RBAC role definitions
NOTE: Available in Grafana Enterprise and Grafana Cloud.
The following tables list permissions associated with basic and fixed roles.
Basic role assignments
Basic role | Associated fixed roles | Description |
---|---|---|
Grafana Admin |
|
Default Grafana server administrator assignments. |
Admin |
|
Default Grafana organization administrator assignments. |
Editor |
|
Default Editor assignments. |
Viewer |
|
Default Viewer assignments. |
No Basic Role |
Default No Basic Role |
Fixed role definitions
Fixed role | Permissions | Description |
---|---|---|
|
All permissions from |
Create, update and expire all silences in the organization produced by Grafana, Mimir, and Loki.* |
|
|
Read all alerts and silences in the organization produced by Grafana Alerts and Mimir and Loki alerts and silences.* |
|
All permissions from |
Create, update, and delete contact points, templates, mute timings and notification policies for Grafana and external Alertmanager.* |
|
|
Read all Grafana and Alertmanager contact points, templates, and notification policies.* |
|
All permissions from |
Create, update, and delete all* Grafana, Mimir, and Loki alert rules.* |
|
|
Read all* Grafana, Mimir, and Loki alert rules.* |
|
All permissions from |
Create, update, and delete Grafana, Mimir, Loki and Alertmanager alert rules*, silences, contact points, templates, mute timings, and notification policies.* |
|
All permissions from |
Read-only permissions for all Grafana, Mimir, Loki and Alertmanager alert rules*, alerts, contact points, and notification policies.* |
|
|
Read-only permissions for Provisioning API and let export resources with decrypted secrets * |
|
|
Create, update and delete Grafana alert rules, notification policies, contact points, templates, etc via provisioning API. * |
|
|
Create, update and delete dashboard annotations and annotation tags. |
|
|
Read all annotations and annotation tags. |
|
All permissions from |
Read, create, update and delete all annotations and annotation tags. |
|
|
Read all api keys. |
|
All permissions from |
Read, create, delete all api keys. |
|
|
Read and update authentication and SAML settings. |
|
|
Create dashboards. |
|
|
Read dashboard insights data and see presence indicators. |
|
|
Read all dashboard permissions. |
|
All permissions from |
Read and update all dashboard permissions. |
|
|
Create, update, delete or pause a public dashboard. |
|
|
Read all dashboards. |
|
All permissions from |
Read, create, update, and delete all dashboards. |
|
|
Read data source query caching settings. |
|
|
Enable, disable, or update query caching settings. |
|
|
Enable the Explore feature. Data source permissions still apply, you can only query data sources for which you have query permissions. |
|
|
Read the ID of a data source based on its name. |
|
|
Read data source insights data. |
|
|
Read data source permissions. |
|
All permissions from |
Create, read, or delete permissions of a data source. |
|
|
Create data sources. |
|
|
Read and query data sources. |
|
All permissions from |
Read, query, create, delete, or update a data source. |
|
|
Read all folder permissions. |
|
All permissions from |
Read and update all folder permissions. |
|
|
Create folders in the root level. If granted together with |
|
|
Read all folders and dashboards. |
|
All permissions from |
Read, create, update, and delete all folders and dashboards. If granted together with |
|
|
Read the LDAP configuration and LDAP status information. |
|
All permissions from |
Read and update the LDAP configuration, and read LDAP status information. |
|
|
Create library panel at the root level. |
|
|
Read all library panels. |
|
|
Read all library panels at the root level. |
|
All permissions from |
Create, read, write or delete all library panels and their permissions. |
|
All permissions from |
Create, read, write or delete all library panels and their permissions at the root level. |
|
|
Read licensing information and licensing reports. |
|
All permissions from |
Read licensing information and licensing reports, update and delete the license token. |
|
|
Read users within a single organization. |
|
All permissions from |
Within a single organization, add a user, invite a new user, read information about a user and their role, remove a user from that organization, or change the role of a user. |
|
All permissions from |
Create, read, write, or delete an organization. Read or write its quotas. This role needs to be assigned globally. |
|
|
Read an organization and its quotas. |
|
All permissions from |
Read an organization, its quotas, or its preferences. Update organization properties, or its preferences. |
|
|
Access application plugins (still enforcing the organization role). |
|
|
Install and uninstall plugins. Needs to be assigned globally. |
|
|
Enable and disable plugins and edit plugins’ settings. |
|
|
Reload provisioning. |
|
|
Read all reports and shared report settings. |
|
All permissions from |
Create, read, update, or delete all reports and shared report settings. |
|
|
Read all access control roles, roles and permissions assigned to users, teams. |
|
All permissions from |
Create, read, update, or delete all roles, assign or unassign roles to users, teams. |
|
|
Reset basic roles to their default. |
|
|
Read Grafana service accounts. |
|
|
Create Grafana service accounts. |
|
|
Create, update, read and delete all Grafana service accounts and manage service account permissions. |
|
|
Read Grafana instance settings. |
|
All permissions from |
Read and update Grafana instance settings. |
|
|
Read Grafana instance statistics. |
|
|
List all teams. |
|
|
Create a team and list organization users (required to manage the created team). |
|
|
Create, read, update and delete teams and manage team memberships. |
|
|
Read all users and their information, such as team memberships, authentication tokens, and quotas. |
`fixed:users:writer` |
All permissions from+ |
Alerting roles
If alerting is enabled, you can use predefined roles to manage user access to alert rules, alert instances, and alert notification settings and create custom roles to limit user access to alert rules in a folder.
Access to Grafana alert rules is an intersection of many permissions:
-
Permission to read a folder. For example, the fixed role
fixed:folders:reader
includes the actionfolders:read
and a folder scopefolders:id:
. -
Permission to query all data sources that a given alert rule uses. If a user cannot query a given data source, they cannot see any alert rules that query that data source.
There is only one exclusion at this moment. Role fixed:alerting.provisioning:writer
does not require user to have any additional permissions and provides access to all aspects of the alerting configuration via special provisioning API.
For more information about the permissions required to access alert rules, refer to Create a custom role to access alerts in a folder.
Grafana OnCall roles (beta)
NOTE: Available from Grafana 9.4 in early access.
NOTE: This feature is behind the
accessControlOnCall
feature toggle. You can enable feature toggles through configuration file or environment variables. See configuration docs for details.
If you are using Grafana OnCall, you can try out the integration between Grafana OnCall and RBAC. For a detailed list of the available OnCall RBAC roles, refer to the table in Available Grafana OnCall RBAC roles and granted actions.
The following table lists the default RBAC OnCall role assignments to the basic roles:
Basic role | Associated fixed roles | Description |
---|---|---|
Grafana Admin |
|
Default Grafana server administrator assignments. |
Admin |
|
Default Grafana organization administrator assignments. |
Editor |
|
Default Editor assignments. |
Viewer |
|
Default Viewer assignments. |