Skip to main content

How Authorization Works in Runlayer

Runlayer uses two independent authorization layers:

Fine-Grained Access (FGA)

Controls who can access platform features — managing MCPs, viewing audit logs, creating policies, configuring settings. Enforced on every dashboard API endpoint. This is what roles and capabilities control.

Policy-Based Access Control (PBAC)

Controls what happens when users invoke MCP tools through the proxy. Policies evaluate conditions like IP range, tool name, or OAuth status at call time. See Policies.
FGA (Roles)PBAC (Policies)
ControlsPlatform features (dashboard, API)MCP tool invocations
Enforced atAPI endpointsMCP proxy
Configured viaRole assignmentAccess policies
Example”Can this user view audit logs?""Can this user call query_database on the Snowflake MCP?”
A user needs both: the right role to access platform features, AND a matching policy to call MCP tools.

Roles

RoleDescription
Super AdminFull platform access. Manages roles, settings, and all features.
Security AdminMonitors security, manages policies, reviews audit logs and user info.
IT AdminManages MCP servers, catalog, policies, and user MCP access.
Analytics AdminViews org-wide metrics, audit logs, and exports usage data.
DeveloperDeploys MCPs, manages agent accounts, uses the management API.
HelpdeskViews user info and audit logs for support purposes.
UserUses assigned MCPs only. No admin features.
Server Admin is a special server-scoped role with no platform capabilities. It is assigned per-server, not org-wide.

Capability Matrix

Each role grants a fixed set of capabilities. Super Admin has all capabilities. To see the full, up-to-date matrix, go to Admin → Roles in your Runlayer dashboard.
The capability matrix is updated as new features arrive. The live version in Admin → Roles is always the source of truth.

Separation of Duty

Certain role combinations cannot be assigned to the same user to prevent conflicts of interest:
Forbidden combinationReason
Security Admin + IT AdminSeparates security oversight from infrastructure management
Security Admin + DeveloperSeparates security policy control from code deployment
If you attempt to assign a forbidden combination, the assignment will fail with an error. To resolve, remove one of the conflicting roles first.

Assigning Roles

1

Navigate to Users

Go to Admin → Users and select the user you want to manage.
2

Edit Roles

Click Edit next to the user’s current role(s).
3

Select Role(s)

Choose one or more roles from the dropdown. Users can hold multiple roles — their capabilities are the union of all assigned roles.
4

Save

Confirm the assignment. Changes take effect immediately.
Only users with the Manage Admins capability (Super Admin) can assign or remove roles.

Migration from Admin to Super Admin

Previously, Runlayer had a single Admin role with full permissions. This has been replaced by Super Admin and several specialized roles. What changed:
  • All existing Admin users have been automatically migrated to Super Admin
  • No permissions changed — Super Admin has the same capabilities as the old Admin role
  • No action is required from your side
Recommended next step: Review your Super Admin users and consider whether a narrower role (Security Admin, IT Admin, etc.) would be more appropriate. Specialized roles reduce blast radius if an account is compromised.

Best Practices

Assign the most specific role that covers the user’s responsibilities. You can always add more roles later. A security analyst likely needs Security Admin, not Super Admin.
Super Admin should be limited to a small number of trusted users. Most admin tasks are covered by Security Admin, IT Admin, or other specialized roles.
People change teams. Remove roles that are no longer needed. Check that separation of duty rules are still appropriate.
The forbidden role combinations exist for good reason. If someone needs capabilities from both Security Admin and IT Admin, consider whether the tasks can be split between two people instead.