User and Role Management

Control access to your tenant

In brief

KaliaOps provides a complete RBAC (Role-Based Access Control) system with 4 system roles, 90+ granular permissions and ownership scopes for fine-grained access control. Email invitations simplify onboarding and deactivation/deletion features ensure GDPR compliance.

RBAC system

KaliaOps uses an RBAC (Role-Based Access Control) system to manage access rights.

Principle

Each user is assigned a role that defines their permissions:

  • Role: Set of permissions (e.g., Admin, Manager)
  • Permission: Right to perform an action (e.g., assets.view, incidents.create)
  • Scope: Application scope of the right (e.g., all entities, my team)

System roles

RoleDescriptionDefault scope
AdminFull access to all featuresall
ManagerComplete management within their scopeorganization
TechOperational CMDB/ITSM actionsteam
ViewerRead-only accessown

These roles are protected and cannot be deleted.

Custom roles

You can create custom roles with specific permissions to meet your needs.

Inviting a user

1

Access user management

Menu Settings → Users.

2

Click "Invite"

Open the invitation form.

3

Fill in information

Complete:

  • Email: New user's email address
  • Role: Role to assign
  • Employee: Link to existing employee (optional)
4

Send invitation

User receives an email with an activation link valid for 48 hours.

5

User activation

User clicks the link, sets their password and accesses KaliaOps.

Tip: Link user to an employee during invitation to simplify future assignments (incidents, projects).

Managing users

User list

The list displays all tenant users with:

  • Name and email
  • Assigned role
  • Status (active, invited, deactivated)
  • Last login

Available actions

  • Change role: Modify user permissions
  • Reset password: Send reset link
  • Deactivate: Block access temporarily
  • Delete: Permanently remove user

User statuses

StatusDescription
InvitedInvitation sent, awaiting activation
ActiveAccount activated and functional
DeactivatedAccess blocked, data preserved

Roles and permissions

Creating a custom role

  1. Menu Settings → Roles
  2. Click "New role"
  3. Name the role (e.g., "L1 Support")
  4. Select permissions
  5. Save

Permission categories

CategoryExamples
CMDBassets.view, assets.create, applications.edit, contracts.delete
ITSMincidents.view, incidents.resolve, changes.approve, sla.manage
Organizationorganizations.view, teams.edit, employees.create
Administrationusers.manage, roles.edit, audit_logs.view, api_tokens.create

Permission format

{resource}.{action}

Examples:

  • assets.view: View assets
  • incidents.create: Create an incident
  • contracts.field.cost: View contract costs
Tip: Create business roles ("L1 Support", "CMDB Manager") rather than modifying system roles.

Ownership scopes

Scopes define the data access perimeter.

Available scopes

ScopeAccessExample
allAll tenant entitiesAdmin sees all incidents
organizationEntities in their organizationManager sees department incidents
teamEntities in their teamTech sees team-assigned incidents
ownOnly their own entitiesViewer sees only their incidents

Scope application

Scope applies automatically to:

  • Lists filtered by perimeter
  • Actions (edit, delete)
  • Exports and reports

Inheritance

A user with "organization" scope also sees entities from teams within their organization.

GDPR compliance

KaliaOps includes features for GDPR compliance.

Deactivation

Deactivation blocks access without deleting data:

  1. Open user card
  2. Click "Deactivate"
  3. User can no longer log in
  4. Data and history are preserved

Deactivation is reversible.

Deletion

Deletion permanently removes the user:

  1. Open user card
  2. Click "Delete"
  3. Confirm deletion

Scheduled deletion

For GDPR compliance, you can schedule deferred deletion:

  • User is immediately deactivated
  • Actual deletion occurs on scheduled date
  • User can request cancellation before that date

Preserved data

After deletion, some data is preserved for audit:

  • Action logs (anonymized)
  • History of processed incidents
  • References in created entities
Tip: Prefer deactivation over deletion for temporary departures or ongoing investigations.
Key points
  • RBAC system with 4 predefined roles (admin, manager, tech, viewer)
  • 90+ granular permissions covering all features
  • Ownership scopes: all, organization, team, own
  • Email invitation with pre-assigned role and employee
  • GDPR compliance: deactivation and scheduled deletion
Back to documentation Next article Advanced system configuration