Roles & Permissions
Roles and permissions in Devici determine who can access the platform, what actions users can perform, and how administrative controls are enforced across your organization.
This guide explains how roles, scopes, teams, and collection ownership work together to provide secure and scalable access control.
Audience: Organization owners, superadmins, administrators, and security teams
Overview
Devici uses layered access control to balance security and flexibility:
- Roles — define a user’s global capabilities within the platform
- Scopes — define which platform objects an Admin role can access and whether access is read or write
- Teams — control access to collections and threat models
- Collection ownership — governs destructive and ownership-level actions
Scopes apply only to the Admin role and are assigned by Superadmins.
Owners and Superadmins are not scope-restricted.
User Roles
Roles define a user’s global capabilities within Devici.
Common Roles
| Role | Description |
|---|---|
| Owner | Full control over the organization, including security, billing, and destructive actions |
| Superadmin | Administrative control over security, users, integrations, and API tokens |
| Admin | Manages users, teams, and collections, with scopes applied to limit access |
| User | Builds, edits, and reviews threat models based on assigned permissions |
Note
Capabilities for the Admin role are determined by scopes applied to the role.
Only Superadmins can create Admin users and assign or modify their scopes.
What Roles Control
Roles determine who is eligible to perform administrative actions.
Depending on role and applied scopes, users may be able to:
- Configure SAML Single Sign-On (SSO)
- Enable or manage Multi-Factor Authentication (MFA)
- Manage users and teams
- Configure integrations
- Create and manage API tokens
Roles and scopes do not control access to individual threat models — that is handled through teams and collections.
Scopes
Scopes provide granular control over what the Admin role can access and manage.
Scopes allow Superadmins to limit Admin access to specific platform objects and define whether that access is read-only or read/write.
How Scopes Work
- Scopes apply only to the Admin role
- Scopes are created and assigned by Superadmins
- Each scope maps to a specific platform object or administrative domain
- Each scope supports read and write permissions
- Access is enforced consistently across the UI and API
Admins without a required scope cannot view or modify the associated settings.
Examples of Admin Role Access with Scopes Applied
An Admin role may be configured to:
- View users, but not create or modify them
- Manage teams and collection access, but not security settings
- Configure integrations, without access to SSO or API token management
This model ensures administrative access is intentional, limited, and auditable.
Creating and Managing Admins
- Only Superadmins can create users with the Admin role
- Admin roles must have one or more scopes applied
- Admin roles without scopes have no administrative access
This prevents implicit privilege escalation and supports least-privilege administration.
Teams and Collection Access
Teams are used to group users and manage access to collections.
- Teams control which collections users can access
- Teams define permission levels within those collections
- Permissions apply to all threat models in the collection
Using teams avoids individual user assignments and simplifies access management.
👉 See: Creating & Managing Teams
Collection Ownership
Each collection has a single Owner.
Collection ownership determines who can:
- Delete a collection
- Archive or restore collections
- Transfer collection ownership
Collection ownership cannot be overridden by team permissions.
Even users with Manage permissions cannot delete a collection unless they are the collection owner.
How Roles, Scopes, Teams, and Ownership Work Together
| Scenario | Controlled By |
|---|---|
| Can a user configure SAML or MFA? | Role (Owner / Superadmin) |
| Can an Admin manage users or teams? | Scopes applied to the Admin role |
| Can a user access a collection? | Team |
| Can a user edit threat models? | Team permission level |
| Can a user delete a collection? | Collection owner |
| Can an Admin access a platform object? | Scope (read / write) |
This separation ensures security-critical actions remain tightly controlled while enabling flexible collaboration.
Relationship to API Tokens
Scopes follow the same permission model used by API tokens to ensure consistent access control.
When an Admin role is associated with an API token:
- The token’s permissions must not exceed the scopes applied to the Admin role
- Tokens cannot grant broader access than the Admin already has
This prevents privilege escalation while enabling secure automation.
Recommended Enterprise Role Model
A common enterprise setup looks like this:
- Owners / Superadmins
- Platform and security administrators
-
Manage SSO, MFA, admin creation, API access, and integrations
-
Admins
- Admin role with scopes applied to match specific responsibilities
-
Manage users, teams, collections, or integrations as assigned
-
Users
- Engineers, architects, and security contributors
- Build, review, and maintain threat models
This model minimizes risk while enabling broad participation.
Best Practices
- Assign the minimum required scopes to each Admin role
- Prefer Admin roles with scopes applied over broad Superadmin access
- Limit Owner and Superadmin roles to a small number of trusted users
- Use teams to manage access instead of individual permissions
- Regularly review scopes and API token assignments
Devici’s access control model is designed to scale securely as your organization grows.