Skip to main content

Roles & Access

Learn how to set up AuthZ roles and permissions

Roles are used to define both role-based (RBAC) and relationship-based (ReBAC) access controls. In RBAC, only the role Name and Description for the role are defined. When using a relationship-based authorization model, a Resource Type must be selected.

An RBAC model gives global permissions to all resources of a resource type across the system. For example, an administrator could have create, read, update, and delete (CRUD) access to the folder resource type. A user assigned the administrator role would then have CRUD access to every folder object.

A ReBAC model gives permissions to users based on their relationship to that object. For instance, a folder#administrator would have administrative access only to specific folder resource(s).

Create a role

Complete the following to create a role in AuthZ:

  1. In the Pangea Console, navigate to AuthZ >> Roles & Access.
  2. Click + Role.
  3. Type a Name and Description for the role.
  4. To limit the scope of a Role to a specific resource or object, define a relationship for the role. The format is user is a {role} of {resource type}. For example, if the viewer role for articles was being created, then it might be something like “user is a viewer of article”.
  5. Click Save.

Delete a role

Complete the following to delete a role in AuthZ:

  1. In the Pangea Console, navigate to AuthZ >> Roles.
  2. Click the (-) button beside the role to delete.
  3. In the modal, type the Name of the role to confirm.
  4. Click Delete.

Was this article helpful?

Contact us

Secure AI from cloud to code

636 Ramona St Palo Alto, CA 94301

©2025 Pangea. All rights reserved.

PrivacyYour Privacy ChoicesTerms of UseLegal Notices
Contact Us