Roles & Permissions
ByteOr Cloud resolves authorization through organization and project roles, then applies environment-level checks on the resulting operation.
Cloud is still a guide-first public surface, so this page keeps the central RBAC summary and links back out to the repo-owned Cloud docs for operator workflow detail.
ByteOr Cloud uses role-based access control (RBAC) to govern who can view, modify, and operate resources. Roles are assigned at the organization or project scope and cascade downward through the resource hierarchy.
Roles
Permission Matrix
Each permission maps to one or more API actions. The matrix below shows which roles grant each permission.
Role Resolution Rules
When a user has roles at multiple scopes, the following rules determine effective permissions:
org_adminoverride — Anorg_adminimplicitly holds every permission on every project and environment within the organization. No additional role assignments are needed.- Project-level fallback — If a user has no project-specific role, the system checks for an organization-level role. A
viewerrole at the org level grantsViewProjectandViewEnvironmentacross all projects. - Nested scope enforcement — Permissions required for a resource at the environment level also require the corresponding view permission at the project and organization level. For example,
OperateEnvironmentrequiresViewProjecton the parent project.
Audit Events
Every authorization decision and identity event is recorded in the audit log. Each entry includes the fields: outcome, actor, resource_scope, and timestamp.