Ability to override Alerts and retry warehouse syncs (for both sources and destinations).
Bot management and the ability to manage Credentials to securely store sensitive keys and secrets for use in transformations.
For many resources, you can configure permissions at a resource level, meaning you can choose a subset of resources to which the permission applies.
A sample resource permissions policy configuration for a workspace is shown below:
Edit, Connect, and Create & Delete permissions
You can assign Edit, Connect, and Create & Delete permissions to resources.
Permission
Description
Edit
Make changes to the configuration of resources.
Connect
Connect two resources.
Create & Delete
Create or delete resources for a resource type.
Permissions dependencies
Depending on the type of resource, some permissions have dependencies across resources. The table below provides details on dependencies.
Resource
Permission
Dependencies
Sources
Destinations
Transformations
Tracking Plans
Tables
Audiences
SQL Models
Connect
Edit and Connect permissions are required on both resources (source and destination, transformation and destination, source and Tracking Plan, etc.) to make a successful connection
Data Catalog
Edit events and properties that are part of a Tracking Plan
Edit permission for that Tracking Plan
PII permissions
The ability to configure PII permissions is available only in RudderStack’s Enterprise plan.
The PII section lets you configure permissions for viewing parts of the platform where payloads might contain PII. These include:
Live events from Event Stream pipelines (Sources, Destinations, and Transformations)
Live events from Reverse ETL sources (created via tables, SQL models, or Audiences)
In this case, you need only the Destination Failure Samples PII permission for the specific destination — the Transformation Failure Samples PII permission is not required.
The granular resource and PII restrictions apply across both the RudderStack dashboard and API layers, ensuring comprehensive privacy control.
You can configure Edit and PII permissions for specific resources within your workspace. To grant Edit permission for a subset of Event Stream sources, click the dropdown next to Event Streams and select the sources.
Similarly, you can grant PII access to Live Events for a subset of sources:
Example
Suppose a workspace has three Event Stream sources (S1, S2, and S3) and three destinations (D1, D2, and D3). You can configure the Baseline Workspace Policy to grant:
Edit permission only for sources S1 and S2
Edit permission only for destinations D1 and D2
Connect permission for sources
Connect permission for destinations
PII permission to view live events only for source S1
The baseline access policy then looks as follows:
What the member can do
A member inheriting the above baseline policy will be able to:
Edit only sources S1 and S2
Edit only destinations D1 and D2
Connect sources S1 and S2 to destinations D1 and D2
View Live Events for source S1
What the member cannot do
The member will not be able to:
Edit source S3
Edit destination D3
Make any connections to source S3
Make any connections to destination D3
View Live Events for sources S2 and S3
View Live Events or failure samples for destinations D1, D2, and D3
Members without the above granular permissions will see greyed-out UI elements with explanatory tooltips, as shown below:
Without resource permissions
Without PII permissions
Plan-wise limits
See the Plan-wise Features guide for more details on granular resource and PII permission limits across different RudderStack plans.
Questions? We're here to help.
Join the RudderStack Slack community or email us for support
This site uses cookies to improve your experience while you navigate through the website. Out of
these
cookies, the cookies that are categorized as necessary are stored on your browser as they are as
essential
for the working of basic functionalities of the website. We also use third-party cookies that
help
us
analyze and understand how you use this website. These cookies will be stored in your browser
only
with
your
consent. You also have the option to opt-out of these cookies. But opting out of some of these
cookies
may
have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This
category only includes cookies that ensures basic functionalities and security
features of the website. These cookies do not store any personal information.
This site uses cookies to improve your experience. If you want to
learn more about cookies and why we use them, visit our cookie
policy. We'll assume you're ok with this, but you can opt-out if you wish Cookie Settings.