RBAC
Role-Based Access Control for managing permissions across your organization.
Note:
Advanced RBAC features are coming soon. Basic role management is currently available.
RBAC (Role-Based Access Control) manages who can do what within Lasius. Permissions are assigned through roles rather than directly to users.
How RBAC Works
- Roles define a set of permissions
- Users are assigned roles
- Permissions control what actions are allowed
Role Hierarchy
Organization Roles
| Role | Description | Key Permissions |
|---|---|---|
| Owner | Organization creator | Full control, billing, delete org |
| Admin | Organization manager | Manage users, workspaces, settings |
| Member | Standard user | Access assigned workspaces |
Workspace Roles
| Role | Description | Key Permissions |
|---|---|---|
| Owner | Workspace creator | Full control, delete workspace |
| Admin | Workspace manager | Manage members, settings |
| Editor | Content creator | Create, edit workflows |
| Viewer | Read-only access | View workflows and runs |
Permission Matrix
| Resource | Org Owner | Org Admin | WS Owner | WS Editor | WS Viewer |
|---|---|---|---|---|---|
| Organization | CRUD | RU | R | R | R |
| Workspace | CRUD | CRUD | CRUD | R | R |
| User Management | CRUD | CRUD | CRUD | - | - |
| Workflow | CRUD | CRUD | CRUD | CRUD | R |
| Team | CRUD | CRUD | CRUD | CRUD | R |
| Agency | CRUD | CRUD | CRUD | CRUD | R |
| Knowledge Base | CRUD | CRUD | CRUD | CRUD | R |
| MCP Server | CRUD | CRUD | CRUD | CRUD | R |
| Guardrails | CRUD | CRUD | CRUD | R | R |
| Secrets/Variables | CRUD | CRUD | CRUD | RU | - |
| Billing | CRUD | R | - | - | - |
Legend: C=Create, R=Read, U=Update, D=Delete, -=No Access
Assigning Roles
At Organization Level
- Org owners can assign org roles
- Determines what users can do across the organization
At Workspace Level
- Workspace admins assign workspace roles
- Controls permissions within that specific workspace
Best Practices
- Principle of least privilege — Give minimum required access
- Regular audits — Review role assignments periodically
- Use groups — Assign roles to groups for easier management (coming soon)
- Document policies — Maintain clear access policies
Coming Soon
- Custom role definitions
- Fine-grained permissions
- Role inheritance
- Permission groups
- Audit logging for access changes