This is documentation for the next version of Grafana documentation. For the latest stable release, go to the latest version.

Enterprise Open source Grafana Cloud

Git Sync permissions and access control

Note

Git Sync is now GA for Grafana Cloud, OSS and Enterprise. Refer to Usage and performance limitations to understand usage limits for the different tiers.

Contact Grafana for support or to report any issues you encounter and help us improve this feature.

For Git Sync you need to configure permissions at two layers to function correctly:

  • At the Grafana level for repository management and resource access, as described in this document.
  • At your Git provider level, to protect your repository. Refer to Repository protection for Git Sync for more information.

Grafana role-based permissions

Git Sync integrates with the Grafana standard role-based permission model, which has three levels:

  1. Organization-level: Default permissions of the Admin, Editor, or Viewer role. Refer to Roles and permissions for more details.
  2. Folder-level: They also apply to all dashboards within it. Refer to Folder permissions for more details.
  3. Dashboard-level: Refer to Dashboard permissions for more details.

Note

Dashboard-level permissions override folder-level permissions, which override organization-level roles.

The following applies for Git Sync:

  • Permissions don’t sync: Folder and dashboard permissions are managed in Grafana only and don’t sync to Git. You must configure permissions separately in each Grafana instance that uses the repository
  • Dashboard changes: When users with appropriate dashboard or folder permissions modify dashboard content, those changes automatically sync to Git, or create pull requests if branch protection is enabled
  • Folder structure: Creating, renaming, or deleting folders syncs to Git

Use org-level permissions in Git Sync

If you apply org-level permissions, users can do the following with Git Sync:

Admin users

Users with the Admin role can set up and manage Git Sync repositories and connections.

Note

In Grafana Cloud, the equivalent role is Grafana Cloud Admin or Admin at the organization level.

Capabilities:

  • Configure new Git Sync repositories and connections
  • Update repository settings (URL, branch, path, sync interval, webhook configuration)
  • Delete repository connections
  • Manage authentication credentials and Git provider connections
  • Manually trigger sync operations (pull from Git)
  • View sync status, logs, and statistics
  • Access the Provisioning admin UI at Administration > General > Provisioning

Viewer users

Users with the Viewer role can view provisioned resources. Their access to specific dashboards and folders depends on the permissions assigned to them.

Organization-level capabilities:

  • Read Git Sync settings, via the provisioning.settings:read permission
  • View dashboard preview links in pull requests

Resource access depends on folder and dashboard permissions:

  • Folder Viewer: View all dashboards and subfolders within that folder
  • Dashboard Viewer: View specific dashboards (even if they don’t have folder access)
  • Cannot edit dashboards or manage Git Sync repositories

Editor users

Users with the Editor role can work with provisioned dashboards and folders. Their specific capabilities depend on the folder-level and dashboard-level permissions assigned to them.

Organization-level capabilities:

  • View dashboard preview links in pull requests
  • Trigger manual sync operations via jobs API

Resource access depends on folder/dashboard permissions:

  • Folder Editor or Admin: Create, edit, and delete dashboards within the folder; create subfolders; changes sync to Git
  • Folder Viewer: View dashboards only within that folder
  • Dashboard Editor or Admin: Edit specific dashboards; changes sync to Git (even without folder edit access)
  • Dashboard Viewer: View specific dashboards only

Editors don’t need access to the Provisioning admin UI or repository configuration. Refer to Configure folder and dashboard permissions and Configure fine-grained access control (RBAC) for details.

Configure folder and dashboard permissions

Folder-level role permissions determine who can view, edit, or delete provisioned resources.

These roles grant Grafana permissions (dashboards:read, dashboards:write, folders:create…) that are checked when users interact with provisioned resources through the Git Sync files endpoint. Dashboards within a provisioned folder inherit the folder’s permissions.

When Git Sync creates a provisioned folder, it assigns these default permissions:

Grafana RoleFolder Permission
AdminAdmin
EditorEditor
ViewerViewer

Folder-level Viewer users:

  • View dashboards and folders
  • Cannot create, edit, or delete resources

Folder-level Editor users:

  • Have all Viewer permissions
  • Create, edit and delete dashboards
  • Create subfolders
  • When an Editor saves dashboard changes, Git Sync automatically commits the changes to Git, or creates a pull request if branch protection is enabled

Folder-level Admin users:

  • Have all Editor permissions
  • Update folder settings, rename and delete folders
  • Modify folder permissions
  • Full control over the folder and all its contents

Modify folder-level permissions

Note

To safely modify permissions, each provisioned folder should include a .folder.json metadata file with the folder’s UID. Without this file, folder permissions may be lost if the folder is moved to a different path in the Git repository.

For folders created from the Grafana UI, the metadata file is added automatically. If your folder is missing the metadata file, the UI shows a warning with instructions on how to add it.

You can customize folder permissions using:

  • Grafana UI: Navigate to the folder, click the settings icon, and select Permissions
  • RBAC (Enterprise/Cloud): Use Role-Based Access Control for fine-grained permission management

Configure fine-grained access control (RBAC)

If you’re a Grafana Enterprise or Grafana Cloud user with RBAC enabled, Git Sync provides fine-grained permissions that allow more granular control over Git Sync operations. You can create custom roles that combine Git Sync permissions in different ways. Refer to Role-Based Access Control documentation for instructions on creating and managing custom roles.

How basic roles map to RBAC permissions

Understanding which permissions each basic role receives helps you create custom roles or understand exactly what access users have. The tables below show which Git Sync permissions are granted to each role by default.

Note

The provisioning.settings:read permission is granted to all roles (Viewer and above) and allows viewing Git Sync system settings, which is necessary for the UI to display properly. This does not grant access to modify settings or manage repositories.

Admin role

Users with the Admin role receive full access to Git Sync infrastructure:

Permission CategorySpecific PermissionsWhat This Allows
Repositoriesprovisioning.repositories:create
provisioning.repositories:read
provisioning.repositories:write
provisioning.repositories:delete
Create new repositories
View repository configurations
Update repository settings (branch, path, interval)
Delete repositories
Connectionsprovisioning.connections:create
provisioning.connections:read
provisioning.connections:write
provisioning.connections:delete
Create Git provider connections
View connection details
Update connection settings
Delete connections
Jobsprovisioning.jobs:create
provisioning.jobs:read
provisioning.jobs:write
provisioning.jobs:delete
Trigger manual syncs
View sync jobs
Modify sync job settings
Cancel/delete sync jobs
History & Monitoringprovisioning.historicjobs:read
provisioning.stats:read
View sync job history
View Git Sync statistics and metrics
Settingsprovisioning.settings:readView Git Sync system settings

Editor role

Users with the Editor role can manage sync operations but not infrastructure configuration:

Permission CategorySpecific PermissionsWhat This Allows
Jobsprovisioning.jobs:create
provisioning.jobs:read
provisioning.jobs:write
provisioning.jobs:delete
Trigger manual syncs
View sync jobs
Modify sync job settings
Cancel/delete sync jobs
Read-Only Accessprovisioning.repositories:read
provisioning.settings:read
View repository configurations
View Git Sync settings

Editors can access resources based on the folder/dashboard assignments:

  • dashboards:create, dashboards:read, dashboards:write, dashboards:delete - On folders/dashboards where assigned Folder Editor or Dashboard Editor
  • folders:create, folders:read, folders:write, folders:delete - On folders where assigned Folder Editor

Viewer role

Users with Viewer role have read-only access to Git Sync:

Permission CategorySpecific PermissionsWhat This Allows
Read-Only Accessprovisioning.repositories:read
provisioning.settings:read
View repository configurations
View Git Sync settings (required for UI)

Viewers can access resources based on the folder/dashboard assignments:

  • dashboards:read - On folders/dashboards where assigned Folder Viewer or Dashboard Viewer
  • folders:read - On folders where assigned Folder Viewer

RBAC for dashboards and folders

Provisioned dashboards and folders use the Grafana standard permission model. To modify provisioned resources, you will need permissions over your dashboard and folder.

The following applies for Git Sync:

  • Users need standard dashboards:* and folders:* permissions to work with provisioned resources
  • Editors and Viewers need provisioning.settings:read and provisioning.repositories:read to view Git Sync configuration
  • Users do not need repository write/delete or connection permissions to edit dashboards
  • Dashboard-level permissions override folder-level permissions
  • Changes made by users with appropriate permissions automatically sync to Git

Configure Git repository protection

After you’ve configured your Grafana permissions, set up the appropriate permissions at your Git provider to write changes. Repository protection settings control write access, branch protection rules, and code review requirements.

For detailed information about configuring repository write access and branch protection, refer to Repository protection for Git Sync.

Troubleshoot permissions

“Permission denied” when saving a dashboard

Cause: User lacks Editor or Admin permission on the provisioned folder.

Solution:

  1. Verify the user’s folder-level permissions in Grafana
  2. Navigate to Folder settings > Permissions
  3. Grant the user or their team Editor or Admin role

Git Sync fails with “403 Forbidden” or “Unauthorized”

Cause: The Git provider credentials lack the required permissions.

Solution:

  1. Verify the authentication credentials (GitHub App, Personal Access Token, etc.) have read and write permissions on the repository
  2. Check that the credentials have permission to create pull requests (if branch protection is enabled)
  3. If using a GitHub App or OAuth app, verify it is installed and authorized for the target repository
  4. For expired or revoked tokens, generate new credentials and update the Git Sync connection configuration

Dashboard changes commit directly instead of creating pull requests

Cause: Branch protection is not configured at the Git provider.

Solution: Enable branch protection rules at your Git provider to enforce pull request workflows or in your Grafana repository settings. Refer to your Git provider’s documentation for instructions on configuring branch protection.