Access Management Glossary

Understand key terms used in RudderStack’s Access Management system.

This glossary alphabetically defines some commonly used terms in RudderStack’s Access Management system and documentation.

Access policy

An access policy acts as a container for one or more permissions. You can assign an access policy at the workspace, group, or member level.

Access Token

Access tokens are used for programmatic access to RudderStack APIs. RudderStack supports two types of access tokens:

Admin

Admins have full administrative access across the RudderStack platform, including workspaces, members, the Access Management settings, billing and plan information, and more.

Group

A group is a collection of members that share a policy per workspace. Groups allow Admins to create custom roles and share consistent access patterns without manual duplication.

Member

A member is a user in RudderStack. A member’s Access Policy determines what they can and cannot do in a given workspace.

Member workspace policy

A member workspace policy is a bundle of permissions that apply only to a specific member. It is useful for fine-tuning access.

For example, you can grant Edit access for Event Stream Sources to a group of developers, but grant Connect permissions for Event Stream Sources only to that team’s manager through their individual member workspace policy.

Organization roles

RudderStack’s Access Management system offers two roles within an organization:

  • Member: Users with configurable workspace access and policies.
  • Admin: Platform administrators with full admin access across all workspaces, including the ability to manage members

See Member Management for more information.

Permission

Permissions represent specific actions that a user can take and are the building blocks for policies.

Edit

The Edit permission lets a user change the configuration of an existing resource.

For example, a member granted Edit permission on a specific destination can change its configuration settings in the dashboard.

Connect

The Connect permission grants the ability to connect one resource to another. For example, connecting an Event Stream source to a destination, a transformation to a destination, etc.

info
To make a connection, that is, build a data pipeline, a member must have both Edit and Connect permissions on both resources.

Create & Delete

The Create & Delete permission lets a user create new resources or delete existing resources for a specific resource type.

For example, a member granted Create & Delete permission for Event Stream Sources can add or delete Event Stream sources.

PII permissions

announcement
The ability to configure PII permissions is available only in RudderStack’s Enterprise plan.

The PII permissions control whether a user can access views or APIs that expose Personally Identifiable Information (PII) in payloads.

Policy-based Access Control (PBAC)

RudderStack’s Access Management system is based on Policy-based Access Control (PBAC), which lets Admins define granular permissions for resources and actions and assign them to users directly via an access policy.

See Key Concepts for more details.

Resource

A configurable unit within RudderStack, for example:

  • Event Stream Sources
  • Destinations
  • Transformations
  • Tracking Plans
  • Data Catalog

Resources are permission-scoped and governed through policies.

Role-based Access Control (RBAC)

RudderStack’s legacy Permissions Management (RBAC) system assigned broad, predefined roles to users rather than granular, per-resource permissions.

warning

The legacy RBAC system is deprecated and replaced by the Access Management (PBAC) system, which offers enhanced security, granular control, and compliance capabilities.

See the Migration Guide guide to transition to the new system.

Workspace

A workspace is an isolated environment (for example, Prod or Dev) where access policies and resources are scoped independently.


Questions? We're here to help.

Join the RudderStack Slack community or email us for support