- Default groups in each tenant (
auditors,viewers,editors,admins) have corresponding predefined general roles. - When you create custom groups, you should create at least one access permit that assigns a role to the group. You can configure an access permit to apply to the entire tenant, a project within it or an individual resource within it. For more details and instructions, see Managing custom groups.
List of roles
The following roles are available:-
General
auditorviewereditoradmin
-
Object Storage
storage.viewerstorage.uploaderstorage.editorstorage.object-editorstorage.object-viewerstorage.object-lister
-
MysteryBox
mysterybox.payload-viewer
-
Data Subject Requests
dsr.admin
General roles
General roles grant permissions for resources from all services. For example, if you are in a group that has theadmin role within a tenant, you can perform all actions listed below on all Compute virtual machines, Managed Kubernetes clusters, etc. in the tenant.
The default groups within a tenant are assigned corresponding tenant-wide general roles.
The following general roles are available:
auditor: view certain types of resources without access to data.viewer: view most types of resources (except some resources related to access management, security, etc.) and access data in them (e.g. download objects in buckets).editor: view and manage most types of resources and access data in them.admin: view and manage all types of resources and access data in them.
The
auditor role is going to be deprecated in the near future. We recommend using the viewer role and viewers default group instead.| Resource type | auditor( auditors default group) | viewer( viewers default group) | editor( editors default group) | admin( admins default group) |
| Compute | auditor | viewer | editor | admin |
| Virtual machines | - | View | View Create Modify Stop Start Delete | View Create Modify Stop Start Delete |
| GPU clusters | - | View | View Create Add/remove VMs Modify Delete | View Create Add/remove VMs Modify Delete |
| Disks | - | View | View Create Attach to/detach from VMs Modify Delete | View Create Attach to/detach from VMs Modify Delete |
| Shared filesystems | - | View | View Create Attach to/detach from VMs Modify Delete | View Create Attach to/detach from VMs Modify Delete |
| Boot disk images | - | View Use | View Use | View Use |
| Soperator | auditor | viewer | editor | admin |
| Clusters | - | View | View Create Modify Stop Start Delete | View Create Modify Stop Start Delete |
| Managed Service for Kubernetes | auditor | viewer | editor | admin |
| Clusters | - | View | View Create Modify Delete | View Create Modify Delete |
| Node groups | - | View | View Create Modify Delete | View Create Modify Delete |
| Serverless AI | auditor | viewer | editor | admin |
| Endpoints | - | View | View | View Create Modify Stop Start Delete |
| Jobs | - | View | View | View Create Modify Cancel Delete |
| Object Storage | auditor | viewer | editor | admin |
| Buckets | View | View | View Create Delete Undelete Purge | View Create Delete Undelete Purge |
| Objects, versions | - | List Download | List Download Upload Delete Restore | List Download Upload Delete Restore |
| Multipart uploads | - | List uploads | List uploads List parts Create | List uploads List parts Create |
| Transfers | View transfers View iterations | View transfers View iterations | View transfers View iterations Create Modify Stop Start Delete | View transfers View iterations Create Modify Stop Start Delete |
| Bucket settings | View | View | View Modify | View Modify |
| Managed Service for PostgreSQL® | auditor | viewer | editor | admin |
| Clusters | - | View | View Create Modify Stop Start Delete | View Create Modify Stop Start Delete |
| Container Registry | auditor | viewer | editor | admin |
| Registries | - | View | View Create Modify Delete | View Create Modify Delete |
| Images | - | List Pull | List Pull Push Modify | List Pull Push Modify |
| Managed Service for MLflow | auditor | viewer | editor | admin |
| Clusters | - | View | View Stop Start | View Stop Start Create Modify Delete |
| Applications | auditor | viewer | editor | admin |
| Standalone applications | - | View | View Create Modify Stop Start Delete | View Create Modify Stop Start Delete |
| Applications for Managed Kubernetes | - | View | View Create Create/delete endpoints Delete | View Create Create/delete endpoints Delete |
| Observability | auditor | viewer | editor | admin |
| Metrics | - | View | View | View |
| Alerts | - | View | View Create Modify Delete | View Create Modify Delete |
| Logs | - | View | View Write | View Write |
| Virtual Networks | auditor | viewer | editor | admin |
| IP address pools | - | View | View | View |
| IP address allocations | - | View | View Create Assign to/de-assign from resources Delete | View Create Assign to/de-assign from resources Delete |
| Networks | - | View | View Create Modify Delete | View Create Modify Delete |
| Subnets | - | View | View Create Use Modify Delete | View Create Use Modify Delete |
| Routing tables | - | View | View Create Assign to subnets Modify Delete | View Create Assign to subnets Modify Delete |
| Routes | - | View | View Create Modify Delete | View Create Modify Delete |
| Security groups | - | View | View Create Assign to VMs Modify Delete | View Create Assign to VMs Modify Delete |
| Security rules | - | View | View Create Modify Delete | View Create Modify Delete |
| Billing | auditor | viewer | editor | admin |
| Billing details – general: payer type, country, payment method, etc. | View | View | View | View |
| Billing details – sensitive: payer name, billing address, etc. | - | View | View | View |
| Documents | View | View | View | View |
| Prices | View | View | View | View |
| Pay-as-you-go balance | - | View | View | View |
| Usage details | - | View | View | View |
| Transactions | - | View | View | View |
| Identity and Access Management | auditor | viewer | editor | admin |
| Users | View | View | View | View |
| Groups | View | View | View | View Add members Remove members |
| Service accounts | View | View | View Create Modify Delete | View Create Modify Delete |
| Authorized keys | View | View | View | View Upload Modify Delete |
| Access keys | View | View | View | View Create Modify Delete |
| Audit Logs | auditor | viewer | editor | admin |
| Events | - | - | - | View |
| Exports | - | - | - | View Create |
| MysteryBox | auditor | viewer | editor | admin |
| Secrets | View List | View List | View List Create Update Delete Restore | View List Create Update Delete Restore |
| Versions | View List | View List | View List Create Delete Restore | View List Create Delete Restore |
| Payloads | - | - | - | View |
| Quotas | auditor | viewer | editor | admin |
| Limits | - | View | View | View |
| Requests | - | View | View | View Create Cancel |
| Support | auditor | viewer | editor | admin |
| Regular requests | View Create Comment Attach files Close | View Create Comment Attach files Close | View Create Comment Attach files Close | View Create Comment Attach files Close |
| Data Subject Requests to receive copies of data | - | - | - | View Create Comment Attach files Close |
| Data Subject Requests to erase data | - | - | - | View Create Comment Attach files Close |
Object Storage
Object Storage roles grant permissions for Object Storage buckets and objects. The following Object Storage roles are available:storage.object-viewer: download objects and view their metadatastorage.object-lister: list objects and view their version metadatastorage.viewer: view buckets, list and download objects but not upload themstorage.uploader: view buckets, upload objects but not list or download themstorage.object-editor: view buckets, list, download, upload and manage objectsstorage.editor: view and manage buckets, list, download, upload and manage objects
| Object Storage | storage.object-viewer | storage.object-lister | storage.viewer | storage.uploader | storage.object-editor | storage.editor |
|---|---|---|---|---|---|---|
| Buckets | - | - | View | View | View | View Create Delete |
| Objects, versions | Download | List | List Download | Upload | List Download Upload Delete Restore | List Download Upload Delete Restore |
| Multipart uploads | - | - | List uploads | List parts Create | List uploads List parts Create | List uploads List parts Create |
| Transfers | - | - | - | - | - | - |
| Bucket settings | - | - | View | View | View | View Modify |
MysteryBox
MysteryBox roles grant permissions for MysteryBox secrets. The only available role ismysterybox.payload-viewer, which is a sub-role of the admin general role.
mysterybox.payload-viewer contains the following permissions:
| MysteryBox | mysterybox.payload-viewer |
|---|---|
| Secrets | - |
| Versions | - |
| Payloads | View |
Data Subject Requests
Roles for Data Subject Requests (DSRs) grant permissions to receive copies of personal and non-personal data stored in a tenant and its resources in a machine-readable format, and erase the data if required. If you represent a legal entity and want to send a DSR, you need a role for DSRs. The only available role for DSRs isdsr.admin, which allows you to create Data Subject Requests and general support requests. It is a sub-role of the admin general role.
dsr.admin contains the following permissions:
| Support | dsr.admin |
|---|---|
| Regular requests | View Create Comment Attach files Close |
| Data Subject Requests to receive copies of data | View Create Comment Attach files Close |
| Data Subject Requests to erase data | View Create Comment Attach files Close |
Postgres, PostgreSQL and the Slonik Logo are trademarks or registered trademarks of the PostgreSQL Community Association of Canada, and used with their permission.