1. Docs
  2. Pulumi Cloud
  3. Identity & access management
  4. Role-Based Access Control (RBAC)
  5. RBAC Scopes: Organization settings

RBAC Scopes: Organization settings

    This document defines all the available scopes in Pulumi Cloud, organized by entity type and group.

    AI

    ValueDescription
    ai_conversations:createCreate a new AI conversation session for interacting with Pulumi’s AI assistant. This allows users to start new conversations and get help with their infrastructure code.

    Granted by default roles: Member, Admin
    ai_conversations:list_allView all AI conversations across the organization. This provides administrators with visibility into all AI assistant interactions.

    Granted by default roles: Admin
    ai_conversations:readAccess and view the content of AI conversations. This allows users to read their own conversations and continue previous interactions.

    Granted by default roles: Member, Admin
    ai_conversations:updateModify and continue existing AI conversations. This enables users to update their conversations with new questions or context.

    Granted by default roles: Member, Admin

    Agent Pools

    ValueDescription
    agent_pool:createCreate a new agent pool for running Pulumi operations. Agent pools provide isolated environments for executing infrastructure deployments.

    Granted by default roles: Admin
    agent_pool:deleteRemove an existing agent pool and its associated resources. This permanently deletes the pool and its configuration.

    Granted by default roles: Admin
    agent_pool:readView agent pool configurations and status. This includes access to pool settings, agent status, and operational metrics.

    Granted by default roles: Admin
    agent_pool:updateModify agent pool settings and configurations. This allows updating pool parameters, scaling settings, and agent configurations.

    Granted by default roles: Admin

    Annotations

    ValueDescription
    organization_annotations:readView annotations attached to the organization. This provides context and metadata for organizational resources.

    Granted by default roles: Member, Admin
    organization_annotations:updateModify or add annotations to the organization. This allows updating organizational metadata.

    Granted by default roles: Admin

    Audit Logs

    ValueDescription
    audit_logs:exportExport audit log data for compliance and analysis purposes. This enables downloading audit records in various formats.

    Granted by default roles: Admin
    audit_logs:readAccess and view audit logs of organization activities. This provides visibility into system events and user actions.

    Granted by default roles: Admin

    Deployments

    ValueDescription
    deployments:pauseTemporarily halt all deployment operations across the organization. This is useful for maintenance or emergency situations.

    Granted by default roles: Admin
    deployments:readView deployment configurations and status across the organization. This provides visibility into all deployment activities.

    Granted by default roles: Member, Admin
    deployments:read_usageAccess deployment usage metrics and statistics. This includes information about resource consumption and operational costs.

    Granted by default roles: Member, Admin, Billing Manager
    deployments:resumeResume deployment operations after a pause. This restores normal deployment functionality across the organization.

    Granted by default roles: Admin

    Environments

    ValueDescription
    environment:createCreate a new environment for managing infrastructure configurations. Environments provide isolated spaces for different deployment stages.

    Granted by default roles: Member, Admin
    environment:listView all environments in the organization. This provides a list of available environments and their basic information.

    Granted by default roles: Member, Admin
    environment:list_deletedView a list of environments that have been recently deleted but are still recoverable.

    Granted by default roles: Member, Admin
    environment:restore_deletedRecover a previously deleted environment. This restores the environment and its configurations to their previous state.

    Granted by default roles: Admin
    environment_tags:listView all tags used across environments. This provides a comprehensive view of environment categorization.

    Granted by default permission: Environment Read
    environment_yaml:openAccess and view environment configuration in YAML format. This provides a structured view of environment settings.

    Granted by default roles: Member, Admin

    IaC Policy

    ValueDescription
    iac_policy_groups:createCreate a new group of Infrastructure as Code policies. This allows organizing related policies for better management and enforcement.

    Granted by default roles: Admin
    iac_policy_groups:deleteRemove an existing group of Infrastructure as Code policies. This permanently deletes the policy group and its configurations.

    Granted by default roles: Admin
    iac_policy_groups:readView Infrastructure as Code policy group configurations. This includes access to policy definitions and enforcement rules.

    Granted by default roles: Member, Admin
    iac_policy_groups:updateModify Infrastructure as Code policy group settings. This allows updating policy definitions and enforcement parameters.

    Granted by default roles: Admin
    iac_policy_pack:createCreate a new Infrastructure as Code policy pack. This allows bundling related policies for deployment and enforcement.

    Granted by default roles: Admin
    iac_policy_pack:deleteRemove an existing Infrastructure as Code policy pack. This permanently deletes the policy pack and its configurations.

    Granted by default roles: Admin
    iac_policy_pack:readView Infrastructure as Code policy pack contents. This includes access to policy definitions and enforcement rules.

    Granted by default roles: Admin
    iac_policy_pack:updateModify an existing Infrastructure as Code policy pack. This allows updating policy definitions and enforcement parameters.

    Granted by default roles: Admin
    iac_policy_results:readView results of Infrastructure as Code policy evaluations. This provides insights into policy compliance and violations.

    Granted by default roles: Admin

    Insights Accounts

    ValueDescription
    insights_account:createCreate a new insights account. This allows setting up monitoring and analysis capabilities for infrastructure.

    Granted by default roles: Admin
    insights_account:listView all insights accounts in the organization, subject to having account:read permissions on specific accounts.

    Granted by default roles: Member, Admin

    Membership

    ValueDescription
    org_member:addAdd a new member to the organization. This enables expanding the team with new users.

    Granted by default roles: Admin
    org_member:deleteRemove a member from the organization. This revokes their access and permissions.

    Granted by default roles: Admin
    org_member:readView details about organization members. This includes access to user profiles and roles.

    Granted by default roles: Member, Admin, Billing Manager
    org_member:set_adminGrant or revoke admin privileges for an organization member. This controls elevated access.

    Granted by default roles: Admin
    org_member:updateUpdate organization member information and roles. This allows changing user details and permissions.

    Granted by default roles: Admin
    org_requests:createSubmit a new request to join or interact with the organization. This is used for onboarding or special access.
    org_requests:readView all organization requests. This provides visibility into pending and processed requests.

    Granted by default roles: Admin
    org_requests:statusCheck the status of an organization request. This helps track onboarding or access progress.
    org_requests:updateUpdate or process organization requests. This allows approving or denying requests.

    Granted by default roles: Admin
    invites:createSend invitations to new users to join the organization. This enables onboarding of new team members.

    Granted by default roles: Admin
    invites:readView pending and sent invitations for organization membership. This provides visibility into user onboarding status.

    Granted by default roles: Admin

    OIDC

    ValueDescription
    oidc_issuers:createRegister a new OIDC issuer for authentication. This allows adding new identity providers for user login.

    Granted by default roles: Admin
    oidc_issuers:deleteRemove an existing OIDC issuer. This permanently deletes the identity provider configuration.

    Granted by default roles: Admin
    oidc_issuers:readView OIDC issuer configurations. This includes access to identity provider details and settings.

    Granted by default roles: Admin
    oidc_issuers:regenerate_thumbprintsRegenerate security thumbprints for an OIDC issuer. This is used to maintain secure authentication.

    Granted by default roles: Admin
    oidc_issuers:updateModify OIDC issuer settings. This allows updating identity provider details and authentication parameters.

    Granted by default roles: Admin
    auth_policies:readView authentication policy configurations. This includes access to OIDC, SAML, and other identity provider settings.

    Granted by default roles: Admin
    auth_policies:updateModify authentication policies and identity provider settings. This allows updating security configurations

    Organization

    ValueDescription
    organization:billingManage billing settings and payment methods for the organization. This includes access to invoices and payment history.

    Granted by default roles: Admin, Billing Manager
    organization:change_backendChange the backend infrastructure for the organization. This is used for advanced configuration and migration.

    Granted by default roles: Admin
    organization:deleteDelete the organization and all its resources. This is a permanent and irreversible action.

    Granted by default roles: Admin
    organization:readView organization details and settings. This includes access to organizational metadata and configuration.

    Granted by default roles: Member, Admin, Billing Manager
    organization:read_activityView recent activity and audit logs for the organization. This provides insight into changes and events.

    Granted by default roles: Member, Admin, Billing Manager
    organization:read_usageView usage statistics and metrics for the organization. This includes resource consumption and cost data.

    Granted by default roles: Member, Admin, Billing Manager
    organization:renameChange the name of the organization. This updates the organization’s display name across the platform.

    Granted by default roles: Admin
    organization:transfer_stacksTransfer ownership of stacks between organizations. This is used for organizational restructuring or migration.

    Granted by default roles: Admin
    organization:updateUpdate organization settings and configurations. This allows changing metadata, policies, and preferences.

    Granted by default roles: Admin
    org_integrations:readView organization-level integration settings. This includes access to all configured integrations.

    Granted by default roles: Admin
    org_integrations:updateUpdate organization-level integration settings. This allows modifying or removing integrations.

    Granted by default roles: Admin
    integrations:readView configuration settings on a per-resource level. This includes access to settings for third-party services and tools.

    Granted by default roles: Member, Admin
    integrations:updateManage integration settings on a per-resource level. This allows updating or reconfiguring third-party service connections.

    Granted by default roles: Member, Admin

    Organization Tokens

    ValueDescription
    org_token:createCreate a new organization API token. This enables programmatic access to organization resources.

    Granted by default roles: Admin
    org_token:deleteDelete an existing organization API token. This revokes programmatic access.

    Granted by default roles: Admin
    org_token:readView organization API tokens. This includes access to token details and usage.

    Granted by default roles: Admin

    Organization Webhooks

    ValueDescription
    organization_webhook:createCreate a new webhook for organization events. This enables integration with external systems for event notifications.

    Granted by default roles: Admin
    organization_webhook:deleteDelete an existing organization webhook. This removes the integration and stops event delivery.

    Granted by default roles: Admin
    organization_webhook:readView organization webhook configurations. This includes access to webhook endpoints and event triggers.

    Granted by default roles: Admin
    organization_webhook:updateModify an existing organization webhook. This allows updating endpoint URLs and event subscriptions.

    Granted by default roles: Admin

    Project Annotations

    ValueDescription
    project_annotations:readAllows reading project-level annotations and metadata associated with a project.

    Granted by default roles: Member, Admin
    project_annotations:updateAllows creating, updating, and deleting project-level annotations and metadata.

    Granted by default roles: Member, Admin

    Project

    ValueDescription
    project:decryptAllows decrypting sensitive project-level data and secrets.

    Granted by default roles: Member, Admin
    project:encryptAllows encrypting sensitive project-level data and secrets.

    Granted by default roles: Member, Admin

    Resources

    ValueDescription
    resources:dashboardAllows viewing the resources dashboard that provides an overview of all resources across the organization.

    Granted by default roles: Member, Admin, Billing Manager
    resources:indexAllows accessing the main resources index page and managing resource listings.

    Granted by default roles: Admin
    resources:searchAllows searching and filtering through organization resources.

    Granted by default roles: Member, Admin

    Roles

    ValueDescription
    role:createAllows creating new custom roles with specific permission sets.

    Granted by default roles: Admin
    role:deleteAllows deleting existing custom roles.

    Granted by default roles: Admin
    role:readAllows viewing role definitions and their associated permissions.

    Granted by default roles: Admin
    role:updateAllows modifying existing custom roles and their permission sets.

    Granted by default roles: Admin

    SAML

    ValueDescription
    saml:readAllows viewing SAML configuration and settings for the organization.

    Granted by default roles: Member, Admin, Billing Manager
    saml:updateAllows configuring and updating SAML settings for the organization.

    Granted by default roles: Admin

    SCIM

    ValueDescription
    scim:deleteAllows removing SCIM configurations and terminating SCIM integration.

    Granted by default roles: Admin
    scim:readAllows viewing SCIM configuration and integration settings.

    Granted by default roles: Admin
    scim:updateAllows modifying SCIM configuration and integration settings.

    Granted by default roles: Admin

    Services

    ValueDescription
    services:adminAllows full administrative control over service configurations and settings.

    Granted by default roles: Member, Admin
    services:createAllows creating new service instances and configurations.

    Granted by default roles: Member, Admin
    services:readAllows viewing service configurations and their current state.

    Granted by default roles: Member, Admin
    services:writeAllows modifying existing service configurations and settings.

    Granted by default roles: Member, Admin

    Stacks

    ValueDescription
    stack:createCreate a new stack for managing infrastructure resources. Stacks represent isolated units of deployment.

    Granted by default roles: Admin
    stack:listView all stacks in the organization, subject to having stack:read permissions on specific stacks.

    Granted by default roles: Member, Admin
    stack:list_deletedView a list of stacks that have been recently deleted but are still recoverable.

    Granted by default roles: Admin
    stack:restore_deletedRecover a previously deleted stack. This restores the stack and its configurations to their previous state.

    Granted by default roles: Admin
    stack_access:readView information about the users and teams that have access to a stack.

    Granted by default roles: Member, Admin

    Tags

    ValueDescription
    tags:readAllows viewing tags and their associated resources across the organization.

    Granted by default roles: Member, Admin

    Teams

    ValueDescription
    team:createAllows creating new teams within the organization.

    Granted by default roles: Admin
    team:create_tokenAllows generating new access tokens for team authentication.

    Granted by default roles: Admin
    team:deleteAllows removing teams from the organization.

    Granted by default roles: Admin
    team:delete_tokenAllows revoking team access tokens.

    Granted by default roles: Admin
    team:listAllows viewing all teams in the organization.

    Granted by default roles: Member, Admin, Billing Manager
    team:list_tokensAllows viewing all active access tokens for teams.

    Granted by default roles: Admin
    team:readAllows viewing team details and membership information.

    Granted by default roles: Member, Admin
    team:updateAllows modifying team settings and membership.

    Granted by default roles: Admin
    github_team:createCreate a new team that syncs with GitHub. This enables integration between Pulumi and GitHub team structures.

    Granted by default roles: Admin

    Templates

    ValueDescription
    templates:readAllows viewing and using available templates for creating new projects and stacks.

    Granted by default roles: Member, Admin

    Template Sources

    ValueDescription
    templates_source:createAllows adding new template sources to the organization.

    Granted by default roles: Admin
    templates_source:deleteAllows removing template sources from the organization.

    Granted by default roles: Admin
    templates_source:readAllows viewing template source configurations and available templates.

    Granted by default roles: Admin
    templates_source:updateAllows modifying template source configurations and settings.

    Granted by default roles: Admin