Skip to main content

Organizations roles

To perform any action in Superblocks, a person must have sufficient access to do so. This access is controlled by permissions that grant users the ability to perform a specific action. For example, the ability to build with an integration is a permission.

Roles are used to define a set of permissions that you can assign to individuals or groups.

Resource-level roles give users access to specific Apps, Integrations, Workflows, etc. For more information, see About resource roles

Organization-level roles control the Superblocks features members can access, the administrative actions they can perform, and the level of access users have to all current and future resources created in the org.

Built-in organization roles

Each Superblocks organization, by default comes out of the box with the following built-in roles. These roles are non-editable and are based on common patterns of permissions organizations usually need.

  • Owner: Each Superblocks organization has a primary Owner. This person is considered the controller of all org data. Only they can request to delete users, delete the organization, or request plan and billing changes.
  • Admin: Admins help manage their organization, including members, groups, and settings. Admins can also access all of the organization's resources to help manage access to these resources.
  • Developer: The default non-administrative role is Developer. Developers build and maintain your company's tooling. They can't change org settings, but otherwise have read-only access to most of your org's settings.
  • End-User: End-Users have the lowest level of access in Superblocks. They have read-only access to the platform, can't view most org settings, and can only access resources they've been given access to.

For more granular control of permissions, you can create custom organization roles. For more information, see Custom organization roles

For more information using roles, see Using organization roles

Permissions for built-in organization roles

The built-in organization roles have the following permissions. For a full list of permissions that can be assigned with organization roles, see the permissions reference

ResourcePermissionOwnerAdminDeveloperEnd-User
Access tokensaccess_tokens:manage
access_tokens:read
Agentsagents:manage
agents:read
Applicationsapps:create
apps:update
apps:deploy
apps:delete
apps:manage_visibility
apps:share
apps:preview
apps:view
Foldersfolders:manage
Groupsgroups:manage
groups:read
groups.members:manage
groups.members:read
Integrationsintegrations:create
integrations:update
integrations:delete
integrations:share
integrations:build
Logslogs:read
logs.streams:manage
logs.streams:read
Orgorg:manage
org:read
org.users:manage
org.users:read
Profilesprofiles:manage
profiles:read
Repositoriesrepos:manage
repos:read
Rolesroles:manage
roles:read
Scheduled Jobsjobs:create
jobs:update
jobs:deploy
jobs:delete
jobs:share
jobs:manage_schedule
jobs:run
Secret storessecrets_stores:manage
Workflowsworkflows:create
workflows:update
workflows:deploy
workflows:delete
workflows:share

Further reading

Using organization roles

Learn how to view organization role permissions and manage organization role assignments.

Custom organization roles

Customize user access to your organization and resources with custom organization roles.

Permissions reference

Full reference to permissions assignable to users with organization roles.