Custom Permissions custom-permissions

Learn how you can use custom permissions to create custom permission profiles with configurable permissions to restrict access to programs, pipelines, and environments for Cloud Managers users.

Introduction introduction

Cloud Manager has a set of pre-defined roles which govern access to various features of cloud manager:

  • Business Owner
  • Program Manager
  • Deployment Manager
  • Developer

Custom permissions let users create custom permission profiles with configurable permissions to restrict access for Cloud Managers users to programs, pipelines, and environments.

TIP
For details on pre-defined roles, see AEM as a Cloud Service Team and Product Profiles.

Using Custom Permissions using

To create and use your own custom permissions, it requires three steps:

This section details these steps. You may find it useful to see Terms and Configurable Permissions sections as you create your own custom permissions.

NOTE
You must have product administrator rights in Admin Console for Adobe Experience Manager as a Cloud Service to create profiles and manage permissions for Cloud Manager.

Create a New Product Profile create

First create a product profile before to which you can assign custom permissions.

  1. Log into Cloud Manager at my.cloudmanager.adobe.com.

  2. On the Cloud Manager landing page, select the Manage Access button.

Manage Access button

  1. You are redirected to the Products tab of the Admin Console, where you can manage users and permissions for cloud manager. In the Admin Console, select the New Profile button.

New Profile button

  1. Provide the general details about the profile.

    • Product profile name - A descriptive name for the profile
    • Display name - An abbreviated name that is shown in the UI (options)
    • Description - An informative description of the profile explaining its purpose (optional)
    • Notify users by email - When selected, users are notified by email when they are added or removed from this profile.
  2. Select Save when complete.

The new product profile is saved and is visible in the list of product profiles in the Admin Console.

Assign Custom Permissions to Profile assign-permissions

Now that you have a new product profile, you can assign custom permissions to it.

  1. In the Admin Console, select the name of the new product profile you created.

  2. In the window that opens, select the Permissions tab to view a list of editable permissions.

    Editable permissions

  3. Select the Edit link of a permission so you can edit it.

  4. The Edit Permission window opens.

    • The permission you selected in the previous step is selected in the left column.
    • The permission items available for assignment for the permission are in the middle column labeled Available Permission Items.
    • The assigned permission items are in the right column labeled Included Permission Items.

    Edit permission items

  5. Select the plus (+) icon next to the permission item so you can add it to the column Included Permission Items.

    • Select the i icon next to a permission item if you want to learn more about it.
  6. Select the Add all button at the top of the Available Permissions column so you can add all permissions.

  7. Select Save when you are finished defining the permission items for your new product profile.

Your new product profile is now saved with its custom permissions.

Assign Users to the Custom Permissions assign-users

You can now assign users to the new product profile you created with custom permissions.

  1. In the Admin Console, select the name of the new product profile to which you assigned custom permissions.

  2. In the window that opens, select the Users tab.

  3. Select the Add Users button and assign users to your new product profile with custom permissions.

See the section Add users and user groups to a product profile of the document Manage product profiles for enterprise users for more details on how to use the Admin Console.

Configurable Permissions configurable-permissions

The following permissions are available for creating custom profiles.

Permission
Description
Program Create
Allow users to create a program
Program Access
Allow users to access programs
Program Edit
Allow users to edit programs
Environment Create
Allow users to create an environment
Environment Edit
Allow users to update and edit environments
Environment Logs Read
Allow users to read environment logs
Environment Variables Manage
Allow users to create/edit/delete environment configurations
Environment Restore Create
Allow users to create environment restore
Rapid Dev Environment Reset
Allow users to reset rapid dev environment
Content Copy Manage
Allow users to manage content copy operations
Pipeline Create
Allow users to create pipelines
Pipeline Delete
Allow users to delete pipelines
Pipeline Edit
Allow users to edit pipelines
Production Deployments Approve/Reject
Allow users to approve or reject a production deployment step
Pipeline Executions Cancel
Allow users to cancel pipeline executions
Pipeline Executions Start
Allow users to start a new pipeline execution
Override/Reject Important Metric Failures
Allow users to override/reject important metric failures
Production Deployments Schedule
Allow users to schedule a production deployment step
Repository Info Access
Allow users to access repository info and generate access password
Repository Create
Allow users to create git repositories
Repository Delete
Allow users to delete git repositories
Repository Edit
Allow users to edit git repositories
Repository Code Generate
Allow users to generate projects from archetype
Domain Name Manage
Allow users to create/edit/delete domain names
IP Allowlist Manage
Allow users to create/edit/delete IP allowlist and IP allowlist binding
Network Infrastructure Manage
Allow users to create/edit/delete network infrastructure
SSL Certificate Manage
Allow users to create/edit/delete SSL certificate
New Relic Sub Account User Manage
Allow users to read/edit New Relic subaccount users

Organization-Level Permissions organization-level

Organization-level permissions refer to permissions which are always given across all programs in an organization.

The following permissions are organization-level permissions:

  • Program Create - This permission lets users create a program in the organization.

  • Repository Info Access This tenant/organization level permission allows users to generate username, password, and repository URL for access and contributing to customer project.

    • Username and password for repository access is common across all the repos in the org, however repository URL is unique to each program.
    • See Accessing Repositories for more information.

Terms terms

The following terms are used in creating and managing custom permissions and pre-defined roles.

Term
Description
Predefined Permissions
Predefined roles like Business Owner and Deployment Manager to govern various features of Cloud Manager. For details on pre-defined roles, see AEM as a Cloud Service Team and Product Profiles.
Custom Permissions
Cloud Manager features let users create permission profiles to define roles to govern supported features of Cloud Manager
Product Profile
Created in the Admin Console to manage configurable permissions that are applicable to users who are part of the permission profile
Configurable Permission
Cloud manager permissions which can be configured in permission profile
Permission Item
A program, environment, or pipeline resource on which a permission can be applied

Permission items refer to the scope where permission is applied. Typically, it is one of the following.

Permission Item Type
Example
Description
Organization
organization:companyA
All applicable resources of an organization. A resource could be a program, environment, or pipeline. If the user adds an organization for any permission, then all new resources in that organization also have that permission.
Program
Program A
All applicable resources of a program
Environment
Program A : environment
Applicable on a specific environment
Pipeline
Program A : Pipeline
Applicable on a specific pipeline

Limitations limitations

Keep in mind the following limitations when using custom permissions.

  • Custom permissions profile also list AMS programs, environments, and pipelines while configuring permissions.
  • Resources like program, environment, and pipeline that were created in Cloud Manager may take up two minutes to display in Admin Console for permission configuration.
  • In rare scenarios where custom permissions service fails to respond, predefined profiles are still available and users in predefined profiles still have appropriate access.

Frequently Asked Questions faq

Which permission profiles are predefined permission profiles?

  • Business Owner
  • Program Manager
  • Deployment Manager
  • Developer

For details on pre-defined roles, see AEM as a Cloud Service Team and Product Profiles.

What happens to predefined permission profiles with introduction to custom profiles?

Default product profiles and cloud manager roles continue to work the same as before.

Can I edit predefined permission profiles?

No, default profiles are non-editable. You cannot add or remove permissions to default permission profile. You can only add or remove users from predefined profiles.

Should I delete predefined permission profiles since custom profiles are now available?

Do not delete predefined permission profiles from the Admin Console.

Can I add users to multiple permission profiles?

Yes, A user can be part of multiple profiles including predefined and custom permission profiles. When a user is assigned to multiple profiles, the combined permissions from all the assigned permission profiles are available to that user.

What happens if a user has permission to edit an environment/pipeline but doesn’t have access to a program which contains the environment/pipeline?

In this case, the user is unable to access the environment or pipeline if they do not have the Program Access permissions containing the environment or pipeline.

recommendation-more-help
fbcff2a9-b6fe-4574-b04a-21e75df764ab