Access Management (RBAC)

Firefly’s Access Management lets you control who can access specific parts of your cloud environment, which actions they can perform, and which data sources their permissions apply to.

This provides stronger security, clearer governance, and flexibility as your teams scale.

Overview

Access Management introduces a role-based permission model across the Firefly platform.

With RBAC you can:

  • Assign fine-grained permissions for every part of the platform

  • Control access by Users, Teams, and Service Accounts

  • Generate API keys with scoped permissions

  • Limit access to specific cloud integrations or allow full-tenant access

  • Enforce least-privilege access across your organization

RBAC applies to all major Firefly areas, including Inventory, Governance, Integrations, Notifications, IaC Explorer, and more.


Access Management Menu

Access Management consolidates identity and access controls into one place:

Access Management →

  • Users

  • Teams

  • Service Accounts

  • Roles

  • API Keys (per Users, Teams, Service Accounts)


Key Concepts

Roles

A role defines a set of permissions.

Roles can be assigned to:

  • Users

  • Teams

  • Service Accounts

Default roles

Every tenant includes two built-in roles:

  • Admin – Full access to all scopes and actions.

  • Viewer – Read-only access to all supported areas.

Admins can create additional custom roles.


Permission modes

When creating or editing a role, each role can operate in one of three modes:

Full Access (Admin)

Grants all available permissions across all data sources. All actions are enabled, and all integrations are accessible.

Read-only

Users can view everything but cannot create, update, delete, or remediate.

Limited Access (Scoped)

Fully customizable, including:

  • Specific integrations (for example, specific AWS/GCP/Azure accounts)

  • Specific actions (for example, “View Inventory” but not “Delete Asset”)

This is ideal for least-privilege or team-specific access.


Service accounts

Service accounts let you create identities for automation tools or CI/CD systems without tying them to human users.

Each service account can have:

  • Roles

  • API keys


Migration from legacy permissions

Firefly automatically migrates existing tenants into the new RBAC model.

What happens during migration

  • Existing Admins become Admin role users.

  • Existing Viewers become Viewer role users.

  • Legacy tenant-level API keys are migrated into Service-Account-level API keys.

  • All migrated keys retain their original capabilities.


Best practices

  • Use Teams to manage access at scale.

  • Use Service Accounts for automation instead of human API keys.

  • Start with Read-only roles for new users.

  • Use Scoped roles for vendors, temporary users, or least-privilege access.

  • Rotate API keys regularly, especially after migration.

  • Review role assignments periodically (for example, quarterly).


Limitations

  • Only Admins can access the Access Management screen.

  • Only Admins can manage Integrations, including create, update, and delete operations.

  • Legacy API keys will be migrated and linked to a specified Service-Account.

  • Workflows permissions will be supported using Access Management in the next phase.

Last updated

Was this helpful?