Skip to content

Commit 2443760

Browse files
authored
Merge branch 'main' into copilot/update-agents-screenshot-branding
2 parents 17038ec + 76fb4a0 commit 2443760

1 file changed

Lines changed: 58 additions & 6 deletions

File tree

docs/administration/users-and-rbac.md

Lines changed: 58 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -55,13 +55,63 @@ To create a new role in OpenAEV:
5555

5656
1. Go to **Settings → Security → Roles**.
5757
2. Click on **Create role**. Enter a **name** and an optional **description** for the role
58-
3. Select the **capabilities** that should be included in this role, such as:
59-
- Access assets
60-
- Manage dashboards
61-
- Delete documents
62-
- ...
58+
3. Select the **capabilities** that should be included in this role.
6359
4. Save the role.
6460

61+
### Capabilities
62+
63+
Capabilities in OpenAEV are organized hierarchically. A parent capability (e.g. `Access assessment`) must be granted before its children (e.g. `Manage assessment`, `Delete assessment`) can be assigned. Indentation below reflects this hierarchy.
64+
65+
Below is a full list of capabilities in OpenAEV
66+
67+
| Capability | Description |
68+
|:-----------|:------------|
69+
| `Bypass (user has all rights)` | Grants unconditional access to all platform features, bypassing every individual capability check and any data segregation enforcement. |
70+
| **Assessments: Scenarios, simulations and atomic testings** | |
71+
| `Access assessment` | Read-only access to assessments, including scenarios, simulations and atomic tests. |
72+
|   `Manage assessment` | Create and update assessments (scenarios, simulations, atomic tests). Requires *Access assessment*. |
73+
|     `Delete assessment` | Permanently delete assessments. Requires *Manage assessment*. |
74+
|   `Launch assessment` | Execute / run an assessment against defined targets. Requires *Access assessment*. |
75+
| **Targets** | |
76+
| `Access teams & players` | Read-only access to teams and player definitions used as assessment targets. |
77+
|   `Manage teams & players` | Create and update teams and players. Requires *Access teams & players*. |
78+
|     `Delete teams & players` | Permanently delete teams and players. Requires *Manage teams & players*. |
79+
| `Access assets` | Read-only access to asset inventory (hosts, endpoints, and other infrastructure targets). |
80+
|   `Manage assets` | Create and update assets in the inventory. Requires *Access assets*. |
81+
|     `Delete assets` | Permanently delete assets from the inventory. Requires *Manage assets*. |
82+
| `Access security platforms` | Read-only access to integrated security platform configurations (e.g. SIEM, EDR, firewall connectors). |
83+
|   `Manage security platforms` | Create and update security platform integrations. Requires *Access security platforms*. |
84+
|     `Delete security platforms` | Permanently delete security platform integrations. Requires *Manage security platforms*. |
85+
| **Payloads** | |
86+
| `Access payloads` | Read-only access to the payload library (attack scripts, tools, and techniques used in simulations). |
87+
|   `Manage payloads` | Create and update payloads in the library. Requires *Access payloads*. |
88+
|     `Delete payloads` | Permanently delete payloads from the library. Requires *Manage payloads*. |
89+
| **Dashboards** | |
90+
| `Access dashboards` | Read-only access to platform dashboards and their visualizations. |
91+
|   `Manage dashboards` | Create, update, and configure dashboards. Requires *Access dashboards*. |
92+
|     `Delete dashboards` | Permanently delete dashboards. Requires *Manage dashboards*. |
93+
| **Findings** | |
94+
| `Access findings` | Read-only access to assessment findings and results generated from simulations and atomic tests. |
95+
| **Content** | |
96+
| `Access documents` | Read-only access to documents stored in the platform (reports, attachments, playbooks). |
97+
|   `Manage documents` | Upload, create, and update documents. Requires *Access documents*. |
98+
|     `Delete documents` | Permanently delete documents. Requires *Manage documents*. |
99+
| `Access channels` | Read-only access to communication channels used to deliver exercise injects to players. |
100+
|   `Manage channels` | Create and update channels. Requires *Access channels*. |
101+
|     `Delete channels` | Permanently delete channels. Requires *Manage channels*. |
102+
| `Access challenges` | Read-only access to challenges (CTF-style tasks or objectives assigned to players during exercises). |
103+
|   `Manage challenges` | Create and update challenges. Requires *Access challenges*. |
104+
|     `Delete challenges` | Permanently delete challenges. Requires *Manage challenges*. |
105+
| `Access lessons learned` | Read-only access to lessons learned records captured after assessments or exercises. |
106+
|   `Manage lessons learned` | Create and update lessons learned entries. Requires *Access lessons learned*. |
107+
|     `Delete lessons learned` | Permanently delete lessons learned entries. Requires *Manage lessons learned*. |
108+
| **Platform Settings** | |
109+
| `Access Platform Settings` | Read-only access to platform-wide configuration and administration settings. |
110+
|   `Manage platform settings` | Modify platform-wide settings including security configuration, integrations, and system parameters. Requires *Access Platform Settings*. |
111+
112+
113+
114+
65115
!!! info "Hierarchical permissions"
66116

67117
Permissions are organized hierarchically by indentation: selecting a permission further to the right (e.g., Delete) will automatically enable the less-indented ones that precede it (e.g., Manage and Access).
@@ -78,7 +128,9 @@ To create a new role in OpenAEV:
78128

79129
Once the role is created, it can be assigned to a **group**. All users in that group will automatically inherit the role’s permissions.
80130

81-
### Example : Crisis content creator
131+
132+
133+
## Example : Creating a Crisis content creator role
82134

83135
> Role : Crisis content creator
84136

0 commit comments

Comments
 (0)