Roles predefine access to a particular resource, or
instances of a particular resource type (for example, Catalog API roles can be scoped to a particular API or all APIs while Control Plane roles can be scoped to a particular Control Plane or all Control Planes).
You can manage a user’s roles by navigating to Organization > Users in Konnect and clicking the Role Assignments tab for a user.
Konnect provides the following predefined roles.
The following describes the predefined roles for Analytics:
|
Role
|
Description
|
Dashboard viewer
|
Users can view the Analytics summary and report data. - Cannot edit dashboards - Can apply temporary filters during a session - Can only see dashboards they are explicitly granted access to
|
Important: API Product roles only apply to classic Dev Portals (v2). We recommend migrating to the new Dev Portal (v3) and using Catalog API roles instead.
The following describes the predefined roles for API Products:
| Role |
Description |
Admin
|
This role grants full write access to an API product and its versions.
|
Application Registration
|
This role grants permission to enable and disable application registration on an API product.
|
Creator
|
This access is required to create API products. This access is not for creating sub-entities such as versions, API specs, etc.
|
Deployer
|
This role grants permission to deploy and remove an API product from a control plane.
|
Maintainer
|
This role grants all write permission to manage an API product and to administer plugins.
|
Plugins Admin
|
This role grants full write permission to administer plugins.
|
Publisher
|
This role grants permission to publish an API product to one or more portals.
|
Viewer
|
Viewer has read-only access to an API product and its sub-entities.
|
Note: To publish API products to a classic Dev Portal, you need at least a Viewer role for Dev Portal in addition to the API Products Publisher role.
The following describes the predefined roles for Control Planes:
| Role |
Description |
Admin
|
This role grants full write access to all entities within a control plane.
|
Certificate Admin
|
This role grants full write access to administer certificates.
|
Consumer Admin
|
This role grants full write access to administer consumers.
|
Creator
|
Creates a new Control Plane in an organization. The creator becomes the owner of the Control Plane they create.
|
Deployer
|
This role grants full write access to administer services, routes and plugins necessary to deploy services in Service Hub.
|
Gateway Service Admin
|
This role grants full write access to administer gateway services.
|
Plugin Admin
|
This role grants full write access to administer plugins.
|
Route Admin
|
This role grants full write access to administer routes.
|
SNI Admin
|
This role grants full write access to administer SNIs.
|
Upstream Admin
|
This role grants full write access to administer upstreams.
|
Viewer
|
This role grants read only access to all entities within a control plane.
|
The following describes the predefined roles for audit logs:
| Role |
Description |
Admin
|
This role grants full write access to the Audit log configuration.
|
The following describes the predefined roles for identity:
| Role |
Description |
Admin
|
This role grants full write access to the Identity configuration.
|
The following describes the predefined roles for Mesh:
| Role |
Description |
Admin
|
This role grants full write access to the related to Mesh control planes.
|
Connector
|
This role grants a mesh zone to connect to the mesh control plane in Konnect.
|
Creator
|
This role grants access to create new Mesh control planes.
|
Viewer
|
This role grants access to read-only permissions to Mesh control planes.
|
The following describes the predefined roles for Metering & Billing:
|
Role
|
Description
|
Ingest
|
Ingests events only (intended only for machines).
|
Admin
|
Can read and write every resource. Includes billing apps, billing profiles, and notifications.
|
Viewer
|
Can read every resource. Includes billing apps, billing profiles, and notifications.
|
Metering Admin
|
Can write any metering resources (includes meters and events).
|
Metering Viewer
|
Can read any metering resources (includes meters and events).
|
Product Catalog Admin
|
Can write any Product Catalog resources (includes plans, features, and rate cards).
|
Product Catalog Viewer
|
Can read any Product Catalog resources (includes plans, features, and rate cards).
|
Billing Admin
|
Can read and write customer, subscription, entitlement, and invoice resources.
|
Billing Viewer
|
Can read customer, subscription, entitlement, and invoice resources.
|
The following describes the predefined roles for networks:
|
Role
|
Description
|
Network Admin
|
Access to all read and write permissions related to a network.
|
Network Creator
|
Access to creating networks.
|
Network Viewer
|
Access to read-only permissions to networks.
|
The following describes the predefined roles for Catalog:
|
Role
|
Description
|
Integration Admin
|
Can view and edit all integrations (install/authorize).
|
Integration Viewer
|
Access to read-only permissions to integrations.
|
Scorecard Viewer
|
Access read-only permissions related to Scorecards.
|
Scorecard Admin
|
Can view and edit a select list of Catalog services, map resources to those services, manage all resources, and has read-only access to all integrations and integration instances.
|
Service Admin
|
Can view and edit a select list of services, map resources to those services, and manage all resources and discovery rules.
|
Service Creator
|
Can create new Catalog services, becomes the Service Admin for any service they create, and can view and edit all resources.
Includes read-only access to all integrations and integration instances.
This role does not grant access to existing services or their configurations. See the Service Admin role.
This role does not grant write access to integration instances. See the Integration Admin role.
|
Service Viewer
|
Can view a select list of services and all resources and discovery rules.
|
The following describes the predefined roles for Catalog APIs. Read, edit, and delete access is granted per-API. Only the create and list permissions are granted at the org level.
|
Role
|
Description
|
CRUD permissions
|
API Creator
|
Creates APIs at the org level.
|
|
API Admin
|
Controls APIs on a per-API level and can list APIs in an org.
|
- Read, edit, delete, and list APIs
|
API Maintainer
|
Maintains APIs on a per-API level.
|
- Read, edit, and list APIs
|
API Viewer
|
Reads APIs on a per-API level and can list APIs in an org.
|
|
API Publisher
|
Views APIs and publishes APIs on a per-API level.
|
- Read, list, and publish APIs
|
The following describes the predefined roles for Dev Portal:
|
Role
|
Description
|
CRUD permissions
|
Admin
|
Owner of an existing Dev Portal instance. The owner has full write access related to any developers and applications in the organization.
|
- Read, edit, list and delete Dev Portals
- List, create, read, edit, and delete applications
- List, create, read, edit, and delete developers
- Create, edit, delete, read, and list teams
- Add and remove a role to teams, list roles in teams
- Add, remove, and list developers from teams
- Create, edit, delete, read, and list API versions
- Publish to Dev Portal
|
Appearance Maintainer
|
Access the Portal instance and edit its appearance.
|
- Read and list Dev Portals
|
Creator
|
Create new Portals.
|
- Create, read, and list Dev Portals
|
Maintainer
|
Edit, view, and delete Dev Portal applications, and view developers.
|
- Read and list Dev Portals
- List, read, edit, and delete applications
- List and read developers
- Create, edit, delete, read, and list API versions
- Edit Dev Portal appearance
- Publish to Dev Portal
|
Product Publisher
|
Manage publishing products to a Dev Portal.
|
- Read and list Dev Portals
- Create, edit, delete, read, and list API versions
- Publish to Dev Portal
|
Viewer
|
Read-only access to Dev Portal developers and applications.
|
- Read and list Dev Portals
- List and read applications
- List and read developers
- List and read API versions
|
Content Editor
|
Edits Dev Portal pages, snippets, and customization.
|
- Read and list Dev Portals
- Edit pages
- Edit snippets
- Edit customization
|
API Registration Approver
|
Can approve Dev Portal application registrations.
This role also requires the Dev Portal Viewer role to list APIs.
|
- Read and list APIs (permission is granted per API)
- Grant API access
|
The following describes the predefined roles for application auth strategies:
|
Role
|
Description
|
CRUD permissions
|
Auth strategy creator
|
Create new app auth strategies.
|
- Create auth strategy
- Read and list auth strategy
|
Auth strategy maintainer
|
Edit one or all app auth strategies.
|
- Edit, delete, read, and list auth strategies
|
Auth strategy viewer
|
Read-only access to one or all app auth strategies.
|
- Read and list auth strategies
|
The following describes the predefined roles for dynamic client registration (DCR):
|
Role
|
Description
|
CRUD permissions
|
DCR provider creator
|
Create new DCR providers.
|
- Create and read DCR providers
|
DCR provider maintainer
|
Edit one or all DCR providers.
|
- Edit, delete, and read DCR providers
|
DCR provider viewer
|
Read-only access to one or all DCR providers.
|
|