1. Docs
  2. Administration
  3. Access & Identity
  4. Role-Based Access Control (RBAC)
  5. Scopes
  6. RBAC Scopes: Organization Settings

RBAC Scopes: Organization Settings

    This document defines all the available scopes in Pulumi Cloud, organized by entity type and group.

    Agent Pools

    ValueDescription
    agent_pool:createCreate a new agent pool for running Pulumi operations. Agent pools provide isolated environments for executing infrastructure deployments.

    Granted by default roles: Admin
    agent_pool:deleteRemove an existing agent pool and its associated resources. This permanently deletes the pool and its configuration.

    Granted by default roles: Admin
    agent_pool:readView agent pool configurations and status. This includes access to pool settings, agent status, and operational metrics.

    Granted by default roles: Admin
    agent_pool:updateModify agent pool settings and configurations. This allows updating pool parameters, scaling settings, and agent configurations.

    Granted by default roles: Admin

    Audit Logs

    ValueDescription
    audit_logs:exportExport audit log data for compliance and analysis purposes. This enables downloading audit records in various formats.

    Granted by default roles: Admin
    audit_logs:readAccess and view audit logs of organization activities. This provides visibility into system events and user actions.

    Granted by default roles: Admin

    AI

    These scopes control access to the legacy Pulumi Copilot conversation API, currently used only by the Pulumi Copilot VS Code extension. For Pulumi’s current AI capabilities, see Pulumi Neo.
    ValueDescription
    ai_conversations:createCreate a new Copilot conversation session. This allows users to start new conversations via the VS Code Copilot extension.

    Granted by default roles: Member, Admin
    ai_conversations:list_allView all Copilot conversations across the organization. This provides administrators with visibility into all AI assistant interactions.

    Granted by default roles: Admin
    ai_conversations:readAccess and view the content of Copilot conversations. This allows users to read their own conversations and continue previous interactions.

    Granted by default roles: Member, Admin
    ai_conversations:updateModify and continue existing Copilot conversations. This enables users to update their conversations with new questions or context.

    Granted by default roles: Member, Admin

    Change requests (approvals)

    ValueDescription
    change_gate:createCreate approval rules (change gates) that require approval before deployments or changes proceed.

    Granted by default roles: Admin
    change_gate:updateModify existing approval rules and their conditions.

    Granted by default roles: Admin
    change_gate:deleteRemove approval rules (change gates).

    Granted by default roles: Admin

    Deployments

    ValueDescription
    deployments:pauseTemporarily halt all deployment operations across the organization. This is useful for maintenance or emergency situations.

    Granted by default roles: Admin
    deployments:readView deployment configurations and status across the organization. This provides visibility into all deployment activities.

    Granted by default roles: Member, Admin
    deployments:read_usageAccess deployment usage metrics and statistics. This includes information about resource consumption and operational costs.

    Granted by default roles: Member, Admin, Billing Manager
    deployments:resumeResume deployment operations after a pause. This restores normal deployment functionality across the organization.

    Granted by default roles: Admin

    Environments

    ValueDescription
    environment:createCreate a new environment for managing infrastructure configurations. Environments provide isolated spaces for different deployment stages.

    Granted by default roles: Member, Admin
    environment:list_deletedView a list of environments that have been recently deleted but are still recoverable.

    Granted by default roles: Member, Admin
    environment:restore_deletedRecover a previously deleted environment. This restores the environment and its configurations to their previous state.

    Granted by default roles: Admin
    environment_tags:listView all tags used across environments. This provides a comprehensive view of environment categorization.

    Granted by default permission set: Environment Read
    environment_yaml:openAccess and view environment configuration in YAML format. This provides a structured view of environment settings.

    Granted by default roles: Member, Admin

    Insights Accounts

    ValueDescription
    insights_account:createCreate a new insights account. This allows setting up monitoring and analysis capabilities for infrastructure.

    Granted by default roles: Admin

    Insights Policy

    ValueDescription
    policy_groups:createCreate a new group of Infrastructure as Code policies. This allows organizing related policies for better management and enforcement.

    Granted by default roles: Admin
    policy_groups:deleteRemove an existing group of Infrastructure as Code policies. This permanently deletes the policy group and its configurations.

    Granted by default roles: Admin
    policy_groups:readView Infrastructure as Code policy group configurations. This includes access to policy definitions and enforcement rules.

    Granted by default roles: Member, Admin
    policy_groups:updateModify Infrastructure as Code policy group settings. This allows updating policy definitions and enforcement parameters.

    Granted by default roles: Admin
    policy_pack:createCreate a new Infrastructure as Code policy pack. This allows bundling related policies for deployment and enforcement.

    Granted by default roles: Admin
    policy_pack:deleteRemove an existing Infrastructure as Code policy pack. This permanently deletes the policy pack and its configurations.

    Granted by default roles: Admin
    policy_pack:readView Infrastructure as Code policy pack contents. This includes access to policy definitions and enforcement rules.

    Granted by default roles: Admin
    policy_pack:updateModify an existing Infrastructure as Code policy pack. This allows updating policy definitions and enforcement parameters.

    Granted by default roles: Admin
    policy_results:createCreate policy evaluation results for an insights account.

    Granted by default roles: Admin
    policy_results:readView results of Infrastructure as Code policy evaluations. This provides insights into policy compliance and violations.

    Granted by default roles: Admin
    policy_results:updateUpdate policy evaluation results and compliance data.

    Granted by default roles: Admin
    policy_results:deleteDelete policy evaluation results.

    Granted by default roles: Admin

    Membership

    ValueDescription
    org_member:addAdd a new member to the organization. This enables expanding the team with new users.

    Granted by default roles: Admin
    org_member:deleteRemove a member from the organization. This revokes their access and permissions.

    Granted by default roles: Admin
    org_member:readView details about organization members. This includes access to user profiles and roles.

    Granted by default roles: Member, Admin, Billing Manager
    org_member:set_adminGrant or revoke admin privileges for an organization member. This controls elevated access.

    Granted by default roles: Admin
    org_member:updateUpdate organization member information and roles. This allows changing user details and permissions.

    Granted by default roles: Admin
    org_requests:readView all organization requests. This provides visibility into pending and processed requests.

    Granted by default roles: Admin
    org_requests:updateUpdate or process organization requests. This allows approving or denying requests.

    Granted by default roles: Admin
    invites:createSend invitations to new users to join the organization. This enables onboarding of new team members.

    Granted by default roles: Admin
    invites:readView pending and sent invitations for organization membership. This provides visibility into user onboarding status.

    Granted by default roles: Admin

    OIDC

    ValueDescription
    oidc_issuers:createRegister a new OIDC issuer for authentication. This allows adding new identity providers for user login.

    Granted by default roles: Admin
    oidc_issuers:deleteRemove an existing OIDC issuer. This permanently deletes the identity provider configuration.

    Granted by default roles: Admin
    oidc_issuers:readView OIDC issuer configurations. This includes access to identity provider details and settings.

    Granted by default roles: Admin
    oidc_issuers:regenerate_thumbprintsRegenerate security thumbprints for an OIDC issuer. This is used to maintain secure authentication.

    Granted by default roles: Admin
    oidc_issuers:updateModify OIDC issuer settings. This allows updating identity provider details and authentication parameters.

    Granted by default roles: Admin
    auth_policies:readView authentication policy configurations. This includes access to OIDC, SAML, and other identity provider settings.

    Granted by default roles: Admin
    auth_policies:updateModify authentication policies and identity provider settings. This allows updating security configurations.

    Granted by default roles: Admin

    Organization

    ValueDescription
    organization:billingManage billing settings and payment methods for the organization. This includes access to invoices and payment history.

    Granted by default roles: Admin, Billing Manager
    organization:change_backendChange the backend infrastructure for the organization. This is used for advanced configuration and migration.

    Granted by default roles: Admin
    organization:deleteDelete the organization and all its resources. This is a permanent and irreversible action.

    Granted by default roles: Admin
    organization:read_usageView usage statistics and metrics for the organization. This includes resource consumption and cost data.

    Granted by default roles: Member, Admin, Billing Manager
    organization:renameChange the name of the organization. This updates the organization’s display name across the platform.

    Granted by default roles: Admin
    organization:transfer_stacksTransfer ownership of stacks between organizations. This is used for organizational restructuring or migration.

    Granted by default roles: Admin
    organization:updateUpdate organization settings and configurations. This allows changing metadata, policies, and preferences.

    Granted by default roles: Admin
    org_integrations:readView organization-level integration settings. This includes access to all configured integrations.

    Granted by default roles: Admin
    org_integrations:updateUpdate organization-level integration settings. This allows modifying or removing integrations.

    Granted by default roles: Admin
    integrations:readView configuration settings on a per-resource level. This includes access to settings for third-party services and tools.

    Granted by default roles: Member, Admin
    integrations:updateManage integration settings on a per-resource level. This allows updating or reconfiguring third-party service connections.

    Granted by default roles: Member, Admin

    Organization Tokens

    ValueDescription
    org_token:createCreate a new organization API token. This enables programmatic access to organization resources.

    Granted by default roles: Admin
    org_token:deleteDelete an existing organization API token. This revokes programmatic access.

    Granted by default roles: Admin
    org_token:readView organization API tokens. This includes access to token details and usage.

    Granted by default roles: Admin

    Organization Webhooks

    ValueDescription
    organization_webhook:createCreate a new webhook for organization events. This enables integration with external systems for event notifications.

    Granted by default roles: Admin
    organization_webhook:deleteDelete an existing organization webhook. This removes the integration and stops event delivery.

    Granted by default roles: Admin
    organization_webhook:readView organization webhook configurations. This includes access to webhook endpoints and event triggers.

    Granted by default roles: Admin
    organization_webhook:updateModify an existing organization webhook. This allows updating endpoint URLs and event subscriptions.

    Granted by default roles: Admin

    Project

    ValueDescription
    project:decryptAllows decrypting sensitive project-level data and secrets.

    Granted by default roles: Member, Admin
    project:encryptAllows encrypting sensitive project-level data and secrets.

    Granted by default roles: Member, Admin

    Resources

    ValueDescription
    resources:dashboardAllows viewing the resources dashboard that provides an overview of all resources across the organization.

    Granted by default roles: Member, Admin, Billing Manager
    resources:indexAllows accessing the main resources index page and managing resource listings.

    Granted by default roles: Admin
    resources:searchAllows searching and filtering through organization resources.

    Granted by default roles: Member, Admin

    Roles

    ValueDescription
    role:createAllows creating new custom roles with specific permission sets.

    Granted by default roles: Admin
    role:deleteAllows deleting existing custom roles.

    Granted by default roles: Admin
    role:readAllows viewing role definitions and their associated permission sets.

    Granted by default roles: Admin
    role:updateAllows modifying existing custom roles and their permission sets.

    Granted by default roles: Admin

    SAML

    ValueDescription
    saml:readAllows viewing SAML configuration and settings for the organization.

    Granted by default roles: Member, Admin, Billing Manager
    saml:updateAllows configuring and updating SAML settings for the organization.

    Granted by default roles: Admin

    SCIM

    ValueDescription
    scim:deleteAllows removing SCIM configurations and terminating SCIM integration.

    Granted by default roles: Admin
    scim:readAllows viewing SCIM configuration and integration settings.

    Granted by default roles: Admin
    scim:updateAllows modifying SCIM configuration and integration settings.

    Granted by default roles: Admin

    Stacks

    ValueDescription
    stack:createCreate a new stack for managing infrastructure resources. Stacks represent isolated units of deployment.

    Granted by default roles: Admin
    stack:list_deletedView a list of stacks that have been recently deleted but are still recoverable.

    Granted by default roles: Admin
    stack:restore_deletedRecover a previously deleted stack. This restores the stack and its configurations to their previous state.

    Granted by default roles: Admin
    stack_access:readView information about the users and teams that have access to a stack.

    Granted by default roles: Member, Admin

    Tags

    ValueDescription
    tags:readAllows viewing tags and their associated resources across the organization.

    Granted by default roles: Member, Admin

    Teams

    ValueDescription
    team:createAllows creating new teams within the organization.

    Granted by default roles: Admin
    team:create_tokenAllows generating new access tokens for team authentication.

    Granted by default roles: Admin
    team:deleteAllows removing teams from the organization.

    Granted by default roles: Admin
    team:delete_tokenAllows revoking team access tokens.

    Granted by default roles: Admin
    team:listAllows viewing all teams in the organization.

    Granted by default roles: Member, Admin, Billing Manager
    team:list_tokensAllows viewing all active access tokens for teams.

    Granted by default roles: Admin
    team:readAllows viewing team details and membership information.

    Granted by default roles: Member, Admin
    team:updateAllows modifying team settings and membership.

    Granted by default roles: Admin
    github_team:createCreate a new team that syncs with GitHub. This enables integration between Pulumi and GitHub team structures.

    Granted by default roles: Admin

    Templates

    ValueDescription
    templates:readAllows viewing and using available templates for creating new projects and stacks.

    Granted by default roles: Member, Admin

    Template Sources

    ValueDescription
    templates_source:createAllows adding new template sources to the organization.

    Granted by default roles: Admin
    templates_source:deleteAllows removing template sources from the organization.

    Granted by default roles: Admin
    templates_source:readAllows viewing template source configurations and available templates.

    Granted by default roles: Admin
    templates_source:updateAllows modifying template source configurations and settings.

    Granted by default roles: Admin