Authorization Model Overview
CockroachDB Cloud has a two-level authorization hierarchy:- Organization Level: Roles for Cloud Console, API, and cluster management
- Cluster Level: SQL roles for database operations
Organization User Roles
Organization roles control what users and service accounts can do in CockroachDB Cloud.Role Hierarchy
Roles can be assigned at three scopes:- Organization: Applies to all resources in the organization
- Folder: Applies to folder and all its clusters and subfolders
- Cluster: Applies to a specific cluster only
Role inheritance is transitive - roles assigned at organization or folder level are inherited by child resources.
Available Roles
- Administrative
- Billing
- Cluster Management
- Developer
- Observability
- Folder Management
Organization Admin
- Full administrative access to the organization
- Invite and manage users
- Create and manage service accounts
- Assign roles to users and service accounts
- Manage billing and payments
- Configure organization settings and SSO
- Create, modify, and delete clusters
Role Permissions Matrix
| Permission | Org Admin | Cluster Admin | Cluster Operator | Cluster Developer | Metrics Viewer |
|---|---|---|---|---|---|
| Create clusters | ✓ | ✓ (org scope) | ✗ | ✗ | ✗ |
| Delete clusters | ✓ | ✓ | ✗ | ✗ | ✗ |
| Scale clusters | ✓ | ✓ | ✓ | ✗ | ✗ |
| Manage SQL users | ✓ | ✓ | ✗ | ✗ | ✗ |
| View connection info | ✓ | ✓ | ✓ | ✓ | ✗ |
| Configure networking | ✓ | ✓ | ✓ | ✗ | ✗ |
| View metrics | ✓ | ✓ | ✓ | ✓ | ✓ |
| Manage backups | ✓ | ✓ | ✓ | ✗ | ✗ |
| Access DB Console | ✓ | ✓ | ✓ | ✓ | ✗ |
| Invite users | ✓ | ✗ | ✗ | ✗ | ✗ |
| Manage billing | ✓ | ✗ | ✗ | ✗ | ✗ |
Manage Organization Users
Add and manage users in your organization.Invite Users
Send Invitation
- Click Invite User
- Enter email address
- Select roles to assign
- Choose scope (Organization, Folder, or Cluster)
- Click Send Invitation
New users are automatically assigned the Organization Member role, which grants no permissions beyond organization membership.
Change User Roles
Remove User
Service Accounts
Service accounts are used for automated access via the Cloud API.Create Service Account
Create Account
- Click Create Service Account
- Enter name and description
- Assign roles and scopes
- Click Create
Manage API Keys
Organize with Folders
Folders help organize clusters and manage permissions hierarchically.Create Folders
Create Folder
- On Clusters page, click New Folder
- Enter folder name
- Select parent folder (optional)
- Click Create
Assign Folder Roles
Roles assigned to folders are inherited by all clusters and subfolders:
Folder Benefits:
- Organized cluster management
- Inherited permissions
- Grouped billing reports
- Team-based access control
SQL User Management
Manage SQL users for database access.Create SQL Users
Only users with Cluster Admin or Organization Admin can create SQL users:Grant SQL Privileges
Control database access with SQL privileges:SQL Roles
Use SQL roles to group permissions:SSO Integration
Integrate with your identity provider for centralized access control.Configure SSO
Add Identity Provider
- Click Configure SSO
- Select IdP type (SAML 2.0)
- Upload IdP metadata
- Configure attribute mappings
SCIM Provisioning
Automate user provisioning with SCIM:
SCIM Benefits:
- Automatic user provisioning
- Automatic deprovisioning
- Role synchronization
- Reduced administrative overhead
Best Practices
Principle of Least Privilege
Grant Minimum Necessary Access
- Start with least privileged role
- Grant additional permissions as needed
- Review permissions regularly
- Remove unused access immediately
Role Assignment Strategy
Organization Scope:- Use for organization-wide administrators
- Limit number of Organization Admins
- Use service accounts for automation
- Use for team-based access
- Organize by environment (dev, staging, prod)
- Organize by department or project
- Use for cluster-specific access
- Grant to individual developers
- Use for temporary access
Access Reviews
Regularly review and audit access:Quarterly Audits
- Full access review
- Update role assignments
- Remove inactive users
- Rotate service account keys
Service Account Management
Service Account Best Practices
- One service account per application
- Descriptive names and documentation
- Rotate API keys every 90 days
- Delete unused service accounts
- Monitor API usage
Troubleshooting
Permission Denied
Issue: User cannot perform action Solutions:- Check user’s assigned roles
- Verify role scope (org, folder, cluster)
- Confirm role provides necessary permission
- Check if user is in correct organization
- Contact Organization Admin
Cannot Invite User
Issue: Invitation fails Solutions:- Verify you have Organization Admin role
- Check email address is correct
- Confirm user doesn’t already exist
- Check organization user limits
- Try different email address
SQL User Cannot Connect
Issue: SQL authentication fails Solutions:- Verify SQL user exists on cluster
- Reset password if forgotten
- Check network authorization
- Verify SQL privileges granted
- Confirm connection string is correct
Next Steps
Authentication
Learn about authentication methods
Network Security
Configure network authorization
Compliance
Security compliance and certifications
Organization Settings
Detailed access management guide