User types
Aiven supports several types of users with different characteristics:Organization Users
Human users - Individual team members
- Personal email addresses
- Can log in to Aiven Console
- Subject to authentication policies
- Can belong to groups
Application Users
Non-human users - For automation and integrations
- Programmatic access only
- Cannot log in to Console
- Not subject to authentication policies
- Use tokens for API/CLI/Terraform
Managed Users
Centrally controlled - With verified domain
- Same as organization users
- Restricted from creating organizations
- Cannot edit their own profile
- Managed by organization admins
Groups
Collections of users - For bulk access management
- Contain organization and application users
- Simplify permission grants
- Organization-wide scope
Super Admin vs Organization Admin
- Super Admin
- Organization Admin
Unrestricted access to everything:
- All organization resources and settings
- Can rename and delete the organization
- Can manage other super admins
- Can manage authentication policy
- Full billing access
- Cannot be removed by other admins
Roles and permissions
Aiven uses two concepts for access control:- Roles - Predefined sets of permissions for common scenarios
- Permissions - Granular actions on specific resources
Roles and permissions are cumulative. A user’s effective access is the combination of all roles and permissions granted directly to them and through groups they belong to.
Organization roles
Admin - Full access to the organizationAllowed actions:
- View and change billing information
- Change authentication policy
- Create and delete organizational units and projects
- Move projects between units
- Invite, deactivate, and remove users
- Create, edit, and delete groups
- Manage application users
- Add and remove domains
- Manage identity providers
- Delete organization
- Manage super admins
Project roles
- Admin
- Operator
- Developer
- Read Only
Full project access
- All services in the project
- Project configuration
- Cannot modify billing group
Granular permissions
For more precise control, grant individual permissions:Organization permissions
Organization permissions
Create, edit, and delete application users
View organization audit log
View billing groups, invoices, and costs (read-only)
Manage billing groups, payment methods, and addresses
Add, edit, and remove domains
Create and delete groups, manage group membership
View organization VPCs
Create and manage organization VPCs and peering
Create and delete projects (cannot access project contents)
Invite, deactivate, edit, and remove users
Project permissions
Project permissions
View project logs
View integration endpoints and service integrations
Create and manage integration endpoints and integrations
View project VPCs and peering connections
Create and manage project VPCs and peering
View service details (except logs and metrics)
Create, delete, and manage services
Change service configuration (cloud, region, network settings)
Perform queries, manage Kafka topics, PostgreSQL pools, etc.
View service logs (may contain sensitive information)
Read service secrets and view service users
Create and manage service users and credentials
Managing organization users
Inviting users
Removing users
Deactivating managed users
For organizations with verified domains, you can deactivate users:Managing application users
Application users provide secure programmatic access for automation, CI/CD, and integrations.Creating application users
Application user best practices
Managing groups
Groups simplify permission management by allowing you to grant access to multiple users at once.Creating groups
Example group structure
Permission inheritance
Permissions granted at higher levels automatically apply to lower levels:- Create projects anywhere in organization (
organization:projects:write) - Fully manage backend-prod project and all its services (
adminrole)
Permissions are cumulative, not restrictive. A less permissive role at project level does NOT override more permissive permissions from organization level.
Example: Cumulative permissions
Managed users and domains
Verify your organization’s domain to enable managed users:Enabling managed users
Managed user restrictions
- Cannot create organizations - Only organization admins can
- Cannot edit profile - Name, email managed by organization admins
- Centralized control - Organization admins can deactivate, delete, reset passwords
- Visible even outside org - Organization can see all users with their domain
Managed users combined with authentication policies provide the strongest security for your organization.
Service users
Service users are different from organization/application users - they’re database/service-specific accounts:- Per-service - Created within individual services (PostgreSQL, Kafka, etc.)
- Service access only - For connecting applications to services
- Managed in service - Not at organization or project level
Learn more about authentication methods for accessing services.
Best practices
Use groups, not individual grants
Assign permissions to groups instead of individual users for easier management
Use application users for automation
Never use personal accounts for CI/CD, Terraform, or monitoring integrations
Next steps
Authentication
Configure SSO, SAML, and authentication policies
Organizations & Projects
Learn how to structure your resources
Billing & Payment
Manage billing permissions for finance team
Security
Learn about Aiven’s security features