At Convox, we’ve always believed in providing robust security features to safeguard your platform. With our latest update to Role-Based Access Control (RBAC), we’re taking permissions management to the next level by introducing custom roles with fine-grained access controls. This upgrade allows you to create specific roles tailored to different users or use cases, ensuring better security and more effective permission management.
Our enhanced RBAC now supports creating and managing custom roles, giving organizations the flexibility to define who can access what. Previously, Convox offered RBAC, but it was limited in scope. Now, with the introduction of custom roles, administrators can define granular permissions for both the Console and CLI, ensuring unified permission management across interfaces.
RBAC plays a critical role in minimizing security risks by enforcing the principle of least privilege. With custom roles, organizations can prevent unauthorized access, reduce the risk of configuration changes, and establish clear boundaries for users’ capabilities within the platform.
With this RBAC update, organizations can create custom roles from scratch or clone existing roles to tailor permissions as needed. Here’s how:
To make role assignment easier, Convox offers a set of pre-created roles that cover common scenarios. These pre-configured roles extend across both the Console and CLI for consistent permissions:
Every role in Convox’s enhanced RBAC can include multiple permission policies. These policies consist of:
For a full list of available resource types and examples of permission configurations, check out the RBAC Documentation.
RBAC enables organizations to create highly specialized roles to match their security needs. Here are a few common examples:
Along with user roles, RBAC can be used to assign custom roles to Deploy Keys, which are API keys designed for CI environments or automated systems. Deploy keys will only utilize permissions related to Racks and Applications, maintaining security by excluding access to sensitive areas like Billing or User Management.
To learn more about configuring Deploy Keys and their expanded functionality, check out the Deploy Keys Documentation.
The introduction of enhanced RBAC on Convox is a significant step forward in improving platform security and providing fine-grained control over user access. Whether you're managing roles for individual team members or configuring deploy keys for CI pipelines, RBAC ensures that permissions align precisely with your organization’s needs.
We encourage you to explore the new RBAC feature, refine your roles and policies, and experience greater confidence in your platform’s security. For more information, visit our RBAC Documentation.