Qubitro Documentation
SupportLog inSign Up
  • Documentation
  • Guides
  • Developers
  • Welcome
  • Data Sources
    • No-Code Integrations
      • Onomondo
      • Notehub
      • The Things Stack
      • Soracom
      • Loriot
      • 1NCE
      • Golioth
      • AWS IoT Core LoRaWAN
      • Actility ThingPark
      • Chirpstack
      • Particle
    • MQTT
    • HTTP
  • Platform
    • Project
      • Settings
      • Access Management
      • Roles & Permissions
    • Device
      • Settings
    • Storage
      • Time Series Storage
    • Functions
      • Decoder Function
        • LoRaWAN Device Template Decoder
        • LoRaWAN Custom Decoder
        • Hex Payload Decoder
      • Transformation Function
      • Rule Function
        • Send Email
        • Webhooks
        • Slack
        • Twilio
        • Mailgun
        • SendGrid
      • Storage Function
        • AWS Redshift
        • Google BigQuery
        • MQTT Publish
        • MongoDB Time Series
      • Scheduled Function
        • HTTP
      • Function Settings
      • Function Templates
        • Settings
    • Monitoring
      • Dashboards
        • Setup & Configuration
        • Widgets
          • Chart
          • State Timeline
          • Gauge
          • Stat
          • Headline
          • Aggregated Chart
          • Map
          • Battery
          • Image
          • Image Map
          • Table
          • Storage Table
          • Iframe
          • Blob Storage
        • Settings
        • Access Management
        • Roles & Permission
      • Blueprints
        • Setup & Configuration
        • Settings
    • Credentials
      • API Keys
      • External Credentials
        • Slack
        • Mailgun
        • SendGrid
        • Twilio
        • AWS Redshift
        • MQTT
        • MongoDB
        • The Things Stack
      • Webhook Signing Key
  • Add-Ons
    • Storage Views
    • Aggregated View
    • Archived Views
    • Blob Storage
    • Managed Email
    • Audit Log
    • MCP Server
  • Organizations
    • Overview
    • General
    • Groups
    • Members & Roles
      • Read Only
      • Read/Write
      • Admin
    • Custom Roles
    • Add-Ons
    • Billing
    • Invoices
    • White-Label
  • Account Management
    • Personal Accounts
Powered by GitBook
On this page
  • Default Roles
  • Roles Reference
  • Custom Roles
Export as PDF
  1. Platform
  2. Project

Roles & Permissions

Define and manage user roles to control access to project resources.

The Roles & Permissions tab defines how collaborators interact with project resources, including devices, Functions, and storage actions.

A resource is any project component that can be viewed, created, modified, or deleted. This includes devices, Functions, or storage actions within your project.

Qubitro provides three default roles—Read-Only, Read/Write, and Admin—each granting a different level of access.

If your plan or organization settings allow for custom roles, you can define additional role types with more granular permissions.

Default Roles

Read-Only

Users can view resources but cannot create, modify, or delete them.

Examples

• They can see device details but cannot rename or delete the device.

• They can view existing Functions but cannot edit or create them.

Read/Write

Users can create and modify resources but cannot delete them.

Examples

• They can add new devices or edit existing Functions but cannot delete them.

• They can view or download stored data but cannot permanently delete storage entries.

Admin

Users have full control over all resources, including creation, modification, and deletion, plus access management.

Examples

• They can remove devices or Functions from the project.

• They can invite or remove collaborators and manage roles.

Roles Reference

Read-Only
Read/Write
Admin

View Resources

✅

✅

✅

Modify Resources

❌

✅

✅

Create Resources

❌

✅

✅

Delete Resources

❌

❌

✅

Access Management

❌

❌

✅


Custom Roles

Custom roles allow Organizations to define more specific access controls for project-level resources. You can customize which actions are allowed, such as creating dashboards, editing environment variables, or inviting collaborators.

Custom roles are available only for Organizations and must be created in the Organization Settings.

Once created, custom roles can be assigned to collaborators through the Access Management tab of each project.

PreviousAccess ManagementNextDevice

Last updated 1 month ago

Custom Roles