Manage users & profiles

This is for:

Developer
In this article

In this article, in this article, we will discuss the role-based permissions that determine what tasks you and other users can perform in the Qubit platform.

Roles and permissions

Each user in a property can be assigned 1 or 4 roles, from the most basic, Viewer, to the most advanced, Owner.

Each of these roles can be augmented with an additional set of permissions through the role Reporting, which enables a user to create and configure Qubit Exports.

Warning

The role Reporting gives user access to customer data and potentially sensitive personal data. The assignment of this role should therefore be done with caution.

Refer to the following table for details of each role:

Role Permissions Additional permissions Example

viewer

experiences:readrecs rules: read users:readsegments: read segments:write

Can view experiences but cannot build new experiences, edit, pause, or publishCan view users and their permissions but cannot editCan create, edit, and delete segments

contributor

experiences:read experiences:write experiences:pause recs rules:write users:read segments:read segments:write

experiences:pause recs rules:write experiences:write

Can do all of the above plus create and pause experiences and create Recommendations rules, but cannot publish experiences

publisher

experiences:read experiences:write experiences:pause recs rules:writeexperiences:publish experiences:republish users:readsegments:read segments:write packages:publish``imports:preview imports:read imports:write

experiences:publish experiences:republish packages:publish``imports:preview imports:read imports:write

Can do all of the above plus publish and republish experiencesCan publish packages, preview, view, and create importsCan access the Authentication keys page but only with the additional Reporting role

owner

experiences:read experiences:write experiences:pause experiences:publish recs rules: writeexperiences:republish users:read users:write segments:read segments:write packages:publishimports:preview imports:read imports:write

users:write

Can do all of the above plus create and edit users and user permissions

reporting

exports:write authkeys:read authkeys:write

Can be applied to any role to allow the user to create and configure exportsCan be applied to the Publisher role to access the Authentication Keys page

A focus on user scope

For each of the above roles, and especially for organizations with multiple properties, it is important to understand that the users you can view and manage depends completely on the properties that you yourself have permissions in. This is the scope of your permissions as a user.

Warning

You can only view and manage users in properties in which you also have some form of permission.

As an example, if an organization has 10 properties, but you only have permissions for 2 of them, you will only see those users in the 2 properties that you have access to. Users in the other 8 properties will be invisible to you. Look at the following example:

user management example

In the above example, User 1 has permissions in 2 of 10 properties for TEST ORG. User 2 has permissions in 4:

user 1

The column PROPERTIES reports the number of properties a user has permissions for that you also have permissions for. Note in the above example, this is 2 and not 4.

User 1 will not see that User 2 has permissions for 2 further properties, a total of 4, for TEST ORG, because User 1 does not have permissions for those additional 2 properties.

This concept of scope also applies when you search for a user or filter the list of users by organization or property.