Overview
UTMStack implements a comprehensive role-based access control (RBAC) system built on Spring Security. Roles define what actions users can perform and what data they can access within the system.Built-in Roles
UTMStack provides four default roles with different permission levels:Administrator
Full system access with all permissions:- User and role management
- System configuration
- All data access (read/write/delete)
- Integration management
- Agent deployment and management
- Report creation and scheduling
- Audit log access
Security Analyst
Operational security monitoring permissions:- View and analyze security events
- Create and modify alerts
- Investigate incidents
- Create custom dashboards
- Generate reports
- Acknowledge and assign alerts
- Cannot modify system settings or manage users
Auditor
Read-only access for compliance and audit functions:- View all security events and logs
- Access compliance reports
- View system configuration (read-only)
- Access audit trails
- Cannot modify any data or settings
- Cannot acknowledge or assign alerts
Viewer
Limited read-only access:- View assigned dashboards
- View filtered security events
- Basic reporting capabilities
- Cannot access system settings
- Cannot modify any configurations
Permission Matrix
| Permission | Administrator | Security Analyst | Auditor | Viewer |
|---|---|---|---|---|
| Manage Users | ✓ | ✗ | ✗ | ✗ |
| Manage Roles | ✓ | ✗ | ✗ | ✗ |
| System Configuration | ✓ | ✗ | ✗ | ✗ |
| Manage Integrations | ✓ | ✗ | ✗ | ✗ |
| Deploy Agents | ✓ | ✗ | ✗ | ✗ |
| View Events | ✓ | ✓ | ✓ | Limited |
| Investigate Incidents | ✓ | ✓ | ✗ | ✗ |
| Manage Alerts | ✓ | ✓ | ✗ | ✗ |
| Create Dashboards | ✓ | ✓ | ✗ | ✗ |
| Generate Reports | ✓ | ✓ | ✓ | Limited |
| View Audit Logs | ✓ | ✗ | ✓ | ✗ |
| Modify Data | ✓ | Limited | ✗ | ✗ |
Creating Custom Roles
Configure Permissions
Select permissions from the following categories:Data Access:
- Read events
- Write events
- Delete events
- Access levels (all data, organization, team, personal)
- Dashboard management
- Alert configuration
- Integration management
- Report generation
- User management
- Role management
- System configuration
- Audit access
Set Data Filters
Configure data access restrictions:
- Filter by data source
- Filter by severity level
- Filter by time range
- Filter by asset group
Assigning Roles to Users
Single User Assignment
- Navigate to Settings > Users
- Select the user account
- Click Edit Roles
- Add or remove role assignments
- Save changes
Multiple Role Assignment
Users can have multiple roles assigned:- Permissions are cumulative (union of all assigned roles)
- The highest privilege level applies for conflicting permissions
- Useful for users with hybrid responsibilities
Permission Scopes
UTMStack supports granular permission scopes:Global Scope
Access to all data and resources across the entire system.Organization Scope
Access limited to a specific organization’s data (multi-tenant deployments).Team Scope
Access limited to team-specific resources:- Team dashboards
- Team-assigned incidents
- Team data sources
Personal Scope
Access limited to user’s own resources:- Personal dashboards
- Self-assigned incidents
- Personal reports
Role Inheritance
Custom roles can inherit permissions from base roles:
Inheritance hierarchy:
Data Source Permissions
Control access to specific data sources:- All Sources: Access to all integrated data sources
- Selected Sources: Limit to specific integrations
- Source Groups: Organize sources into logical groups
Configuring Source Access
- Edit the role
- Navigate to Data Source Permissions
- Select Limited Access
- Choose specific sources or source groups
- Save the configuration
Time-Based Access Control
Implement temporal access restrictions:- Time-Limited Roles: Automatically expire on a specific date
- Business Hours Only: Restrict access to business hours
- Temporary Elevated Access: Grant temporary admin rights for specific tasks
Set Time Parameters
Define:
- Start date/time
- End date/time (optional)
- Allowed hours of access
- Allowed days of week
API Access Control
Roles control API access for integrations and automation:- Full API Access: All API endpoints
- Read-Only API: GET requests only
- Limited API: Specific endpoint access
- No API Access: UI access only
Monitoring Role Usage
Track role and permission usage:Role Assignment Reports
- View users per role
- Identify unused roles
- Track role changes over time
Permission Audit Logs
All permission checks are logged:- Permission granted/denied events
- Role changes
- Access attempts to restricted resources
Best Practices
Troubleshooting
User Cannot Access Expected Features
- Verify role assignment in Settings > Users
- Check role permissions in Settings > Roles
- Review audit logs for permission denied events
- Ensure user session has been refreshed (re-login)
Permission Changes Not Taking Effect
- Active sessions cache permissions for performance
- Users must log out and log back in for changes to apply
- Force session termination from Settings > Active Sessions
Conflicting Permissions from Multiple Roles
- Review the effective permissions for the user
- Use the Permission Calculator at Settings > Roles > Tools
- Remove redundant role assignments
Related Topics
- User Management - Manage user accounts and assignments
- Authentication Configuration - Configure authentication methods
- SAML SSO Configuration - Enterprise role mapping with SSO