Skip to main content

Enterprise permissions

Limited to Enterprise

This feature is limited to the dbt Cloud Enterprise plan. If you're interested in learning more about an Enterprise plan, contact us at sales@getdbt.com.

The dbt Cloud Enterprise plan supports a number of pre-built permission sets to help manage access controls within a dbt Cloud account. See the docs on access control for more information on Role-Based access control (RBAC).

Permission sets

The following permission sets are available for assignment in dbt Cloud Enterprise accounts. They can be granted to dbt Cloud groups which are then in turn granted to users. A dbt Cloud group can be associated with more than one permission set. Permissions assignments with more access take precedence.

Access to dbt Cloud features and functionality is split into account-level and project-level permission sets. Account-level permissions are primarily for account administration (inviting users, configuring SSO, and creating groups). Project-level permissions are for the configuration and maintenance of the projects themselves (configuring environments, accessing IDE, and running jobs). Account permission sets may have access to project features, and project permission sets may have access to account features. Check out the permissions tables to compare sets and their access.

 Account admin
 Admin
 Analyst
 Billing admin
 Database admin
 Developer
 Git admin
 Job admin
 Job runner
 Job viewer
 Manage marketplace apps
 Metadata (Discovery API only)
 Project creator
 Security admin
 Semantic Layer
 Stakeholder
 Team admin
 Viewer
 Webhook
Licenses or Permission sets

The user's license type always overrides their assigned permission set. This means that even if a user belongs to a dbt Cloud group with 'Account Admin' permissions, having a 'Read-Only' license would still prevent them from performing administrative actions on the account.

Permissions:

  • Account-level permissions — Permissions related to the management of the dbt Cloud account. For example, billing and account settings.
  • Project-level permissions — Permissions related to the projects in dbt Cloud. For example, repos and access to the dbt Cloud IDE or dbt Cloud CLI.

Account permissions

Account permission sets enable you to manage the dbt Cloud account and manage the account settings (for example, generating service tokens, inviting users, and configuring SSO). They also provide project-level permissions. The Account Admin permission set is the highest level of access you can assign.

Key:

  • (W)rite — Create new or modify existing. Includes send, create, delete, allocate, modify, and develop.
  • (R)ead — Can view but can not create or change any fields.

Account access for account permissions

Account-level permission
Account Admin
Billing admin
Manage marketplace apps
Project creator
Security admin
Viewer
Account settings*W--RRR
Audit logsR---RR
Auth providerW---WR
BillingWW---R
ConnectionsW--W--
GroupsW--RWR
InvitationsW--WWR
IP restrictionsW---WR
LicensesW--WWR
Marketplace app--W---
MembersW--WWR
Project (create)W--W--
Public modelsRR-RRR
Service tokensW---RR
WebhooksW-----

* Permission sets with write (W) access to Account settings can modify account-level settings, including setting up Slack notifications.

Project access for account permissions

Project-level permission
Account Admin
Billing admin
Project creator
Security admin
Viewer
Environment credentialsW-W-R
Custom env. variablesW-W-R
Data platform configurationsW-W-R
Develop (IDE or CLI)W-W--
EnvironmentsW-W-R
JobsW-W-R
Metadata GraphQL API accessR-R-R
PermissionsW-WWR
ProjectsW-WRR
RepositoriesW-W-R
RunsW-W-R
Semantic Layer configW-WvR

Project permissions

The project permission sets enable you to work within the projects in various capacities. They primarily provide access to project-level permissions such as repos and the IDE or dbt Cloud CLI, but may also provide some account-level permissions.

Key:

  • (W)rite — Create new or modify existing. Includes send, create, delete, allocate, modify, and develop.
  • (R)ead — Can view but can not create or change any fields.

Account access for project permissions

Account-level permission
Admin
Analyst
Database admin
Developer
Git Admin
Job admin
Job runner
Job viewer
Metadata (Discovery API only)
Semantic Layer
Stakeholder
Team admin
Webhook
Account settingsR-R-R------R-
Auth provider-------------
Billing-------------
ConnectionsRRRRRR----RR-
GroupsR-RRR-----RR-
InvitationsWRRRRR-R--RR-
LicensesWRRRRR-R---R-
MembersW-RRR-----RR-
Project (create)-------------
Public modelsRRRRRR-RRRRRR
Service tokens-------------
WebhooksW--W--------W

Project access for project permissions

Project-level permission
Admin
Analyst
Database admin
Developer
Git Admin
Job admin
Job runner
Job viewer
Metadata (Discovery API only)
Semantic Layer
Stakeholder
Team admin
Webhook
Environment credentialsWWWWRW----RR-
Custom env. variablesWWWWWW-R--RW-
Data platform configsWWWWRW----RR-
Develop (IDE or CLI)WW-W---------
EnvironmentsWRRRRW-R--RR-
JobsWR*R*R*R*WRR--RR*-
Metadata GraphQL API accessRRRRRR-RR-RR-
PermissionsW-RRR------R-
ProjectsWWWWWR-R--RW-
RepositoriesW-RRW-----RR-
RunsWR*R*R*R*WWR--RR*-
Semantic Layer configWRWRRR---WRR-

* These permissions are Read-only by default, but may be changed to Write with environment permissions.

Additional resources

0