User role permissions by use case Innovation Release

Authorization of these user roles follows a role-based access control (RBAC) model with the restrictions applying to a specific scopeeither within one project or within one account.

The following list doesn't cover Postgres cluster database authorization.

Currently, you can't create custom roles. Only these 11 predefined roles are available.

PermissionsOrganization AdministratorOrganization OwnerPlatform AdminProject OwnerProject EditorProject ViewerEstate IngesterGenAI Builder EditorCatalog Data readerCatalog Data writerMigration Portal Projects OwnerMigration Portal Projects EditorMigration Portal Projects Viewer
Access GenAI BuilderX
Configure GenAI BuilderX
Access Ops apps (launchpad)X
View projects within the orgXX
Update and delete projectsX
View roles assigned at the project levelXXXX
View activity log for the orgXX
View and download usage report for the projectXXX
View and download usage report the the orgXX
Create projects within the orgX
Assign project rolesXX
Create, edit, and delete clustersXX
View clusters, backups, estates, and migrationsXXX
Assign org rolesX
View activity log for the projectXXX
View, edit, and delete owned projectsX
Ingest self-managed Postgres cluster dataX*
Create, update, and delete catalogXX
Read catalogX
Read Iceberg dataXX
Write and delete Iceberg dataX
View Migration Portal projectsXXX
View and update Migration Portal projectsXX
View, update, create, and delete Migration Portal projectsX
  • Only machine-users can be assigned to ingest self-managed cluster data.