Functional Permissions
Functional permissions, also known as operational permissions, determine which system features or operations a user can access. This includes: whether APIs can be called, whether buttons are clickable, and whether pages and menus are visible.
Preset Roles
Admin
Admin
Has all permissions. Suitable for core members who need complete management capabilities.
Responder
Responder
Has all permissions except “Payment Center”, “Members Manage”, “Roles Manage”, and “SSO Manage”. Suitable for members handling daily operations work.
Viewer
Viewer
Has most read-only permissions except “Audit” and “Onboarding”. Suitable for members who only need to view data.
Permission List
The system divides permissions by product scope, with each permission point having Read and Manage types. Permissions are grouped and displayed under the following product scopes, each with a corresponding icon:- Platform: Organization management, payment center, and other foundational platform permissions
- On-call: Incident response, configuration management, status pages, and other on-call related permissions
- RUM: Frontend monitoring related permissions
- Monitors: Monitoring and alerting related permissions
When a permission point has both Read and Manage types, granting Manage permission automatically includes the corresponding Read permission — no need to select it separately.
- Organization
- Payment
- Incident Response
- Configuration
- Status Pages
- Monitors
- RUM
- Other
| Permission | Type | Description |
|---|---|---|
| Members Manage | Manage | Invite and remove members, grant and revoke member roles |
| Roles Manage | Manage | Create, edit and delete roles, manage permissions within a role |
| Teams Manage | Manage | Create, edit and delete teams, manage team members |
| SSO Read | Read | View single sign-on configuration information |
| SSO Manage | Manage | Enable or disable single sign-on and modify its configuration |
| Audit Read | Read | Retrieve and read operation audit logs |
| API Keys Read | Read | View account API keys |
| API Keys Manage | Manage | Create, view, modify and delete account API keys |
Custom Roles
In addition to preset roles, you can create custom roles for more granular permission control. Configuration path: Platform Management → Role ManagementCreate Role
Go to the role management page and click Create Role, then fill in the role name and description. You can also quickly create a role by copying an existing one.
Edit Role Information
On the role detail page, click the edit icon (pen icon) next to the role name or description to edit them inline. Changes are saved automatically.
Configure Permissions
On the role detail page under the Permission List tab, click Edit to enter editing mode. In editing mode, you can batch select to grant or revoke multiple permission points at once, then click Save when done.
- System preset roles (Admin, Responder, Viewer) cannot be modified or deleted
- Custom roles support editing, copying, enabling/disabling, and deletion
- A member can hold multiple roles simultaneously; their effective permissions are the union of all assigned roles
Permission Matrix
| Permission Module | Admin | Responder | Viewer |
|---|---|---|---|
| Members Manage | ✔️ | ||
| Roles Manage | ✔️ | ||
| Teams Manage | ✔️ | ✔️ | |
| SSO | ✔️ | Read | |
| Audit | ✔️ | ✔️ | |
| API Keys | ✔️ | ✔️ | |
| Payment | ✔️ | Read | |
| Channels | ✔️ | ✔️ | Read |
| Incidents | ✔️ | ✔️ | Read |
| Integrations | ✔️ | ✔️ | Read |
| Analytics | ✔️ | ✔️ | Read |
| Configuration (Custom Fields, Schedules, Calendars, Templates, Mappings) | ✔️ | ✔️ | Read |
| Status Pages | ✔️ | ✔️ | Read |
| Monitors (Overview, Alerting Rules, Rule Repository, Node Permissions, Datasources, Alerting Engines) | ✔️ | ✔️ | Read |
| RUM (Applications, Performance, Error Tracking, Session Explorer, Session Replay) | ✔️ | ✔️ | Read |
| Onboarding | ✔️ | ✔️ |
Data Permissions
Data permissions, also known as access permissions, control the scope of data a user can access or view.
| Scenario | Permission Description |
|---|---|
| Team Management | Creator, owner account, and team members can modify team information and manage team members |
| Channels | Creator, owner account, and responsible team members can modify channel basic information, noise reduction configuration, escalation rules, etc. |
| Schedule Management | Creator, owner account, and responsible team members can modify schedule basic information, rotation rules, etc. |
| Template Management | Creator, owner account, and responsible team members can modify template basic information, channel template configurations, etc. |
| Service Calendar | Creator, owner account, and responsible team members can modify calendar basic information, holiday settings, etc. |
| Integration Management | Creator, owner account, and responsible team members can manage integration configurations |
| Mapping Rules | Creator, owner account, and responsible team members can manage mapping rule configurations |

Legacy Role Migration
Legacy Role Description
| Role | Description |
|---|---|
Account.Admin | Account Administrator, originally had all operational permissions |
Fin.Admin | Financial Administrator, originally had payment center ordering permissions |
Tech.Admin | Technical Administrator, originally had access control and audit permissions (including member management) |
Migration Mapping
| Original Role | New Role | Description |
|---|---|---|
Account.Admin | Admin | Permissions unchanged |
Fin.Admin | Admin | Permissions elevated |
Tech.Admin | Responder | Member management permissions removed |
| No role | Responder | Automatically granted |
| Custom role | Unchanged | May lose some Monitors permissions, please check |
Compatibility Notes
The following scenarios will automatically grant the Viewer role to ensure members have basic access permissions:- When inviting new members via Open API without specifying a role
- When automatically creating members through Single Sign-On (SSO) without specifying a role
Related Topics
Team Management
Learn about team and member management
Single Sign-On
Configure SSO for unified identity authentication