Important: This documentation is about an older version. It's relevant only to the release noted, many of the features and functions have been updated or replaced. Please view the current version.
Plan your RBAC rollout strategy
Note: Available in Grafana Enterprise and Grafana Cloud Advanced.
An RBAC rollout strategy helps you determine how you want to implement RBAC prior to assigning RBAC roles to users and teams.
Your rollout strategy should help you answer the following questions:
- Should I assign basic roles to users, or should I assign fixed roles or custom roles to users?
- When should I create custom roles?
- To which entities should I apply fixed and custom roles? Should I apply them to users, teams? Should I modify the basic roles permissions instead?
- How do I roll out permissions in a way that makes them easy to manage?
- Which approach should I use when assigning roles? Should I use the Grafana UI, provisioning, or the API?
Review basic role and fixed role definitions
As a first step in determining your permissions rollout strategy, we recommend that you become familiar with basic role and fixed role definitions. In addition to assigning fixed roles to any user and team, you can also modify basic roles permissions, which changes what a Viewer, Editor, or Admin can do. This flexibility means that there are many combinations of role assignments for you to consider. If you have a large number of Grafana users and teams, we recommend that you make a list of which fixed roles you might want to use.
To learn more about basic roles and fixed roles, refer to the following documentation:
User and team considerations
RBAC is a flexible and powerful feature with many possible permissions assignment combinations available. Consider the follow guidelines when assigning permissions to users and teams.
Assign roles to users when you have a one-off scenario where a small number of users require access to a resource or when you want to assign temporary access. If you have a large number of users, this approach can be difficult to manage as you scale your use of Grafana. For example, a member of your IT department might need the
fixed:licensing:reader
andfixed:licensing:writer
roles so that they can manage your Grafana Enterprise license.Assign roles to teams when you have a subset of users that align to your organizational structure, and you want all members of the team to have the same level of access. For example, all members of a particular engineering team might need the
fixed:reports:reader
andfixed:reports:writer
roles to be able to manage reports.When you assign additional users to a team, the system automatically assigns permissions to those users.
Authentication provider considerations
You can take advantage of your current authentication provider to manage user and team permissions in Grafana. When you map users and teams to SAML and LDAP groups, you can synchronize those assignments with Grafana.
For example:
Map SAML, LDAP, or Oauth roles to Grafana basic roles (viewer, editor, or admin).
Use the Grafana Enterprise team sync feature to synchronize teams from your SAML, LDAP, or Oauth provider to Grafana. For more information about team sync, refer to Team sync.
Within Grafana, assign RBAC permissions to users and teams.
When to modify basic roles or create custom roles
Consider the following guidelines when you determine if you should modify basic roles or create custom roles.
Modify basic roles when Grafana’s definitions of what viewers, editors, and admins can do does not match your definition of these roles. You can add or remove permissions from any basic role.
Note: Changes that you make to basic roles impact the role definition for all organizations in the Grafana instance. For example, when you add the
fixed:users:writer
role’s permissions to the viewer basic role, all viewers in any org in the Grafana instance can create users within that org.Create custom roles when fixed role definitions don’t meet you permissions requirements. For example, the
fixed:dashboards:writer
role allows users to delete dashboards. If you want some users or teams to be able to create and update but not delete dashboards, you can create a custom role with a name likecustom:dashboards:creator
that lacks thedashboards:delete
permission.
How to assign RBAC roles
Use any of the following methods to assign RBAC roles to users and teams.
- Grafana UI: Use the Grafana UI when you want to assign a limited number of RBAC roles to users and teams. The UI contains a role picker that you can use to select roles.
- Grafana HTTP API: Use the Grafana HTTP API if you would like to automate role assignment.
- Terraform: Use Terraform to assign and manage user and team role assignments if you use Terraform for provisioning.
- Grafana provisioning: Grafana provisioning provides a robust approach to assigning, removing, and deleting roles. Within a single YAML file you can include multiple role assignment and removal entries.
Permissions scenarios
We’ve compiled the following permissions rollout scenarios based on current Grafana implementations.
Note: If you have a use case that you’d like to share, feel free to contribute to this docs page. We’d love to hear from you!
Provide internal viewer employees with the ability to use Explore, but prevent external viewer contractors from using Explore
- In Grafana, create a team with the name
Internal employees
. - Assign the
fixed:datasources:querier
role to theInternal employees
team. - Add internal employees to the
Internal employees
team, or map them from a SAML, LDAP, or Oauth team using Team Sync. - Assign the viewer role to both internal employees and contractors.
Limit viewer, editor, or admin permissions
- Review the list of permissions associated with the basic role.
- Change the permissions of the basic role.
Allow only members of one team to manage Alerts
- Create an
Alert Managers
team, and assign that team all applicable Alerting fixed roles. - Add users to the
Alert Managers
team. - Remove all permissions with actions prefixed with
alert.
from the Viewer, Editor, and Admin basic roles.
Provide dashboards to users in two or more geographies
- Create a folder for each geography, for example, create a
US
folder and anEU
folder. - Add dashboards to each folder.
- Use folder permissions to add US-based users as Editors to the
US
folder and assign EU-based users as Editors to theEU
folder.
Create a custom role to access alerts in a specific folder
To see an alert rule in Grafana, the user must have read access to the folder that stores the alert rule, permission to read alerts in the folder, and permission to query all data sources that the rule uses.
The API command in this example is based on the following:
- A
Test-Folder
with ID92
- Two data sources:
DS1
with UID_oAfGYUnk
, andDS2
with UIDYYcBGYUnk
- An alert rule that is stored in
Test-Folder
and queries the two data sources.
The following request creates a custom role that includes permissions to access the alert rule:
curl --location --request POST '<grafana_url>/api/access-control/roles/' \
--header 'Authorization: Basic YWRtaW46cGFzc3dvcmQ=' \
--header 'Content-Type: application/json' \
--data-raw '{
"version": 1,
"name": "custom:alerts.reader.in.folder.123",
"displayName": "Read-only access to alerts in folder Test-Folder",
"description": "Let user query DS1 and DS2, and read alerts in folder Test-Folders",
"group":"Custom",
"global": true,
"permissions": [
{
"action": "folders:read",
"scope": "folders:uid:YEcBGYU22"
},
{
"action": "alert.rules:read",
"scope": "folders:uid:YEcBGYU22"
},
{
"action": "datasources:query",
"scope": "datasources:uid:_oAfGYUnk"
},
{
"action": "datasources:query",
"scope": "datasources:uid:YYcBGYUnk"
}
]
}'
Enable an editor to create custom roles
By default, only a Grafana Server Admin can create and manage custom roles. If you want your Editors
to do the same, update the Editor
basic role permissions. There are two ways to achieve this:
- Add the
fixed:roles:writer
role permissions to thebasic:editor
role using therole > from
list of your provisioning file:
apiVersion: 2
roles:
- name: 'basic:editor'
global: true
version: 3
from:
- name: 'basic:editor'
global: true
- name: 'fixed:roles:writer'
global: true
- Or add the following permissions to the
basic:editor
role, using provisioning or the RBAC HTTP API:
action | scope |
---|---|
roles:read | roles:* |
roles:write | permissions:type:delegate |
roles:delete | permissions:type:delegate |
Note: Any user or service account with the ability to modify roles can only create, update, or delete roles with permissions they have been granted. For example, a user with the
Editor
role would be able to create and manage roles only with the permissions they have or with a subset of them.
Enable viewers to create reports
If you want your Viewers
to create reports, update the Viewer
basic role permissions. There are two ways to achieve this:
- Add the
fixed:reports:writer
role permissions to thebasic:viewer
role using therole > from
list of your provisioning file:
apiVersion: 2
roles:
- name: 'basic:viewer'
global: true
version: 3
from:
- name: 'basic:viewer'
global: true
- name: 'fixed:reports:writer'
global: true
Note: The
fixed:reports:writer
role assigns more permissions than just creating reports. For more information about fixed role permission assignments, refer to Fixed role definitions.
- Add the following permissions to the
basic:viewer
role, using provisioning or the RBAC HTTP API:
Action | Scope |
---|---|
reports:create | n/a |
reports:write | reports:* reports:id:* |
reports:read | reports:* |
reports:send | reports:* |
Prevent a Grafana Admin from creating and inviting users
To prevent a Grafana Admin from creating users and inviting them to join an organization, you must update a basic role permission. The permissions to remove are:
Action | Scope |
---|---|
users:create | |
org.users:add | users:* |
There are two ways to achieve this:
- Use the
role > from
list andpermission > state
option of your provisioning file:
apiVersion: 2
roles:
- name: 'basic:editor'
global: true
version: 3
from:
- name: 'basic:editor'
global: true
permissions:
- action: 'users:create'
state: 'absent'
- action: 'org.users:add'
scope: 'users:*'
state: 'absent'
- Or use RBAC HTTP API.
Prevent Viewers from accessing an App Plugin
By default, Viewers, Editors and Admins have access to all App Plugins that their organization role allows them to access. To change this default behavior and prevent Viewers from accessing an App plugin, you must update a basic role’s permissions.
In this example, three App plugins have been installed and enabled:
Name | ID | Required Org role |
---|---|---|
On Call | grafana-oncall-app | Viewer |
Kentik Connect Pro | kentik-connect-app | Viewer |
Enterprise logs | grafana-enterprise-logs-app | Admin |
By default, Viewers will hence be able to see both, On Call and Kentik Connect Pro App plugins. If you want to revoke their access to the On Call App plugin, you need to:
- Remove the permission to access all application plugins:
Action Scope plugins.app:access
plugins:*
- Grant the permission to access the Kentik Connect Pro App plugin only:
Action Scope plugins.app:access
plugins:id:kentik-connect-app
Here are two ways to achieve this:
- Use the
role > from
list andpermission > state
option of your provisioning file:
---
apiVersion: 2
roles:
- name: 'basic:viewer'
version: 8
global: true
from:
- name: 'basic:viewer'
global: true
permissions:
- action: 'plugins.app:access'
scope: 'plugins:*'
state: 'absent'
- action: 'plugins.app:access'
scope: 'plugins:id:kentik-connect-app'
state: 'present'
- Or use RBAC HTTP API.