Skip to main content

Roles

Every user has one or more roles that regulate which actions that user can execute. We have roles that are oriented towards managers, developers, operations, security, CI, and more.

Management roles

  • Admin
RoleIDSlugDescription
Admin696188987admin- Create and destroy resources and invite users with other roles.
- Manage the organization, account or namespace.
- Create, modify, and delete applications and its scopes.
- Admin roles automatically include Developer permissions.

Developer centric roles

  • Developer
  • Member
RoleIDSlugDescription
Developer700317756developer- Manage applications in the organization, account, or namespace.
- Create applications, parameters, deployments.
- Can create builds, releases, scopes, and start them.
- View logs, performance, metadata, and troubleshoot.
- Cannot make changes at the organization or account level.
- Includes Member permissions by default.
Member704380989member- Read-only access to resources.
- Can view organization, account, namespace, and application information.
- Included by default in all roles.
- Cannot make changes.

DevOps / Infrastructure / Security / FinOps centric roles

  • Ops
  • SecOps
  • CI
RoleIDSlugDescription
Ops708509758ops- Configure the infrastructure for the organization, account, namespace, or application.
- Includes Member permissions by default.
SecOps712638527secops- Configure security-related features for the organization, account, namespace, or application.
- Includes Member permissions.
CI1855672260machine:ci- Create builds, assets, releases, and metadata.
- Includes Member permissions by default.
ROLES vs. APPROVALS & POLICIES

Having a role on a certain resource doesn't necessarily translate into being able to execute actions on your own as your company might have configured approval flows that will be triggered upon your action. Check the Approvals section for more information.

Who's allowed to grant permissions

Granting a permission means assigning a role to a user on a specific Nullplatform Resource Name (NRN) and its child resources. For example, you can be assigned the Admin role on an application, namespace, account, or even the entire organization.

Users can grant permissions to other users according to the following rules:

  • Users can only grant permissions at the same or lower NRN level where they have their own grant.

  • The role being granted must be one that the granter is authorized to assign, based on the following table:

    GranterRoles that can be granted
    AdminAdmin, Member, Ops, Developer, SecOps
    OpsCI

Grant permissions

You can grant permissions in the following ways:

  • From the UI – Go to your Namespace view and select Team Management from the top bar's drop-down menu.

  • Using the CLI or API – Use these tools to grant permissions programmatically.

Grant removal

  • Only users with the Admin role can remove grants.
  • You can only remove grants at or below the NRN level where you hold the Admin role.