ReferenceRole-Based Access Control

Configuring Role Based Access Control

RunReveal supports Role Based Access Control for subjects accessing resources in your workspace.

We have configured a set of default roles to simplify the management of permissions assignment to users through those roles.

Each resource has permissions defined for Read and Edit actions. Read allows read-only access to the class of resources including listing the instances of that resource. Edit allows for creation, updating, and deletion of resources (delete is included in edit permissions).

The following roles have been defined for workspaces: admin, analyst, operator and cibot. Below you will see their permissions enumerated.

PermissionDescriptionAdminAnalystOperatorCIBot
Read WorkspacesView workspace information and members
Edit WorkspacesModify workspace settings and members
Read SourcesView data sources and configurations
Edit SourcesCreate, modify, and delete data sources
Read DestinationsView destination configurations
Edit DestinationsCreate, modify, and delete destinations
Read QueriesRun queries and view detections
Edit QueriesCreate, modify, and delete queries and detections
Read ParametersView parameter configurations
Edit ParametersCreate, modify, and delete parameters
Read InvestigationsView investigation data
Edit InvestigationsCreate and modify investigations
Read FiltersView filter configurations
Edit FiltersCreate, modify, and delete filters
Read EnrichmentsView enrichment configurations
Edit EnrichmentsCreate, modify, and delete enrichments
Read NotificationsView notification configurations
Edit NotificationsCreate, modify, and delete notifications
Read Dashboard LayoutsView dashboard configurations
Edit Dashboard LayoutsCreate, modify, and delete dashboards
Read TopicsView topic configurations
Edit TopicsCreate, modify, and delete topics
Create TokensCreate workspace tokens and API keys
Manage SessionsManage user sessions
Read ChatView chat conversations and history
Edit ChatCreate new chats and send messages
Read Custom ViewsView custom views and use them in queries
Edit Custom ViewsCreate, modify, and delete custom views
Read Custom RolesView custom role configurations and assignments
Edit Custom RolesCreate, modify, and delete custom roles

Custom Roles

Custom roles provide fine-grained access control by combining UI/API permissions with data-level restrictions. Use them to implement least-privilege access, segment teams by data source, or create read-only analyst roles.

Navigate to Settings → Custom Roles to view, create, and manage custom roles.

⚠️

Feature Flag Required: Custom Roles is currently gated behind a feature flag. Please reach out to RunReveal support to request access to this feature.

Custom Roles List

Creating a Custom Role

Click + Create Custom Role to open the role configuration form.

Basic Information:

FieldRequiredDescription
Display NameYesHuman-readable identifier (auto-generates URL slug)
DescriptionNoDocument the role’s intended purpose

UI/API Permissions

Control which RunReveal features and API endpoints the role can access.

UI/API Permissions

Configuration Options:

OptionDescription
Inherit from parent roleCopy all permissions from a default role (Admin, Analyst, Operator, or CIBot)
Custom permissionsSelect specific permissions per resource

When using custom permissions, toggle individual actions for each resource:

ResourceActionsNotes
ChatRead, WriteAI chat interface access
Custom RolesRead, WriteView and manage custom roles
Custom ViewsRead, WriteSaved query views
DashboardsRead, WriteDashboard creation and viewing
DestinationsRead, WriteLog destination configuration
EnrichmentsRead, WriteEnrichment rule management
FiltersRead, WriteLog filter configuration
InvestigationsRead, Write, DeleteInvestigation management with delete capability
NotificationsRead, Write, SendNotification config and manual sending
ParametersRead, WriteWorkspace parameters
Queries & DetectionsRead, WriteDetection rules and saved queries
SessionsManageUser session management
SourcesRead, WriteLog source configuration
TokensCreateAPI token generation
TopicsRead, WriteTopic management
WorkspacesRead, WriteWorkspace settings

Use Select All or Unselect All to quickly configure permissions, then adjust individual resources as needed.

Data Access

Control access to workspace data through three independent toggles.

Data Access Controls

Access TypeDescription
Logs AccessView and query log data. When enabled, expands Log Filtering options.
Detections AccessView and manage detection results, AI agents, and detection configurations.
Management AccessAccess workspace management features including destination errors, metrics, and handler errors.

Log Filtering

When Logs Access is enabled, configure which log sources the role can access.

Access Mode:

ModeBehavior
AllowWhitelist — role can only access selected sources
DenyBlacklist — role can access all except selected sources

Filter Criteria:

FilterUse Case
Source TypeRestrict by log type (e.g., only 1Password and Okta logs)
Source IDRestrict to specific source instances (e.g., a single AWS account)

Filters are additive: if you select both source types and source IDs, the role can access logs matching either criterion.

Role List Columns

The Custom Roles list displays:

ColumnDescription
NameDisplay name and slug identifier
CountsNumber of users and API tokens assigned to this role
PermissionsBadges indicating enabled data access (Logs, Detections, Management)
CreatedRole creation date
ActionsDelete role (requires customRoles#write permission)

Common Use Cases

ScenarioRecommended Configuration
Security analyst (read-only)Logs + Detections Access enabled; all UI permissions set to Read only
SOC tier-1Allow mode with specific source types; Detections Access enabled; no Management Access
External consultantDeny mode excluding sensitive sources; limited UI permissions
DevOps teamAllow mode for infrastructure sources only (CloudTrail, Kubernetes); Sources Read/Write enabled
Compliance auditorLogs + Detections Access (read-only); no write permissions

Permissions Required

ActionRequired Permission
Create, edit, delete custom rolesCustom Roles: Write
View custom role configurationsCustom Roles: Read

Role Inheritance: Custom roles can inherit permissions from default roles, but default roles cannot inherit from custom roles. This ensures default role behavior remains stable and predictable.

Assigning Custom Roles

Assign custom roles to new users at Settings → Workspace Members by clicking “Invite Member”. Custom roles appear in the role dropdown alongside default roles (Admin, Analyst, Operator, CIBot).

Custom roles can also be assigned to API tokens at Settings → API Tokens to scope programmatic access.