bullseyeRole Management

Interlynk uses role-based access control (RBAC) to govern what users and service tokens can do within an organization. Three system roles are provided by default, and administrators can create custom roles with granular permissions.


Default Roles

Interlynk ships with three system roles that cannot be modified or deleted:

Role
Description

Admin

Full access to all features and settings. Can manage users, roles, integrations, and organization configuration.

Operator

Can manage products, SBOMs, policies, integrations, and users. Cannot delete the organization or modify billing.

Viewer

Read-only access to products, SBOMs, vulnerabilities, policies, and user lists. Cannot make changes.

circle-exclamation

Permission Matrix

The table below lists all permissions and their assignment across default roles.

Permission
Admin
Operator
Viewer

Organization

View organization

βœ“

βœ“

βœ“

Update organization

βœ“

β€”

β€”

Delete organization

βœ“

β€”

β€”

Products

View products

βœ“

βœ“

βœ“

Create products

βœ“

βœ“

β€”

Update products

βœ“

βœ“

β€”

Delete products

βœ“

βœ“

β€”

Edit share link

βœ“

βœ“

β€”

Edit product automations

βœ“

βœ“

β€”

Edit product policies

βœ“

βœ“

β€”

Edit product integrations

βœ“

βœ“

β€”

Edit product settings

βœ“

βœ“

β€”

SBOMs

View SBOMs

βœ“

βœ“

βœ“

Update SBOMs

βœ“

βœ“

β€”

Delete SBOMs

βœ“

βœ“

β€”

Edit SBOM components

βœ“

βœ“

β€”

Edit vulnerabilities

βœ“

βœ“

β€”

Edit checks

βœ“

βœ“

β€”

Sign SBOMs

βœ“

βœ“

β€”

Reprocess SBOMs

βœ“

βœ“

β€”

Users

View users

βœ“

βœ“

βœ“

Invite users

βœ“

βœ“

β€”

Edit user roles

βœ“

βœ“

β€”

Edit teams

βœ“

βœ“

β€”

Delete users

βœ“

βœ“

β€”

Vulnerabilities

View feeds

βœ“

βœ“

βœ“

Manage feeds

βœ“

βœ“

β€”

Manage lists

βœ“

βœ“

β€”

Manage custom fields

βœ“

βœ“

β€”

Licenses

View licenses

βœ“

βœ“

βœ“

Edit licenses

βœ“

βœ“

β€”

Policies

View policies

βœ“

βœ“

βœ“

Edit policies

βœ“

βœ“

β€”

Run policy scans

βœ“

βœ“

β€”

Delete policies

βœ“

βœ“

β€”

Support

View support

βœ“

βœ“

βœ“

Edit support

βœ“

βœ“

β€”

Delete support

βœ“

βœ“

β€”

View support levels

βœ“

βœ“

βœ“

Edit support levels

βœ“

βœ“

β€”

Delete support levels

βœ“

βœ“

β€”

Vendor Management

View requests

βœ“

βœ“

βœ“

Edit requests

βœ“

βœ“

β€”

Connections

View connections

βœ“

βœ“

βœ“

Edit connections

βœ“

βœ“

β€”

Delete connections

βœ“

βœ“

β€”

Notifications

View notification settings

βœ“

βœ“

βœ“

Edit notification settings

βœ“

βœ“

β€”

API Tokens

View API tokens

βœ“

βœ“

βœ“

Manage API tokens

βœ“

βœ“

β€”

Use Cases for Default Roles

Role
Typical User

Admin

Security team leads, platform owners, DevOps managers

Operator

AppSec engineers, DevOps engineers, release managers

Viewer

Developers, compliance auditors, management stakeholders


Custom Roles

Custom roles allow you to define granular permission sets beyond the three defaults. Use custom roles to implement least-privilege access patterns.

Creating Custom Roles

  1. Navigate to Settings > Organization > Roles.

  2. Click Create Role.

  3. Enter a Name for the role (minimum 4 characters). Use a descriptive name like AppSec Reviewer or CI Upload Agent.

  4. Select Copy Permission From to start with an existing role's permissions as a baseline.

  5. Click Create.

The new role is created with the copied permission set. You can then adjust individual permissions as needed.

circle-info

Role names must be unique within the organization (case-insensitive).

Deleting Custom Roles

  1. Navigate to Settings > Organization > Roles.

  2. Click the action menu on the role's row.

  3. Select Delete.

circle-exclamation

Granular Permission Selection

Permissions are organized into categories. When creating or editing a custom role, select only the permissions required for the role's purpose. Refer to the permission matrix above for available permissions.

Custom Role
Permissions
Use Case

AppSec Reviewer

View organization, View products, View SBOMs, View policies, Edit vulnerabilities, View feeds, Manage feeds

Security analyst who triages vulnerabilities but does not manage infrastructure

Compliance Viewer

View organization, View products, View SBOMs, View policies, View licenses, View feeds

Auditor or compliance officer with read-only access

CI Upload Agent

View products, Create products, Update SBOMs, View API tokens, Manage API tokens

Service token role for CI/CD pipelines that only upload SBOMs

Policy Manager

View organization, View products, View SBOMs, View policies, Edit policies, Run policy scans, Delete policies

User responsible for defining and maintaining security policies

Integration Admin

View organization, View connections, Edit connections, Delete connections, View notification settings, Edit notification settings

User responsible for managing integrations and notifications

Bulk Role Assignment

To assign a role to multiple users at once, use the Bulk Apply feature:

  1. Navigate to Settings > Organization > Roles.

  2. Select a role.

  3. Use the bulk apply action to assign the role to selected users.


Common Misconfigurations

Issue
Symptom
Fix

Custom role missing critical permission

User cannot perform expected action

Review the permission matrix and add the missing permission

Service token assigned Admin role

Excessive permissions for automation

Create a minimal custom role and reassign the token

All users assigned Admin

No effective access control

Implement role separation β€” most users should be Operators or Viewers

Custom role deleted while in use

Affected users lose all access

Reassign users to another role before deleting

Role name too short

Creation fails with validation error

Use at least 4 characters for role names


  • Start with the Viewer role and add permissions incrementally β€” it is easier to grant access than to revoke it.

  • Create dedicated service token roles with only the permissions CI/CD pipelines need (e.g., SBOM upload and product view).

  • Review role assignments quarterly as part of your security hygiene.

  • Use descriptive role names that communicate purpose (e.g., Release Engineer rather than Custom Role 1).

  • Document your custom roles and their intended use cases in your team's runbook.

  • Avoid creating too many custom roles β€” consolidate where possible to reduce management overhead.

Last updated