Skip to main content
Flashduty uses two types of permissions: functional permissions and data permissions, which work together in different feature scenarios.
You must have both functional permissions and data permissions to operate on certain data objects. Functional permissions are a prerequisite, determining whether you can perform a certain type of operation; data permissions further define the scope of data you can operate on.

Functional Permissions

Functional permissions, also known as operational permissions, determine which system features or operations a user can access. This includes: whether APIs can be called, whether buttons are clickable, and whether pages and menus are visible.
Flashduty controls functional permissions based on roles (RBAC), with permissions divided by modules for fine-grained management. The system provides the following preset roles (you can also create custom roles):

Preset Roles

Has all permissions. Suitable for core members who need complete management capabilities.
Has all permissions except “Payment Center”, “Members Manage”, “Roles Manage”, and “SSO Manage”. Suitable for members handling daily operations work.
Has most read-only permissions except “Audit” and “Onboarding”. Suitable for members who only need to view data.
The Responder role does not include member management and role management permissions. To manage team members or assign roles, use the Admin role.

Permission List

The system divides permissions by modules, with each permission point having Read and Manage types.
PermissionTypeDescription
Members ManageManageInvite and remove members, grant and revoke member roles
Roles ManageManageCreate, edit and delete roles, manage permissions within a role
Teams ManageManageCreate, edit and delete teams, manage team members
SSO ReadReadView single sign-on configuration information
SSO ManageManageEnable or disable single sign-on and modify its configuration
Audit ReadReadRetrieve and read operation audit logs
API Keys ReadReadView account API keys
API Keys ManageManageCreate, view, modify and delete account API keys

Permission Matrix

Permission ModuleAdminResponderViewer
Members Manage✔️
Roles Manage✔️
Teams Manage✔️✔️
SSO✔️Read
Audit✔️✔️
API Keys✔️✔️
Payment✔️Read
Channels✔️✔️Read
Incidents✔️✔️Read
Integrations✔️✔️Read
Analytics✔️✔️Read
Configuration (Custom Fields, Schedules, Calendars, Templates, Mappings)✔️✔️Read
Status Pages✔️✔️Read
Monitors (Overview, Alerting Rules, Rule Repository, Node Permissions, Datasources, Alerting Engines)✔️✔️Read
RUM (Applications, Performance, Error Tracking, Session Explorer, Session Replay)✔️✔️Read
Onboarding✔️✔️

Data Permissions

Data permissions, also known as access permissions, control the scope of data a user can access or view.
Functional permissions are a prerequisite for data permissions. You must first have the corresponding functional permissions for data permissions to take effect. For example: a member with the Viewer role belongs to Team A, and a channel belongs to Team A and is set to private. Although the member has data permissions to access this channel, since Viewer does not have channel management functional permissions, they can only view but not edit.
Flashduty controls data permissions based on teams, applied in the following scenarios:
ScenarioPermission Description
Team ManagementCreator, owner account, and team members can modify team information and manage team members
ChannelsCreator, owner account, and responsible team members can modify channel basic information, noise reduction configuration, escalation rules, etc.
Schedule ManagementCreator, owner account, and responsible team members can modify schedule basic information, rotation rules, etc.
Template ManagementCreator, owner account, and responsible team members can modify template basic information, channel template configurations, etc.
Service CalendarCreator, owner account, and responsible team members can modify calendar basic information, holiday settings, etc.
Integration ManagementCreator, owner account, and responsible team members can manage integration configurations
Mapping RulesCreator, owner account, and responsible team members can manage mapping rule configurations
When you don’t have data permissions for a resource, the system will display the following message:
Insufficient Permission Prompt

Legacy Role Migration

The following legacy preset roles were deprecated on January 30, 2026, and the system has automatically completed the migration.

Legacy Role Description

RoleDescription
Account.AdminAccount Administrator, originally had all operational permissions
Fin.AdminFinancial Administrator, originally had payment center ordering permissions
Tech.AdminTechnical Administrator, originally had access control and audit permissions (including member management)

Migration Mapping

Original RoleNew RoleDescription
Account.AdminAdminPermissions unchanged
Fin.AdminAdminPermissions elevated
Tech.AdminResponderMember management permissions removed
No roleResponderAutomatically granted
Custom roleUnchangedMay lose some Monitors permissions, please check

Compatibility Notes

The following scenarios will automatically grant the Viewer role to ensure members have basic access permissions:
Compatibility period ends: June 30, 2026After this date, API requests without specifying a role will return an error. Please complete the adaptation in advance.
Users with custom roles should check their permission configuration after the upgrade to ensure it meets expectations.