Access control and project roles
Home · Projects and workspace · Maintenance, support and FAQ
Goal
The Access control is the project‑level RBAC administration area. It allows you to decide:
- who can enter the project;
- what role each member receives;
- which custom roles exist in this project;
- what permissions those roles grant.
Why it matters
Rights condition a large part of the experience: agent execution, member management, deliverable generation, integration configuration, publication governance and audit reading. A correct reading of roles avoids confusing a functional block with a simple lack of authorization.
Who can use this page
- view members and roles: any member who can access the workspace;
- manage members: user with
members:manage; - manage custom roles: user with
roles:manage.
Project creator: initial role and delegation
At project creation, the creator starts with the Project Owner role and all observed project permissions. They therefore serve as the initial administrative point: they open the project, control the initial configuration and then delegate useful roles to other members.
Recommended delegation
- keep the creator as the initial administrative safeguard;
- assign a second Project Owner if the project should not depend on a single person;
- use Project Manager for daily steering;
- reserve custom roles for real need gaps;
- then check Governance policies and Project integrations so that rights match external usage.
What the observed documentation confirms
- the creator cannot be removed from this screen;
- the creator’s role remains fixed;
- a user cannot self‑downgrade or self‑remove from this surface;
- role delegation is confirmed;
- free transfer of the creator status is not confirmed by the observed screens.
Standard roles observed
Each project starts with protected built‑in roles:
| Role | Typical usage |
|---|---|
| Project Owner | Full project administration |
| Project Manager | Daily operational steering |
| Contributor | Content contribution, agent usage and deliverables according to permissions |
| Reader | Read‑only consultation |
| Auditor | Audit‑oriented consultation and traceability |
These built‑in roles are protected server‑side and cannot be deleted from the interface.
Quick matrix of standard roles
Custom roles can extend or reduce this scheme. The table below describes the usual behavior of the observed standard roles.
| Common action | Project Owner | Project Manager | Contributor | Reader | Auditor |
|---|---|---|---|---|---|
| Access project, workspace and read screens | Yes | Yes | Yes | Yes | Yes |
| Search knowledge, re‑read PM Documents and AI Log | Yes | Yes | Yes | Yes | Yes |
| Launch a run in Agents | Yes | Yes | Yes | Not by default | Not by default |
| Modify work contents and deliverable drafts | Yes | Yes | Yes | No | No |
| Manage members, roles and main project settings | Yes | No | No | No | No |
| Audit‑oriented review | Yes | Yes | Yes | General read | Yes |
Custom roles
The product supports creation, editing and deletion of custom roles at the project level.
Permissions explicitly observed
The exposed permissions include, notably:
project:readproject:updateagent:runagent:configuredocuments:readdocuments:uploaddocuments:deletereport:generatehistory:readmembers:readmembers:manageroles:managesettings:manage
Permission → concrete impact
| Permission | Affected surface | Symptom if missing |
|---|---|---|
agent:configure | Agent configuration tab in Workspace | page remains viewable or save controls are disabled |
report:generate | Creation of drafts, artifacts and PM Documents | user can read but not generate the expected deliverable |
history:read | AI Log and detailed run reading | traceability remains inaccessible or very limited |
settings:manage | project settings, governance and some integrations | settings visible but not modifiable |
members:manage | Members area in Access control | cannot add, remove or change a member |
roles:manage | custom roles and their permissions | cannot create, adjust or delete a custom role |
This table mainly serves to read the interface behavior correctly: an absent or greyed action often indicates a missing permission.

What you see on the page
The page is divided into two work areas:
- Roles and permissions
- review of built‑in roles;
- creation of custom roles;
- inspection or modification of a custom role’s permissions;
- Members
- add a member by email;
- assign an integrated or custom role;
- change a role;
- delete a member when allowed.
The page may also display your current identity and, when exposed, the protected entry of the creator of the project.
Recommended flow
Review roles before adding a member
- open Workspace;
- select the Access control tab;
- reread existing roles;
- check if a standard role suffices or if a custom role is needed.
Create a custom role
- open Roles and permissions;
- enter a name;
- optionally add a description;
- create the role;
- enable or disable the desired permissions;
- verify the badges or permissions displayed before real use.
Add or update a member
- open Members;
- enter the email;
- choose the desired role;
- save;
- verify that the member line reflects the expected role.
If the user belongs to another tenant, remember that an external / guest account must first be invited on the identity side before the project RBAC can assign a useful role.
Change a member’s role
- locate the member line in Members;
- use the role selector on that line;
- choose the new role;
- confirm that the line shows the updated role.
Remove a member
- locate the member to remove;
- use the delete action if available;
- confirm the member disappears from the list;
- if the action remains blocked, first check that it is not your own account or the protected creator entry.
Confirmed RBAC safeguards
The interface and platform services apply several important protections:
- you cannot delete your own access from this screen;
- you cannot modify your own role from this screen;
- the creator entry remains protected;
- a system role cannot be deleted;
- a custom role still assigned cannot be deleted;
- users without management rights see a viewable page with disabled controls.
Read‑only vs access denied
These two states do not mean the same thing:
- read‑only: the page remains visible, but add, edit or delete controls are disabled;
- access denied: the route or action is not available for your account.
In practice, this allows some profiles to review RBAC configuration without being able to modify it.
How to read a denial
| What you observe | Most likely reading | Recommended reflex |
|---|---|---|
| a visible but greyed control | surface exposed in read‑only | first check if your role includes the expected permission |
| an action missing while it exists for others | permission or role not granted | compare your standard or custom role with the expected action |
| a visible action but impossible despite the UI | server‑side RBAC safeguard or protection constraint | check if it is a system role, your own account or a protected entry |
What the creator delegates in practice
| Need | Role to assign first | Why |
|---|---|---|
| administrative continuity | Project Owner | avoid a single account concentrating all administration |
| daily steering | Project Manager | manage current work without opening full administration |
| content production and agent usage | Contributor | run agents and prepare deliverables |
| broad consultation | Reader | read‑only access without risk of modification |
| audit and traceability | Auditor | review history and evidence without acting on the project |
Common problems
Unable to delete a custom role
First check if this role is still assigned to a member. As long as it is used, deletion remains blocked.
Unable to modify my own role
This behavior is intentional to avoid accidental loss of access. Ask another project administrator to perform the change.
The tab is visible but everything is greyed
You are likely in read‑only on this surface. Verify if your role includes members:manage or roles:manage.
Tips
- use Project Owner only for real project administrators;
- keep custom roles targeted and limited to a specific need;
- review permissions before delegating member management;
- document custom roles in team practices to avoid duplicates.