Skip to main content
Draftt uses role-based access control (RBAC) to determine what each user can see and do. Roles are assigned per user and control access to inventory data, governance policies, integrations, and settings.

Built-in Roles

Draftt has three built-in roles covering the access patterns across engineering organizations.
RoleIntended For
AdminOrganization administrators and platform leads. Full access to all platform capabilities including integrations, governance policies, and user management.
DeveloperEngineering team members. Full visibility into inventory and governance data. Can create and manage policies, workflows, notification rules, and custom tags. Cannot modify platform configuration or manage users.
ViewerStakeholders, compliance reviewers, and observers. Read-only access to inventory and dashboards. No configuration capabilities.

Permission Matrix

CapabilityAdminDeveloperViewer
View inventory
Run DrafttQL queries
Export inventory data
View governance policies
Create / edit / delete policies
Create / edit / delete workflows
Create / edit / delete notification rules
Create / edit / delete custom tags
Create tickets
Add / remove integrations
View compliance posture
Manage users
Configure SSO / SCIM
Manage API keys
Users can only generate API keys scoped to their own role. A Developer can create Developer-scoped keys but not Admin-scoped keys.

Assigning Roles

Manual Assignment

Go to Settings > User Management > Users. Find the user and select a role from the dropdown. Role changes take effect immediately. Active sessions are not interrupted but the new permissions apply on the user’s next action.

Via SCIM Group Mapping

When SCIM Provisioning is configured, roles are assigned automatically based on IdP group membership. See the SCIM documentation for group mapping configuration.

Via SSO JIT

Users provisioned via Just-in-Time SSO receive the default role configured in Account Settings > Configure SSO > JIT Configuration. This is typically Developer or Viewer. Admins can update the role after provisioning.

User Scope

A user’s Scope is derived from CMDB records and IDP catalog data, defining exactly which resources they can access. While a Role governs the actions a user can perform within Draftt, the Scope establishes the boundaries of the resources they are permitted to manage.

Next Steps

  • Configure SCIM Provisioning to automate role assignment from your IdP
  • Set SSO defaults for JIT-provisioned users