RBAC permissions, actions, and scopes
NOTE: Available in Grafana Enterprise and Grafana Cloud.
A permission is comprised of an action and a scope. When creating a custom role, consider the actions the user can perform and the resource(s) on which they can perform those actions.
To learn more about the Grafana resources to which you can apply RBAC, refer to Resources with RBAC permissions.
-
Action: An action describes what tasks a user can perform on a resource.
-
Scope: A scope describes where an action can be performed, such as reading a specific user profile. In this example, a permission is associated with the scope
users:<userId>
to the relevant role.
Action definitions
The following list contains role-based access control actions.
Action | Applicable scope | Description |
---|---|---|
|
|
Read alerts and silences in data sources that support alerting. |
|
|
Manage alerts and silences in data sources that support alerting. |
|
n/a |
Create silences in the current organization. |
|
n/a |
Read alerts and silences in the current organization. |
|
n/a |
Update and expire silences in the current organization. |
|
|
Read templates, contact points, notification policies, and mute timings in data sources that support alerting. |
|
|
Manage templates, contact points, notification policies, and mute timings in data sources that support alerting. |
|
n/a |
Manage templates, contact points, notification policies, and mute timings in the current organization. |
|
n/a |
Read all templates, contact points, notification policies, and mute timings in the current organization. |
|
|
Read alert rules in data sources that support alerting (Prometheus, Mimir, and Loki) |
|
|
Create, update, and delete alert rules in data sources that support alerting (Mimir and Loki). |
|
|
Create Grafana alert rules in a folder and its subfolders. Combine this permission with |
|
|
Delete Grafana alert rules in a folder and its subfolders. Combine this permission with |
|
|
Read Grafana alert rules in a folder and its subfolders. Combine this permission with |
|
|
Update Grafana alert rules in a folder and its subfolders. Combine this permission with |
|
n/a |
Read all Grafana alert rules, notification policies, etc via provisioning API. Permissions to folders and datasource are not required. |
|
n/a |
Same as |
|
n/a |
Update all Grafana alert rules, notification policies, etc via provisioning API. Permissions to folders and datasource are not required. |
|
|
Create annotations. |
|
|
Delete annotations. |
|
|
Read annotations and annotation tags. |
|
|
Update annotations. |
|
n/a |
Create API keys. |
|
|
Read API keys. |
|
|
Delete API keys. |
|
|
Create dashboards in one or more folders and their subfolders. |
|
|
Delete one or more dashboards. |
|
n/a |
Read dashboard insights data and see presence indicators. |
|
|
Read permissions for one or more dashboards. |
|
|
Update permissions for one or more dashboards. |
|
|
Read one or more dashboards. |
|
|
Update one or more dashboards. |
|
|
Write public dashboard configuration. |
|
|
Read data source query caching settings. |
|
|
Update data source query caching settings. |
|
n/a |
Create data sources. |
|
|
Delete data sources. |
|
n/a |
Enable access to the Explore tab. |
|
|
Read data source IDs. |
|
n/a |
Read data sources insights data. |
|
|
List data source permissions. |
|
|
Update data source permissions. |
|
|
Query data sources. |
|
|
List data sources. |
|
|
Update data sources. |
|
n/a |
Read feature toggles. |
|
n/a |
Write feature toggles. |
|
|
Read permissions for one or more folders and their subfolders. |
|
|
Update permissions for one or more folders and their subfolders. |
|
n/a |
Create folders in the root level. If granted together with |
|
|
Delete one or more folders and their subfolders. |
|
|
Read one or more folders and their subfolders. |
|
|
Update one or more folders and their subfolders. If granted together with |
|
n/a |
Reload the LDAP configuration. |
|
n/a |
Verify the availability of the LDAP server or servers. |
|
n/a |
Read users via LDAP. |
|
n/a |
Sync users via LDAP. |
|
|
Create a library panel in one or more folders and their subfolders. |
|
|
Read one or more library panels. |
|
|
Update one or more library panels. |
|
|
Delete one or more library panels. |
|
n/a |
Get custom permission reports. |
|
n/a |
Delete the license token. |
|
n/a |
Read licensing information. |
|
n/a |
Update the license token. |
|
|
Update the organization role ( |
|
|
Add a user to an organization or invite a new user to an organization. |
|
|
Get user profiles within an organization. |
|
|
Remove a user from an organization. |
|
n/a |
Read organization preferences. |
|
n/a |
Update organization preferences. |
|
n/a |
Read organization quotas. |
|
n/a |
Update organization quotas. |
|
n/a |
Create an organization. |
|
n/a |
Delete one or more organizations. |
|
n/a |
Read one or more organizations. |
|
n/a |
Update one or more organizations. |
|
|
Access one or more application plugins (still enforcing the organization role) |
|
n/a |
Install and uninstall plugins. |
|
|
Edit settings for one or more plugins. |
|
|
Reload provisioning files. To find the exact scope for specific provisioner, see Scope definitions. |
|
n/a |
Create reports. |
|
|
Update reports. |
|
n/a |
Read report settings. |
|
n/a |
Update report settings. |
|
|
Delete reports. |
|
|
List all available reports or get a specific report. |
|
|
Send a report email. |
|
|
Delete a custom role. |
|
|
List roles and read a specific with its permissions. |
|
|
Create or update a custom role. |
|
|
Reset basic roles to their default permissions. |
|
n/a |
Read Grafana instance statistics. |
|
n/a |
View usage statistics report. |
|
|
Create Grafana service accounts. |
|
n/a |
Update Grafana service accounts. |
|
|
Delete Grafana service accounts. |
|
|
Read Grafana service accounts. |
|
|
Update Grafana service account permissions to control who can do what with the service account. |
|
|
Read Grafana service account permissions to see who can do what with the service account. |
|
|
Read the Grafana configuration settings |
|
|
Update any Grafana configuration settings that can be updated at runtime. |
|
n/a |
Create support bundles. |
|
n/a |
Delete support bundles. |
|
n/a |
List and download support bundles. |
|
|
Get access-control enabled status. |
|
|
Read members and Team Sync setup for teams. |
|
|
Add, remove and update members and manage Team Sync setup for teams. |
|
|
Assign a role to a team. |
|
|
List roles assigned directly to a team. |
|
|
Unassign a role from a team. |
|
n/a |
Create teams. |
|
|
Delete one or more teams. |
|
|
Read one or more teams and team preferences. |
|
|
Update one or more teams and team preferences. |
|
|
List authentication tokens that are assigned to a user. |
|
|
Update authentication tokens that are assigned to a user. |
|
|
Update a user’s password. |
|
|
List permissions of a user. |
|
|
Update a user’s organization-level permissions. |
|
|
List a user’s quotas. |
|
|
Update a user’s quotas. |
|
|
Assign a role to a user or a service account. |
|
|
List roles assigned directly to a user or a service account. |
|
|
Unassign a role from a user or a service account. |
|
n/a |
Create a user. |
|
|
Delete a user. |
|
|
Disable a user. |
|
|
Enable a user. |
|
|
Sign out a user. |
|
|
Read or search user profiles. |
|
|
Update a user’s profile. |
Grafana OnCall action definitions (beta)
Note: Available from Grafana 9.4 in early access.
Note: This feature is behind the
accessControlOnCall
feature toggle. You can enable feature toggles through configuration file or environment variables. See configuration docs for details.
The following list contains role-based access control actions used by Grafana OnCall application plugin.
Action | Applicable scope | Description |
---|---|---|
|
n/a |
Read OnCall alert groups. |
|
n/a |
Create, edit and delete OnCall alert groups. |
|
n/a |
Read OnCall integrations. |
|
n/a |
Create, edit and delete OnCall integrations. |
|
n/a |
Test OnCall integrations. |
|
n/a |
Read OnCall escalation chains. |
|
n/a |
Create, edit and delete OnCall escalation chains. |
|
n/a |
Read OnCall schedules. |
|
n/a |
Create, edit and delete OnCall schedules. |
|
n/a |
Export OnCall schedules. |
|
n/a |
Read OnCall ChatOps. |
|
n/a |
Edit OnCall ChatOps. |
|
n/a |
Edit OnCall ChatOps settings. |
|
n/a |
Read OnCall maintenance. |
|
n/a |
Edit OnCall maintenance. |
|
n/a |
Read OnCall API keys. |
|
n/a |
Create, edit and delete OnCall API keys. |
|
n/a |
Receive OnCall notifications. |
|
n/a |
Read OnCall notification settings. |
|
n/a |
Edit OnCall notification settings. |
|
n/a |
Read user’s own OnCall user settings. |
|
n/a |
Edit user’s own OnCall user settings. |
|
n/a |
Read and edit all users’ OnCall user settings. |
|
n/a |
Read OnCall settings. |
|
n/a |
Edit OnCall settings. |
Scope definitions
The following list contains role-based access control scopes.
Scopes | Descriptions |
---|---|
|
Restrict an action to a set of annotations. For example, |
|
Restrict an action to a set of API keys. For example, |
|
Restrict an action to a set of dashboards. For example, |
|
Restrict an action to a set of data sources. For example, |
|
Restrict an action to a set of folders. For example, |
|
Restrict an action to a set of global users. For example, |
|
Restrict an action to a set of library panels. For example, |
|
Restrict an action to a set of organizations. For example, |
|
The scope is only applicable for roles associated with the Access Control itself and indicates that you can delegate your permissions only, or a subset of it, by creating a new role or making an assignment. |
|
The scope is required to trigger the reset of basic roles permissions. It indicates that users might acquire additional permissions they did not previously have. |
|
Restrict an action to a set of plugins. For example, |
|
Restrict an action to a set of provisioners. For example, |
|
Restrict an action to a set of reports. For example, |
|
Restrict an action to a set of roles. For example, |
|
Restrict an action to target only the role-based access control service. You can use this in conjunction with the |
|
Restrict an action to a set of service account from an organization. For example, |
|
Restrict an action to a subset of settings. For example, |
|
Restrict an action to a set of teams from an organization. For example, |
|
Restrict an action to a set of users from an organization. For example, |
|
|