User role permissions by use case Innovation Release

Authorization of these user roles follows a role-based access control (RBAC) model with the restrictions applying to a specific scopeeither within one project or within one account.

The following list doesn't cover Postgres cluster database authorization.

Currently, you can't create custom roles. Only these 14 predefined roles are available.

PermissionsOrganization AdministratorOrganization OwnerPlatform AdminAI Model ManagerProject OwnerProject EditorProject ViewerEstate IngesterPipeline EditorCatalog Data readerCatalog Data writerMigration Portal Projects OwnerMigration Portal Projects EditorMigration Portal Projects Viewer
Access Ops apps (launchpad)X
Manage notification credentialsX
Manage identity provider integrationsX
Manage usersX
View usersXXXX
Assign org rolesX
Update and delete tagsXX
View projects within the orgXX
Update and delete projectsX
View roles assigned at the project levelXXXX
View activity log for the orgXX
View and download usage report for the projectXXX
View and download usage report for the orgXX
Create projects within the orgX
Assign project rolesXX
Create, edit, and delete Postgres clustersXX
View Postgres clusters, backups, estates, report and migrationsXXX
View Postgres cluster metrics, logs, recommendations and alertsXXX
View org role mapping rulesXX
Create, update, and delete org role mapping rulesX
View project role mapping rulesXXXX
Create, update, and delete project role mapping rulesXX
View activity log for the projectXXX
View, edit, and delete owned projectsX
Ingest self-managed Postgres cluster dataX*
Create, update, and delete marketplace appsXX
List marketplace appsXXX
Create, update, and delete catalogXX
List catalogX
Read access to catalog Iceberg table dataXX
Write and delete access to catalog Iceberg table dataX
Manage AI models and inference servicesX
Access inference servicesX
Create, view, update, delete, and execute pipelinesX
View, delete, and execute knowledge baseX
View pipelinesXX
View published and deployed flowsXXX
Create and update published and deployed flowsXX
Delete deployed flowsX
Delete published flowsX
View Migration Portal projectsXXX
View and update Migration Portal projectsXX
Manage Migration Portal projectsX

* Only machine-users can be assigned to ingest self-managed cluster data.

The following functionality is available to all authenticated users, regardless of assigned role:

  • Access to the chatbot. Users must still have roles that grant access to the relevant resources (for example, Postgres clusters, AI models, and pipelines) to interact with them through the chatbot.
  • Manage Postgres image repositories and repository rules.
  • Access to Hybrid Manager-managed Langflow from the launchpad.