Roles & Permissions
Configure role-based access control for your organization
Roles & Permissions
Securtea uses role-based access control (RBAC) to manage what users can do within your organization. Configure roles to match your security requirements.
Understanding RBAC
How It Works
- Permissions define specific actions users can take
- Roles group permissions together
- Assignments give roles to users
- Access is checked when users perform actions
Permission Model
Permissions follow a pattern:
{resource}:{action}
Examples:
organization:update- Modify organization settingsuser:manage- Manage organization membersassessment:run- Execute compliance assessments
Default Roles
Securtea provides pre-configured roles:
Organization Owner
Full control over the organization:
- All permissions granted
- Cannot be removed
- Can transfer ownership
- Only one owner per organization
Organization Admin
Administrative access:
- Manage users and roles
- Configure settings
- Run assessments
- View all data
Organization Member
Standard user access:
- View dashboard
- Run assessments
- Generate reports
- View compliance data
SSO User
Read-only access for SSO-provisioned users:
- View dashboard
- View compliance data
- Cannot modify configurations
Billing Admin
Billing-focused access:
- Manage subscription
- View invoices
- Update payment methods
- Cannot access security data
Billing Reader
View-only billing access:
- View subscription status
- View invoices
- No modification rights
Viewing Roles
Role List
Navigate to Settings > Organization > Roles to see:
| Column | Description |
|---|---|
| Role Name | Display name |
| Members | Users with this role |
| Permissions | Number of permissions |
| Type | Default or custom |
Role Details
Click a role to view:
- Full permission list
- Assigned members
- Role description
- Creation/modification dates
Managing Role Assignments
Assigning Roles
To assign a role to a user:
- Go to Settings > Organization > Members
- Find the user
- Click role dropdown
- Select new role
- Change takes effect immediately
Multiple Roles
Users can have multiple roles:
- Permissions are combined (union)
- Most permissive access applies
- Useful for specialized access needs
Time-Bound Assignments
Assign roles with expiration:
- Click Add Role on user
- Select role
- Enable Expires
- Set expiration date
- Add justification (optional)
Use for:
- Temporary elevated access
- Contractor access
- Audit periods
Time-bound assignments automatically revoke when expired. Users are notified before expiration.
Permission Categories
Organization Permissions
| Permission | Description |
|---|---|
organization:read | View organization info |
organization:update | Modify settings |
organization:delete | Delete organization |
User Permissions
| Permission | Description |
|---|---|
user:read | View member list |
user:manage | Invite/remove members |
user:role | Assign roles |
Assessment Permissions
| Permission | Description |
|---|---|
assessment:read | View assessments |
assessment:run | Execute assessments |
assessment:manage | Configure frameworks |
Report Permissions
| Permission | Description |
|---|---|
report:read | View reports |
report:generate | Create reports |
report:manage | Configure reporting |
Integration Permissions
| Permission | Description |
|---|---|
integration:read | View integrations |
integration:manage | Configure connections |
Billing Permissions
| Permission | Description |
|---|---|
billing:read | View subscription |
billing:manage | Modify billing |
Custom Roles
Creating Custom Roles
- Click Create Role
- Enter role name and description
- Select permissions
- Save role
Editing Custom Roles
- Click role name
- Click Edit
- Modify permissions
- Save changes
Changing role permissions affects all users with that role immediately.
Deleting Custom Roles
- Select role
- Click Delete
- Reassign affected users
- Confirm deletion
Default roles cannot be deleted.
Permission Checking
How Permissions Are Checked
When a user attempts an action:
- System identifies required permission
- User's roles are retrieved
- Permissions from all roles are combined
- If required permission exists, action allowed
- If missing, action denied
ANY vs ALL Logic
Some actions require multiple permissions:
- ANY - User needs at least one
- ALL - User needs every permission
Configure this in custom role settings.
Audit Trail
Role Change Logging
All role changes are logged:
- Who made the change
- What changed
- When it occurred
- Previous and new state
Viewing Audit Log
- Go to Settings > Organization > Roles
- Click Audit Log
- Filter by date, user, or action
Best Practices
Principle of Least Privilege
Assign minimum necessary permissions:
- Start with basic access
- Add permissions as needed
- Review regularly
Role Design
Design roles around job functions:
- Security Analyst → Assessment + Report permissions
- Compliance Officer → Read + Report permissions
- IT Admin → Full technical access
Regular Review
Periodically audit role assignments:
- Check for over-privileged users
- Remove unnecessary access
- Update roles as needs change
What's Next?
- Member Management - Assign roles
- Team Settings - Team-based access
- User Profile - View your permissions