Every person who needs access to your Compartment organization must be invited and assigned a role. Roles determine what a user can see and do. Compartment provides four built-in roles that cover the most common access patterns, from full administrative control down to read-only visibility.Documentation Index
Fetch the complete documentation index at: https://docs.compartment.dev/llms.txt
Use this file to discover all available pages before exploring further.
Roles and permissions
| Role | What they can do |
|---|---|
admin | Full access: manage users, configure SSO, change organization settings, deploy and manage all projects |
deployer | Deploy and manage projects and services; cannot manage users, SSO, or organization settings |
readonly | View projects and deployments; cannot see sensitive variable values or make changes |
viewer | Read-only access with a narrower scope than readonly |
Roles are hierarchical.
admin has all the permissions of deployer, which has all the permissions of readonly, and so on. You cannot grant a subset of permissions within a role.Choosing a role
- admin
- deployer
- readonly
- viewer
Assign
admin to organization owners and platform engineers who need to:- invite and remove users
- configure SSO providers
- change organization-level settings
- manage all projects and deployments
Invite a user
Run the invite command
Provide the user’s email address and the role you want to assign:For example, to invite a deployer:
Share the activation URL
If the email address is not already associated with a Compartment account, the CLI prints an activation URL:Send this URL to the new user. They must complete activation before they can log in. If the user already has an account, no activation URL is generated and they gain access immediately.
List users
To see all members of your current organization and their status:active (they have logged in at least once) or invited (they have not yet activated their account).
Grant or change a role
To update a user’s role after they have been invited:readonly user to deployer:
You can only grant roles up to your own permission level. A
deployer cannot grant the admin role.