be defined tightly and why changes can trigger re-checks.
Summary Table
| Scenario | Outcome | Practical impact |
|---|---|---|
| A sole trader opens the account | The sole trader becomes the “first Admin” | Full control sits with one person unless Team Access is used to invite others |
| A limited company adds a second Admin (director) | Admin access is granted only if director status can be confirmed | Admin is treated differently from ordinary team access; delays can occur if records do not align |
| An Admin invites a non-admin team member | The user is onboarded and granted the selected access level | Access can range from view-only to payment-capable, depending on the level chosen |
| A business adds a Cashier | Cashier can take in-person card payments only | Separates payment taking from broader account controls like transfers or statements |
| An existing team member’s access is upgraded | User permissions change after Admin action | Practical impact depends on the new level (for example, paying suppliers versus viewing only) |
| A team member is removed | Access is revoked | Reduces the number of people who can act in-app going forward |
Scenario Table
| Scenario-level | Process-level | Outcome-level |
|---|---|---|
| New user needs access | Admin sends invite > user accepts > onboarding checks | Access is granted (or delayed) depending on checks completing |
| User needs different permissions | Admin edits “Team Access” level | Capabilities expand or narrow after the change is applied |
| Business wants POS-only access | Admin assigns Cashier role | POS payments enabled; broader account features remain restricted |
| Company adds an additional Admin | Admin assignment requested > company officer status checked | Admin access granted only where the person qualifies as a director |
| Access needs to be withdrawn | Admin removes team member | User can no longer access the account in-app |
Tide Business Bank Account
Tide’s account set-up and feature set can vary depending on the product and plan, including how team access is surfaced in the app.
For a neutral overview of Tide in this cluster, see our Tide business account page, which outlines the wider account context that sits around permissions and user management.
Frequently Asked Questions
Tide describes the “first Admin” as the person who opened the account. In practical terms, that person starts with the highest permissions in the app, including the ability to invite other users and assign access levels.
An important edge case is continuity: where only one Admin exists, some account-level actions can become harder to manage if that Admin is unavailable (for example, if device access is lost or the Admin’s login details change).
This is not unique to Tide; it is a general feature of any role-based access model with a highest-permission user.
Tide states that additional company directors can be assigned Admin access, and that checks are performed against Companies House details for director status. That makes Admin access distinct from ordinary team access, because it is presented as tied to company officer records rather than only to an invitation.
A practical implication is that “director” and “day-to-day operator” are not always the same person. If a senior employee needs access, they may qualify as a team member with a specific access level, while Admin access may be restricted to directors depending on the product rules and checks.
Tide describes Admin as the highest level of access, and lists examples such as:
- Managing other users
- Activating products and services
- Managing membership plans and add-ons
Tide also notes scenarios where an Admin may be able to close the account if they are the only remaining Admin.
The edge case is that “highest access” often includes actions that are irreversible or operationally sensitive, like changing who else can use the account.
That is why many platforms treat Admin changes as higher risk than ordinary permission changes, and why adding or replacing Admins can feel more “process-heavy” than inviting a view-only user.
In everyday terms, “Team Member” is shorthand for “a non-admin user who can access the account”. In Tide’s design, that label is incomplete without the access level – because abilities vary from read-only visibility to payment-capable permission sets.
A common misunderstanding comes from assuming a “team member” can always perform the same tasks across different businesses or plans. In practice, the same label can describe very different permissions, so the assigned access level is the only reliable way to interpret what the user can do.
Tide describes Cashier as a type of team member role. The practical difference is the permission scope: the Cashier role is designed to accept card payments through Tide’s payment tools, while other account features remain unavailable.
An important boundary condition is that “payments” here means taking customer card payments, not sending money out of the business account.
This split can reduce the chance that a payments-only user can see balances or make outbound transfers while still allowing the business to operate in-person payment taking.
Tide describes onboarding checks for invited users, including identity and address details, and states that approval can take up to two days (while often being faster).
These checks are applied to the additional user being added, not only to the business entity that opened the account.
A typical edge case is timing: Tide states invitation links are valid for 7 days, so an invite may need to be reissued if it expires before the person completes onboarding.
Another common edge case is where the invited user cannot complete a verification step (for example, a phone-number or device step), in which case access cannot be granted until the onboarding checks are complete.
Access systems typically rely on identifiers such as email address and phone number to connect a user profile to a device and session. If those details change, the user’s experience can change even when the underlying permissions remain the same (for example, a re-verification step or a different login flow).
From a control perspective, changes to identity-related details can also be a re-check trigger because they affect how the provider confirms who is using the account. This does not automatically indicate wrongdoing; it can be a normal outcome of access controls that are designed to reduce account takeover risk.
Tide states that Cashiers do not have the option to view balances, access statements, or initiate bank transfers. For other team members, visibility and action depend on the access level that was assigned (for example, view-only versus a payment-capable level).
The practical edge case is mixed teams: one user might report “I can’t download statements”, while another user in the same business can, because their permissions differ.
Where internal processes depend on statements or transfers, the team’s operational experience can change simply because the access level chosen for each user is different.
Tide’s Admin role description includes managing membership plans and add-ons as an example capability. That implies billing-related control generally sits with Admin-level access rather than with narrower team permissions.
For businesses that want separation between “people who pay suppliers” and “people who can change the plan or add products”, this distinction can matter operationally.
For plan mechanics and billing artefacts, see our explainer on Tide membership billing: monthly fees, VAT, billing dates and invoices, which often sits alongside role design in day-to-day controls.
User roles affect who can act in the app, not the underlying regulatory status of the provider or product. Whether money has FSCS deposit cover (subject to eligibility) or is instead safeguarded depends on the account and provider arrangement, not on whether a user is an Admin or a Cashier.
For a neutral explanation of how non-bank payment providers are described and how safeguards differ at a high level, the FCA’s consumer page on using payment service providers summarises FSCS deposit cover versus safeguarding. Role management sits on top of the product structure; it does not change the underlying framework.
Roles in app-based business accounts are a control layer: they separate “authority” (who can change the account, add users, or alter products) from “activity” (who can take a payment, draft an invoice, or send a transfer).
That separation is partly operational (delegation) and partly defensive (reducing how many people can perform irreversible actions).
Where roles become contentious is usually not the label, but the boundary conditions: director status for Admin access in limited companies, onboarding checks for new users, and tight scoping for specialised roles like Cashier.
Those boundaries reflect a wider pattern in digital financial services where joiner/mover/leaver processes and permission design are used to balance usability with control.
Sources & References
What is an ‘Admin’, and what can they do as part of Team Access? | Tide Business
How do I add a new team member or give an existing team member a new access level? | Tide Business
What is a Cashier, and who can I give this team member role to? | Tide Business
Using payment service providers | Financial Conduct Authority
Principle: B2 Identity and Access Control | UK Government Security
The Electronic Money Regulations 2011 (PDF) | legislation.gov.uk



