Skip to content

Latest commit

 

History

History

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 

README.md

User Management

The User management page in FinOps for Cloud displays a list of existing members within your organization. For each member, you can view details, such as their name, unique ID, last login time, email address, and assigned roles.

From this page, Organization Managers can also invite new members or remove existing members from the organization.

Role overview

In FinOps for Cloud, roles can be assigned when inviting a user to the organization.

By default, the Member role is assigned to allow the individual to have read-only access. You can select other roles and assign them at the pool level. When assigning roles, we recommend assigning the Organization Manager role only to those individuals who need the highest level of access and permission to perform actions without any restrictions.

The following table lists the roles in FinOps for Cloud. These roles cannot be edited, and you cannot create new ones.

RoleDescription
MemberThe Member role is assigned by default to all users. Members have read-only access across the platform and can view dashboards, resources, pools, policies, recommendations, and analysis features. They can also download reports and exports where supported. Members cannot make any modifications to the platform.
EngineerThe Engineer role is assigned at the resource level. Engineers can view the entire platform. This includes pool structures, recommendations, and analysis views, but their editing capabilities are limited to the specific resources they are responsible for. All other areas are available in read-only mode.
ManagerThe Manager role is assigned at the pool level. Managers can administer the pools they have been assigned to, including creating and deleting sub-pools, configuring assignment rules, and re-applying resource assignment rules. This permission cascades downward: a Manager assigned to a pool automatically has the same management permissions over all child pools beneath it, at every level of nesting. Areas of the platform outside their assigned pools are available in read-only mode.
Organization ManagerThe Organization Manager has full administrative control over the entire FinOps for Cloud environment. This role can invite and remove users, manage all pools and sub-pools across the organization, configure all policy types (anomaly detection, quotas and budgets, and tagging policies), and fully manage data sources. Organization Managers also have unrestricted access to all analysis, reporting, and configuration features. This role should be assigned only to individuals who require the highest level of access.

Which role should I assign?

The right role depends on what a person needs to do in the platform. The table below maps each role to the kinds of team members most likely to need it, using the FinOps Foundation's standard personas as a reference point. In practice, one person may fulfil multiple personas, and not every organization will have all of these roles.

Platform roleLikely personasAssign this role to people who...
MemberFinance, Product, Procurement, Leadership, ITAM, SustainabilityNeed visibility into cloud spend and usage to inform decisions, reporting, or governance, but have no need to make changes in the platform. A good default for anyone who needs to stay informed without being given edit access.
EngineerEngineeringBuild and operate the cloud infrastructure that generates the costs. They need visibility into recommendations and resource data to act on optimization opportunities, but their changes are scoped to the resources they own.
ManagerFinOps Practitioner, Finance, ITFMOwn cost accountability for a specific business unit, team, or project. They manage a defined pool of cloud spend and need to act on it, creating sub-pools, assigning resources, and responding to budget alerts, but don't need organization-wide control.
Organization ManagerFinOps Practitioner, LeadershipLead the FinOps practice, own the platform configuration, and need unrestricted access to manage users, data sources, policies, and all pools across the organization. Typically, one or two people.

A few practical guidelines for Organization Managers assigning roles:

  • Default to Member for anyone whose primary need is visibility or reporting. It is easy to upgrade later.
  • Assign Manager at the right pool level. A Manager assigned to a top-level pool inherits access to all child pools beneath it, so take care when assigning to high-level pools.
  • Limit Organization Manager access. This role has no restrictions. It can delete objects, disconnect data sources, and modify all policies. Assign it only to those who genuinely need full administrative control.

Permissions reference

Legend

Allowed

— Not allowed

Home

Feature / PermissionMemberEngineerManagerOrganization Manager
View organization overview

Recommendations

Feature / PermissionMemberEngineerManagerOrganization Manager
Overview
View recommendations
Filter recommendations
Change view (cards / table)
Search recommendations
View recommendations archive
Run recommendations check
Download script
Download xlsx/json
Recommendation
View recommendation settings
Edit recommendation settings
View excluded pools
Edit excluded pools
Pin recommendations
Dismiss recommendation

Resources

Feature / PermissionMemberEngineerManagerOrganization Manager
Overview
View resources
Filter resources
View saved perspective (view)
Create saved perspective (view)
Export expenses chart
Download xlsx/json
Resource
View resource details
Add assignment rule 1

Pools

Feature / PermissionMemberEngineerManagerOrganization Manager
Overview
View pools
Add / edit / delete pool 1
Assignment rules
View assignment rules
Search assignment rules
Add / edit / delete assignment rule 1
Reorder assignment rules
Re-apply assignment rules 1

FinOps

Feature / PermissionMemberEngineerManagerOrganization Manager
Cost Explorer
View cost explorer
Filter cost explorer
Download PDF
View expense breakdowns
Cost Map
View map
Filter map

Policies

Feature / PermissionMemberEngineerManagerOrganization Manager
Anomaly detection
View anomaly detections
Add / edit / delete anomaly detection
View anomaly detection details
View anomaly detection resources
Export anomaly detection chart
Quotas and Budgets
View quota or budget
Add / edit / delete quota or budget
View quota or budget resources
Tagging policies
View tagging policy
Add / edit / delete tagging policy
View tagging policy resources

System

Feature / PermissionMemberEngineerManagerOrganization Manager
User management
Invite users
Download xlsx/json
View last login date and time
Delete users
Data sources
View data sources
Add data source
Rename data source
Update data source credentials
Perform billing re-import 2
Disconnect data source
Events
View events
Filter and search events
Settings
View organization details
View and accept invitations
Manage email notifications 3

1 Managers are limited to pools and sub-pools they have been assigned to. This applies to all child pools beneath an assigned pool, at every level of nesting.

2 Supported for all AWS accounts and GCP projects. For Azure, billing re-import is supported at the subscription level only. It cannot be performed on an Azure tenant, even if that tenant's subscriptions were automatically discovered.

3 Members and Engineers have access to a reduced subset of notifications. See the Notifications Reference table below.

Notifications reference

NotificationMemberEngineerManagerOrganization Manager
FinOps
Weekly expense report
Pool limit exceed alert
Pool limit alert
Saving spike
Policy alerts
Resource constraints report
Resource constraint violation alert
Anomaly detection
Expiring budget policy violation
Quota policy violation
Recurring budget policy violation
Tagging policy violation
Recommendations
New security recommendation detection
System notifications
Environment changed
Expenses initial processing completed
Report import failed
Account management
Invitation notification