User role authorization by use case

Authorization of these user roles follows a Role-based Access Control (RBAC) model with the restrictions applying to a specific scopeeither within one project or within one account.

The following list does not cover Postgres cluster database authorization.

As of now, you cannot create custom roles. There are only these 11 predefined roles available:

PermissionsOrg adminOrg ownerPlatform adminGenAI Builder userProject ownerProject editorProject viewerEstate ingesterCatalog data readerCatalog data writer
Access GenAI Builder (launchpad)X
Configure GenAI BuilderX
Access Ops apps (launchpad)X
View projects within the orgXX
Update and delete projectsX
View roles assigned at the project levelXXXX
View activity log for the orgXX
View and download usage report for the projectXXX
View and download usage report the the orgXX
Create projects within the orgX
Assign project rolesXX
Create, edit, and delete clustersXX
View clusters, backups, estates, and migrationsXXX
Assign org rolesX
View activity log for the projectXXX
View, edit, and delete owned projectsX
Ingest self-managed Postgres cluster dataX*
Create, update, and delete catalogXX
Read catalogX
Read Iceberg dataXX
Write and delete Iceberg dataX
  • Only machine-users can be assigned to ingest self-managed cluster data.

Could this page be better? Report a problem or suggest an addition!