Skip to main content

Role Assignment

Overview

ASCEND implements a comprehensive Role-Based Access Control (RBAC) system with five primary roles and a six-level access hierarchy. This dual-layer approach provides both familiar role names and granular permission control, enabling precise access management for enterprise security requirements.

Prerequisites

  • Admin or Super_Admin role to manage roles
  • Understanding of your organization's access requirements
  • Knowledge of compliance requirements (SOC 2, HIPAA, PCI-DSS)

Role Definitions

Primary Roles

ASCEND provides five predefined roles, each with specific capabilities:

RoleValueDescriptionAccess Level
ViewerviewerRead-only access to dashboards1 (Basic)
AnalystanalystCreate rules and view alerts2 (Power)
AdminadminFull access except billing4 (Admin)
Super_Adminsuper_adminExecutive-level privileges5 (Executive)
Org_Adminorg_adminFull administrative access5 (Executive)

Access Level Hierarchy

The RBAC system uses six access levels (0-5) for fine-grained control:

LevelNameDescription
0RestrictedSuspended/probationary users
1BasicStandard users - dashboard only
2PowerPower users - analytics + alerts
3ManagerManagers - authorization capabilities
4AdministratorFull system access
5ExecutiveAll privileges + reporting

Step-by-Step Guide

Changing a User's Role

  1. Navigate to Admin Console > Users tab
  2. Locate the user in the table
  3. Find the "Role" column with dropdown selector
  4. Select the new role from dropdown
  5. Confirm the change (automatic save)
  6. Success toast appears

Granting Organization Admin

  1. Open user's action menu (three-dot icon)
  2. Select "Edit Profile"
  3. Toggle "Organization Admin" checkbox
  4. Click "Save Changes"
  5. User gains is_org_admin flag

Bulk Role Changes

  1. Select multiple users using checkboxes
  2. Click "Change Role" in bulk action bar
  3. Select new role from dropdown
  4. Provide reason for audit trail
  5. Click "Confirm Role Change"

Permission Matrix

Feature Access by Role

FeatureViewerAnalystAdminSuper_AdminOrg_Admin
Dashboard (View)YesYesYesYesYes
Analytics (View)YesYesYesYesYes
Analytics (Export)NoYesYesYesYes
Alerts (View)YesYesYesYesYes
Alerts (Acknowledge)NoYesYesYesYes
Alerts (Dismiss)NoNoYesYesYes
Rules (View)NoYesYesYesYes
Rules (Create)NoYesYesYesYes
Rules (Modify)NoYesYesYesYes
Rules (Delete)NoNoYesYesYes
Authorization CenterNoNoYesYesNo
AI Rule EngineNoNoYesYesNo
SettingsNoNoYesYesNo
Admin ConsoleNoNoNoYesYes
User ManagementNoNoNoYesYes
BillingNoNoNoYesYes
API Key ManagementNoNoYesYesNo

Authorization Approval by Level

Approval TypeLevel 1Level 2Level 3Level 4Level 5
Low RiskNoNoNoYesYes
Medium RiskNoNoYesYesYes
High RiskNoNoNoYesYes
Critical RiskNoNoNoNoYes
Emergency OverrideNoNoNoNoYes

Role Descriptions

Viewer (Level 1)

The Viewer role provides read-only access for stakeholders who need visibility without modification capabilities.

Typical Users:

  • Executive sponsors
  • Auditors
  • Compliance officers
  • External consultants

Capabilities:

  • View dashboard metrics
  • View analytics reports
  • View alert summaries
  • No modification permissions

Limitations:

  • Cannot acknowledge or dismiss alerts
  • Cannot create or modify rules
  • Cannot approve actions
  • Cannot access admin functions

Analyst (Level 2)

The Analyst role enables security team members to actively work with alerts and rules.

Typical Users:

  • Security analysts
  • SOC team members
  • DevSecOps engineers
  • Security researchers

Capabilities:

  • All Viewer permissions
  • Acknowledge alerts
  • Create and modify rules
  • Export analytics data
  • View authorization queue

Limitations:

  • Cannot dismiss alerts
  • Cannot delete rules
  • Cannot approve actions
  • Cannot manage users

Admin (Level 4)

The Admin role provides full operational control for security managers and team leads.

Typical Users:

  • Security managers
  • Team leads
  • Senior analysts
  • Security architects

Capabilities:

  • All Analyst permissions
  • Dismiss alerts
  • Delete rules
  • Approve low/medium/high risk actions
  • Manage API keys
  • Configure settings

Limitations:

  • Cannot approve critical actions
  • Cannot use emergency override
  • Cannot manage billing
  • Cannot manage other admins

Super_Admin (Level 5)

The Super_Admin role provides executive-level access with complete platform control.

Typical Users:

  • CISOs
  • Security directors
  • IT executives
  • Platform owners

Capabilities:

  • All Admin permissions
  • Approve critical actions
  • Emergency override capability
  • Full user management
  • Billing management
  • All audit access

Special Powers:

  • Can approve any action regardless of risk level
  • Can override policies in emergencies
  • Can delete audit logs (where permitted)
  • Can manage all users including other admins

Org_Admin (Level 5)

The Org_Admin role focuses on organizational administration rather than security operations.

Typical Users:

  • Organization owners
  • Account managers
  • Administrative staff

Capabilities:

  • Admin Console access
  • User management
  • Organization settings
  • Billing management

Note: Org_Admin does not automatically grant access to security operations features like the Authorization Center or AI Rule Engine.

Configuration Options

OptionDescriptionDefault
rolePrimary role nameviewer
is_org_adminOrganization admin flagfalse
approval_levelRBAC access level (0-5)Derived from role
is_emergency_approverCan use emergency overridefalse

Best Practices

  1. Follow Least Privilege

    • Start users with Viewer role
    • Upgrade only when business need is demonstrated
    • Document justification for elevated roles
  2. Separate Duties

    • Use different roles for rule creation vs. approval
    • Avoid combining Org_Admin with operational roles
    • Require multiple approvers for critical actions
  3. Regular Reviews

    • Audit role assignments quarterly
    • Review elevated privileges monthly
    • Remove unnecessary admin access promptly
  4. Document Role Decisions

    • Record why each user has their role
    • Track role change requests
    • Maintain approval records
  5. Emergency Access Management

    • Limit emergency approvers to 2-3 users
    • Review emergency override usage
    • Require post-incident justification

API Reference

Update User Role

PATCH /api/admin/users/{user_id}/role
Authorization: Bearer <token>
X-CSRF-Token: <csrf_token>
Content-Type: application/json

{
"role": "admin",
"is_org_admin": false,
"access_level": 4
}

Response:

{
"success": true,
"message": "User role updated"
}

Update Access Level Only

PATCH /api/admin/users/{user_id}/access-level
Authorization: Bearer <token>
X-CSRF-Token: <csrf_token>
Content-Type: application/json

{
"access_level": 3,
"reason": "Promoted to team lead"
}

Compliance Mapping

RequirementStandardRole Implementation
Access controlSOC 2 CC6.1Five distinct roles
Segregation of dutiesSOC 2 CC6.3Role separation
Unique identificationHIPAA 164.312(a)(2)(i)Per-user role assignment
Access authorizationPCI-DSS 7.1Role-based permissions
Least privilegeNIST AC-6Graduated access levels
Account managementNIST AC-2Role lifecycle management

Troubleshooting

Cannot Change User Role

IssueCauseSolution
Dropdown disabledUser is organization ownerOwner role cannot be changed
403 ErrorInsufficient privilegesOnly admins can change roles
Cannot demote selfSelf-demotion blockedAnother admin must change your role

Access Not Working After Role Change

IssueCauseSolution
Old permissions activeBrowser cacheClear cache and refresh
New permissions missingToken not refreshedUser should log out and back in
Partial accessRole/level mismatchVerify both role and access_level