Team and roles
This is for inviting your team to the Agent Handler dashboard - engineers, security, ops. Not for your end users (those are Registered Users, an entirely separate concept).
Members get a role. Roles map to a permission set. Four default roles cover most teams; custom roles cover the rest.
Inviting a member
From Settings → Organization, click Invite member, enter their email, pick a role, send. They get an email with a link; clicking it lands them in the dashboard with the role you assigned.
If your org requires SSO or SCIM, members get provisioned through your IdP instead - see Single sign-on and SCIM provisioning.
Default roles
Picking the right split
- Startup, small team. Everyone is Admin. Move people off Admin once you have someone owning security or billing.
- Mid-size, separated security. Engineers as Developer, security or compliance lead as Security, founders/leads as Admin. The most common pattern.
- Large org, full RBAC. Add custom roles for your specific shapes - “Connector ops” can manage Connectors but not Tool Packs; “Auditor” gets read-only on logs and Audit Trail.
Don’t default everyone to Admin. Admin can rotate API keys and remove other members, both hard to recover from.
Custom roles
When the defaults don’t fit, define a custom role. Example shapes that come up often:
- Tool Pack owner. Edit Tool Packs, view Registered Users, no security or billing access.
- Compliance officer. Read everything, edit security rules, no tool-pack edits, no member management.
- On-call. View logs and alerts, no other access.
To create one:
- Open Settings → Roles.
- Click Add custom role.
- Name it.
- Toggle the specific permissions you want. Each permission shows what surface it grants - read or write, on which resource type.
- Save.
The role is now assignable to members. Permissions on existing members aren’t changed retroactively; you have to assign the new role from the member’s profile.
When members leave
Two paths:
- Just remove them. Their dashboard access ends immediately. They can be re-invited later if they come back.
- Convert to read-only first, then remove. Useful in regulated environments where you want a paper trail before revoking - change their role to Read-Only, document the change in the Audit Trail, then remove a few days later.
If they were the only Admin, promote someone else first. The dashboard requires at least one Admin.
Next
Authenticate members through your IdP with Single sign-on.