Introducing RBAC for Synthetic Monitoring (Private Preview)
We’re excited to announce that Role-Based Access Control (RBAC) for Synthetic Monitoring is now available in private preview! This gives you the ability to fine-tune access and permissions within Synthetic Monitoring, offering greater control over who can access specific features.
With RBAC, you can assign different roles and permissions to users and teams, ensuring the right people have the right access. This makes managing your monitoring workflows more secure and flexible.
How it Works
To assign roles and permissions to a user or team, simply follow the steps outlined in our guide for Assigning RBAC Roles. Here’s a quick example of how you can elevate a user’s permissions:
1. Assigning a Checks Writer Role:
From the Users and Access menu, we’re adding the Checks Writer role to the user checkswriter
, who already has the Viewer role.

2. User Permissions in Action:
Once the role is assigned, the user will now have access to the Add New Check feature in the Synthetic Monitoring plugin.

3. Access Control in Action:
Other parts of the plugin, like the Probes creation flow, will remain read-only, respecting the user’s original Viewer role.

For detailed information on the available roles and more specific instructions, refer to the documentation.