Skip to content

Commit 2876864

Browse files
authored
Merge pull request #1693 from segmentio/DOC-216
DOC-216
2 parents a55e357 + b9e0f1d commit 2876864

File tree

1 file changed

+36
-65
lines changed

1 file changed

+36
-65
lines changed

src/segment-app/iam/roles.md

Lines changed: 36 additions & 65 deletions
Original file line numberDiff line numberDiff line change
@@ -2,120 +2,91 @@
22
title: Roles
33
---
44

5-
A role is used to give a user access to resources within a workspace. Roles are additive, and can be combined to configure a custom policy for a Team Member or a Group. A policy is at least one role plus one resource applied to an individual user or group.
5+
A role gives a user access to resources within a workspace. Roles are additive, and can combine to configure a custom policy for a Team Member or a Group. A policy is at least one role plus one resource applied to an individual user or group.
66

77
## Global Roles
88

99
All Segment workspaces have the following roles, regardless of account type.
1010

11-
- **Workspace Owner**
12-
Owners have full read and edit access to everything in the workspace, including sources, destinations, add-on products, and settings. Owners have full edit access to all team permissions.
13-
14-
- **Workspace Member**
15-
Members inherit custom permissions based on [individual roles](#business-tier-roles) assigned.
16-
17-
- **Source admin**
18-
Source admins have edit access to assigned source(s), to the settings for that source, to any connected streaming destinations, schema, and live data from the source in the [debugger](/docs/connections/sources/debugger/). A user with the Source Admin role can be granted access to either all current and future Sources, or a specific list of Sources, or (if you are on a Business plan) to Sources with a specific Label.
19-
20-
- **Functions Admin**
21-
Functions admins can create, edit and delete access to assigned function(s). When you assign a user the Functions Admin role, you can grant them access to either _all current and future_ functions, or to a _specific list_ of functions.
22-
23-
- **Functions Read-only**
24-
The Functions read-only role grants users the ability to read an assigned function(s). When you assign a user the Functions Read-only role, you can grant them access to either _all current and future_ functions, or to a _specific list_ of functions.
25-
11+
Role | Details
12+
---- | ------
13+
Workspace Owner | Owners have full read and edit access to everything in the workspace, including sources, destinations, add-on products, and settings. Owners have full edit access to all team permissions.
14+
Workspace Member | Members inherit custom permissions based on [individual roles](#business-tier-roles) assigned.
15+
Source Admin | Source admins have edit access to:<br>- assigned source(s) <br>- the settings for that source <br>- any connected streaming destinations <br>- Schema <br>- live data from the source in the [debugger](/docs/connections/sources/debugger/) <br>- the source's [write key](/docs/connections/find-writekey/) <br><br>A user with the Source Admin role can get access to either all current and future sources, or a specific list of sources, or (if you're on a Business plan) to sources with a specific Label.
16+
Functions Admin | Functions admins can create, edit and delete access to assigned function(s). When you assign a user the Functions Admin role, you can grant them access to either _all current and future_ functions, or to a _specific list_ of functions.
17+
Functions Read-only | The Functions read-only role grants users the ability to read an assigned function(s). When you assign a user the Functions Read-only role, you can grant them access to either _all current and future_ functions, or to a _specific list_ of functions.
2618

2719
## Business Tier Roles
2820

2921
The following roles are only available to Segment Business Tier accounts.
3022

3123
#### Source Admin
32-
33-
Edit access to assigned source(s), source settings, connected streaming destinations, schema, transformations, and live data in the debugger.
34-
35-
**Scope:** Can be granted access to either: all current and future Sources, or only specific Sources, or Sources with a specific Label (BT only).
24+
* Edit access to assigned source(s), source settings, connected streaming destinations, schema, transformations, the source's [write key](/docs/connections/find-writekey/) and live data in the debugger.
25+
* **Scope:** Grants access to either: all current and future Sources, or only specific Sources, or Sources with a specific Label (BT only).
3626

3727
#### Source Read-only
38-
39-
Read access to assigned source(s), source settings, connected streaming destinations, schema, transformations, and live data in the debugger.
40-
41-
**Scope:** Can be granted access to either: all current and future Sources, or only specific Sources, or Sources with a specific Label (BT only).
28+
* Read access to assigned source(s), source settings, connected streaming destinations, schema, transformations, and live data in the debugger.
29+
* **Scope:** Grants access to either: all current and future Sources, or only specific Sources, or Sources with a specific Label (BT only).
4230

4331
#### Warehouse Admin
32+
* Edit access to all warehouses and warehouse settings.
33+
* **Scope:** Grants access to *all* warehouses.
4434

45-
Edit access to all warehouses and warehouse settings.
46-
47-
**Scope:** Grants access to **all** warehouses.
48-
49-
##### Warehouse Read-only
50-
51-
Read access to all warehouses and warehouse settings.
52-
53-
**Scope:** Grants access to **all** warehouses.
35+
#### Warehouse Read-only
36+
* Read access to all warehouses and warehouse settings.
37+
* **Scope:** Grants access to *all* warehouses.
5438

5539
#### Tracking Plan Admin
56-
57-
Edit access to all Tracking Plans in Protocols.
58-
59-
**Scope:** Grants access to **all** Tracking Plans.
40+
* Edit access to all Tracking Plans in Protocols.
41+
* **Scope:** Grants access to *all* Tracking Plans.
6042

6143
#### Tracking Plan Read-only
62-
63-
Read access to all Tracking Plans in Protocols.
64-
65-
**Scope:** Grants access to **all** Tracking Plans.
44+
* Read access to all Tracking Plans in Protocols.
45+
* **Scope:** Grants access to *all* Tracking Plans.
6646

6747
#### Personas Admin
68-
69-
Edit access to assigned Personas Space(s), including all audiences and computed traits. Personas admins can update settings from the Personas screens of the Segment App. For Personas Advanced customers, Personas Admins can create, edit, and delete Journeys.
70-
71-
**Scope:** Can be granted access to either: all current and future Spaces, or a specific list of Spaces, or Spaces with a specific Label (BT only).
48+
* Edit access to assigned Personas Space(s), including all audiences and computed traits. Personas admins can update settings from the Personas screens of the Segment App. For Personas Advanced customers, Personas Admins can create, edit, and delete Journeys.
49+
* **Scope:** Grants access to either: all current and future Spaces, or a specific list of Spaces, or Spaces with a specific Label (BT only).
7250

7351
#### Personas User
74-
Edit access to all traits and audiences within assigned Personas Space(s). Cannot change settings in Personas. For Personas Advanced customers, Personas Users can create, edit, and delete Journeys.
75-
76-
**Scope:** Can be granted access to either: all current and future Spaces, or a specific list of Spaces, or Spaces with a specific Label (BT only).
52+
* Edit access to all traits and audiences within assigned Personas Space(s). You can't change settings in Personas. For Personas Advanced customers, Personas Users can create, edit, and delete Journeys.
53+
* **Scope:** Grants access to either: all current and future Spaces, or a specific list of Spaces, or Spaces with a specific Label (BT only).
7754

7855
#### Personas Read-only
79-
Read-only access to assigned Personas Space(s), including all audiences and computed traits. For Personas Advanced customers, Personas Read-only users can view Journeys.
80-
81-
**Scope:** Can be granted access to either: all current and future Spaces, or a specific list of Spaces, or Spaces with a specific Label (BT only).
56+
* Read-only access to assigned Personas Space(s), including all audiences and computed traits. For Personas Advanced customers, Personas Read-only users can view Journeys.
57+
* **Scope:** Grants access to either: all current and future Spaces, or a specific list of Spaces, or Spaces with a specific Label (BT only).
8258

8359
#### Identity Admin
84-
85-
Edit access to Identity settings in Personas.
86-
87-
**Scope:** Grants access to **all** Identity settings.
60+
* Edit access to Identity settings in Personas.
61+
* **Scope:** Grants access to *all* Identity settings.
8862

8963
#### End User Privacy Admin
90-
91-
Edit access to [End User Privacy Settings](/docs/privacy/user-deletion-and-suppression). Includes access to Data Privacy Agreement, and user suppression and deletion workflows.
92-
93-
**Scope:** Grants access to only End User Privacy Settings in the App.
64+
* Edit access to [End User Privacy Settings](/docs/privacy/user-deletion-and-suppression). Includes access to Data Privacy Agreement, and user suppression and deletion workflows.
65+
* **Scope:** Grants access to only End User Privacy Settings in the App.
9466

9567
## PII Access
9668

97-
The Segment App does not show detected Personally Identifiable Information (PII) to workspace members if the information matches specific expected formats for PII. When PII Access is turned “off, detected PII is masked based on [red or yellow default matchers](/docs/privacy/portal/#default-pii-matchers) and any [custom matchers](/docs/privacy/portal/#custom-pii-matchers) defined in the Privacy Portal.
69+
The Segment App doesn't show detected Personally Identifiable Information (PII) to workspace members if the information matches specific expected formats for PII. When PII Access turns *off*, detected PII is masked based on [red or yellow default matchers](/docs/privacy/portal/#default-pii-matchers) and any [custom matchers](/docs/privacy/portal/#custom-pii-matchers) defined in the Privacy Portal.
9870

99-
Workspace Owners can grant specific individuals or groups access to PII from their Access Management settings. PII Access only applies to the resources a user or user group has access to; it does not expand a user's access beyond the original scope. All Workspace Owners have PII access by default.
71+
Workspace Owners can grant specific individuals or groups access to PII from their Access Management settings. PII Access only applies to the resources a user or user group has access to; it doesn't expand a user's access beyond the original scope. All Workspace Owners have PII access by default.
10072

10173

10274
## Roles for managing Personas destinations
10375

104-
Personas destinations are not included in the Personas roles by default. Users with Personas roles (including Personas Admin) need additional permissions for each Personas space they work with in order to manage that Personas space's destinations.
76+
Personas destinations aren't included in the Personas roles by default. Users with Personas roles (including the Personas Admin) need additional permissions for each Personas space they work with to manage that Personas space's destinations.
10577

10678
Grant these users `Source Admin` on the source named `Personas (personas space name)` to grant them access to the Personas destinations for that Personas space.
10779

10880
## Roles for connecting resources
10981

110-
To connect two resource instances, you must have access to both. This access can either be granted to all resources, or to the specific resources you want to connect.
82+
To connect two resource instances, you must have access to both. You can either grant this access to all resources, or to the specific resources you want to connect.
11183

11284
**To connect a source to warehouse** you must have `Source Admin` and `Warehouse Admin` access for the source and the warehouse.
11385

11486
**To connect source to tracking plan** requires `Source Admin` and `Tracking Plan Admin` access for the source and the tracking plan.
11587

116-
11788
## Roles for Protocols Transformations
11889

119-
To **view** transformations, you only need `Source Read-only`, either for all Sources or the specific Sources using Protocols.
90+
To **view** transformations, you need `Source Read-only`, either for all Sources or the specific Sources using Protocols.
12091

12192
To **create or edit** transformations you must have either `Source Admin` for all Sources, or for the specific Sources used with Protocols.

0 commit comments

Comments
 (0)