RBAC permissions, actions, and scopes

    Scope definitions

    ScopesDescriptions
    annotations:
    annotations:type:
    Restrict an action to a set of annotations. For example, annotations: matches any annotation, annotations:type:dashboard matches annotations associated with dashboards and annotations:type:organization matches organization annotations.
    apikeys:
    apikeys:id:
    Restrict an action to a set of API keys. For example, apikeys: matches any API key, apikey:id:1 matches the API key whose id is 1.
    dashboards:
    dashboards:uid:
    Restrict an action to a set of dashboards. For example, dashboards: matches any dashboard, and dashboards:uid:1 matches the dashboard whose UID is 1.
    datasources:
    datasources:uid:
    Restrict an action to a set of data sources. For example, datasources: matches any data source, and datasources:uid:1 matches the data source whose UID is 1.
    folders:
    folders:uid:
    Restrict an action to a set of folders. For example, folders: matches any folder, and folders:uid:1 matches the folder whose UID is 1.
    global.users:
    global.users:id:
    Restrict an action to a set of global users. For example, global.users: matches any user and global.users:id:1 matches the user whose ID is 1.
    orgs:
    orgs:id:
    Restrict an action to a set of organizations. For example, orgs: matches any organization and orgs:id:1 matches the organization whose ID is 1.
    permissions:type:delegateThe scope is only applicable for roles associated with the Access Control itself and indicates that you can delegate your permissions only, or a subset of it, by creating a new role or making an assignment.
    permissions:type:escalateThe scope is required to trigger the reset of basic roles permissions. It indicates that users might acquire additional permissions they did not previously have.
    provisioners:Restrict an action to a set of provisioners. For example, provisioners: matches any provisioner, and provisioners:accesscontrol matches the role-based access control provisioner.
    reports:
    reports:id:
    Restrict an action to a set of reports. For example, reports: matches any report and reports:id:1 matches the report whose ID is 1.
    roles:
    roles:uid:
    Restrict an action to a set of roles. For example, roles: matches any role and roles:uid:randomuid matches only the role whose UID is randomuid.
    services:accesscontrolRestrict an action to target only the role-based access control service. You can use this in conjunction with the status:accesscontrol actions.
    serviceaccounts:
    serviceaccounts:id:
    Restrict an action to a set of service account from an organization. For example, serviceaccounts: matches any service account and serviceaccount:id:1 matches the service account whose ID is 1.
    settings:Restrict an action to a subset of settings. For example, settings: matches all settings, settings:auth.saml: matches all SAML settings, and settings:auth.saml:enabled matches the enable property on the SAML settings.
    teams:
    teams:id:
    Restrict an action to a set of teams from an organization. For example, teams: matches any team and teams:id:1 matches the team whose ID is 1.
    users:
    users:id:
    Restrict an action to a set of users from an organization. For example, users:* matches any user and users:id:1 matches the user whose ID is .