Permissions Reference
Control access with roles and permissions
This guide provides a comprehensive reference for the permissions system in Aperture. It outlines all available permissions, the default roles, and which actions each permission allows.
Permissions by Domain
Aperture uses a permission-based system to control access to different features and functionality. Each domain groups related permissions and the resources they control.
Accounts Domain
Manages organization members, teams, and invitations.
| Permission | Description |
|---|---|
| Full control over organization members, teams, and team members | |
| Ability to invite new users to the organization |
App Domain
Manages web and native applications.
| Permission | Description |
|---|---|
| Full control over web and native applications | |
| Read-only access to applications |
Publishing Domain
Manages deployments, builds, and deployment timelines.
| Permission | Description |
|---|---|
| Control over deployment, builds, and deployment timeline |
Access Control Domain
Manages roles, permissions, and access control.
| Permission | Description |
|---|---|
| Control over role creation and assignment |
Organization Domain
Manages organization-level settings and billing.
| Permission | Description |
|---|---|
| Control over organization settings and configuration | |
| Control over organization billing and payment information |
Security & Monitoring Domain
Manages logs, analytics, API keys, and secrets.
| Permission | Description |
|---|---|
| Access to view audit logs and history | |
| Access to view application analytics | |
| Control over API keys for the organization | |
| Control over application secrets and environment variables |
Default Roles
The system comes with three default roles that are created for each organization. The table below shows which permissions are included in each role:
| Permission | Member | Admin | Owner |
|---|---|---|---|
Best Practices
-
Follow the Principle of Least Privilege Grant users only the permissions they need to perform their tasks, reducing security risks.
-
Use Custom Roles Create custom roles with specific permission sets for specialized user types and functions.
-
Audit Regularly Regularly review which users have which permissions and adjust as roles change or team members leave.
-
Separate Responsibilities Different roles should have different responsibilities to maintain security and accountability.