User role permissions by use case Innovation Release

Authorization of these user roles follows a role-based access control (RBAC) model with the restrictions applying to a specific scopeeither within one project or within one account.

The following list doesn't cover Postgres cluster database authorization.

Currently, you can't create custom roles. Only these 13 predefined roles are available.

PermissionsOrganization AdministratorOrganization OwnerPlatform AdminAI Model ManagerProject OwnerProject EditorProject ViewerEstate IngesterPipeline EditorCatalog Data readerCatalog Data writerMigration Portal Projects OwnerMigration Portal Projects EditorMigration Portal Projects Viewer
Access Ops apps (launchpad)X
View projects within the orgXX
Update and delete projectsX
View roles assigned at the project levelXXXX
View activity log for the orgXX
View and download usage report for the projectXXX
View and download usage report for the orgXX
Create projects within the orgX
Assign project rolesXX
Create, edit, and delete clustersXX
View clusters, backups, estates, and migrationsXXX
Assign org rolesX
View org-scope role mapping rulesXX
Create, update, and delete org-scope role mapping rulesX
View project-scope role mapping rulesXXXXX
Create, update, and delete project-scope role mapping rulesXX
View activity log for the projectXXX
View, edit, and delete owned projectsX
Ingest self-managed Postgres cluster dataX*
Manage AI models and inference servicesX
Create, read, update, delete, and execute pipelinesX
View pipelinesXX
View published and deployed flowsXXX
Create and update published and deployed flowsXX
Delete deployed flowsX
Delete published flowsX
Create, update, and delete catalogXX
Read catalogX
Read Iceberg dataXX
Write and delete Iceberg dataX
View Migration Portal projectsXXX
View and update Migration Portal projectsXX
View, update, create, and delete Migration Portal projectsX

* Only machine-users can be assigned to ingest self-managed cluster data.

In addition to manual role assignment, you can use role mapping to automatically assign roles based on identity provider attributes.