Reference: User permissions and names

This reference describes the permissions granted to the five default Puppet Enterprise (PE) user roles, as well as the display name and system name for each type and permission.

Permissions vary by type. Permission scope can, sometimes, be refined by an object specification. For an explanation of these terms, refer to Structure of user permissions.

Each type and permission has a display name, which is the name you see in the PE console, and a system name, which is the name used in the RBAC API. The Permissions for default roles table uses display names. Refer to the Display names and system names table to find the corresponding system name for each display name.

Permissions for default roles

This table lists permissions granted to the default PE user roles, a description of what is allowed by each permission, any object specification or node group inheritance conditions, and which roles (if any) the permissions are assigned to by default.

Type Permission Definition Roles
Certificate request Accept and reject Accept and reject certificate signing requests.

Object must always be "*".

  • Administrators
  • Operators
Configuration View and edit View and edit configuration, such as the disclaimer message on the PE console login page. Administrators
Console View View the PE console.

Object must always be "*".

  • Administrators
  • Operators
  • Viewers
Directory service View, edit, and test View, edit, and test directory service settings.

Object must always be "*".

Administrators
Job orchestrator Start, stop and view jobs Start and stop jobs and tasks, view jobs and job progress, view an inventory of nodes that are connected to the PCP broker.
  • Operators
  • Viewers
  • Project Deployers
Node groups Create, edit, and delete child groups Create new child groups, delete existing child groups, and modify every attribute of child groups except environment.

This permission is inherited by all descendents of the node group.

  • Administrators
  • Operators
Node groups Edit child group rules Edit the rules of descendents of a node group.

This does not grant the ability to edit the rules of the group in the object field, only children of that group.

This permission is inherited by all descendents of the node group.

  • Administrator
  • Operators
Node groups Edit classes, parameters, and variables Edit every attribute of a node group except its environment and rule.

This permission is inherited by all descendents of the node group.

  • Administrators
  • Operators
Node groups Edit configuration data Edit parameterized configuration data on a node group.

This permission is inherited by all descendents of the node group.

  • Administrators
  • Operators
Node groups Edit parameters and variables Edit the class parameters and variables of a node group's classes.

This permission is inherited by all descendents of the node group.

  • Administrators
  • Operators
Node groups Set environment Set the environment of a node group.

This permission is inherited by all descendents of the node group.

  • Administrators
  • Operators
Node groups View See all attributes of a node group, including the values of class parameters and variables.

This permission is inherited by all descendents of the node group.

  • Administrators
  • Operators
  • Viewers
Nodes Edit node data from PuppetDB Edit node data imported from PuppetDB.

Object must always be "*".

Administrators
Nodes View node data from PuppetDB View node data imported from PuppetDB.

Object must always be "*".

Administrators
Nodes View sensitive connection information in inventory service View sensitive parameters stored in the inventory service for a connection, such as user credentials.

Object must always be "*".

Administrators
Nodes Add and delete connection information from inventory service Add new connections to the inventory service and delete existing connections. Administrators
Plans Run plans Run specific plans on all nodes. Administrators
Projects Deploy projects Not used.
  • Administrators
  • Project Deployers
Projects Run tasks and plans from projects Not used.
  • Administrators
  • Project Deployers
Puppet agent Run Puppet on agent nodes Trigger a Puppet run from the console or orchestrator.

Object must always be "*".

  • Administrators
  • Operators
Puppet environment Deploy code Deploy code to a specific PE environment.
  • Administrators
  • Operators
  • Code Deployers
Puppet Server Compile catalogs for remote nodes Compile a catalog for any node managed by this PE instance.

This permission is required to run impact analysis tasks in Continuous Delivery.

Administrators
Scheduled jobs Delete another user's scheduled jobs Delete scheduled jobs created by the user instance specified in the permission.

This can be granted per user.

Administrators
Tasks Run tasks Run specific tasks on all nodes, nodes in a selected node group, or nodes matching a PQL query.
A task must be permitted to run on all nodes in order to run on nodes that are outside of the PuppetDB (over SSH or WinRM for example). As a result, users with such permissions can run tasks on any nodes they have the credentials to access.
Administrators
User groups Delete Delete a user group.

This can be granted per group.

Administrators
User groups Import Import groups from the directory service for use in RBAC.

Object must always be "*".

Administrators
User roles Create Create new roles.

Object must always be "*".

Administrators
User roles Edit Edit and delete a role.

Object must always be "*".

Administrators
User roles Edit members Change which users and groups a role is assigned to.

This can be granted per role.

Administrators
Users Create Create new local users.

Object must always be "*".

This permission is for local users. Remote users are "created" when that user authenticates for the first time with RBAC.
Administrators
Users Edit Edit local user data (such as names or email addresses) and delete local or remote users from PE.

This can be granted per user.

Administrators
Users Reset password Grant password reset tokens to users who have forgotten their passwords.

Granting a password reset token also reinstates a user who has been revoked.

This can be granted per user.

Administrators
Users Revoke Revoke or disable a user, so the user can no longer authenticate and use the console, node classifier, or RBAC API.

This permission also includes the ability to revoke a user's authentication tokens.

This can be granted per user.

Administrators

Display names and system names

Each type and permission has a display name and a system name. The display name is the name you see in the PE console. The system name is the name used with the RBAC API. This table provides the display name and system name for each type and corresponding permissions. Types are listed multiple times if there are multiple permissions associated with that type.

Type display name Type system name Permission display name Permission system name
Certificate requests cert_requests Accept and reject accept_reject
Configuration configuration View view
Configuration configuration Edit edit
Console console_page View view
Directory service directory_service View, edit, and test edit
Job orchestrator orchestrator Start, stop and view jobs view
Node groups node_groups Create, edit, and delete child groups modify_children
Node groups node_groups Edit child group rules edit_child_rules
Node groups node_groups Edit classes, parameters, and variables edit_classification
Node groups node_groups Edit configuration data edit_config_data
Node groups node_groups Edit parameters and variables edit_params_and_vars
Node groups node_groups Set environment set_environment
Node groups node_groups View view
Nodes nodes Edit node data from PuppetDB edit_data
Nodes nodes View node data from PuppetDB view_data
Nodes nodes View sensitive connection information in inventory service view_inventory_sensitive
Plans plans Run Plans run
Puppet agent puppet_agent Run Puppet on agent nodes run
Puppet environment environment Deploy code deploy_code
Puppet Server puppetserver Compile catalogs for remote nodes compile_catalogs
Tasks tasks Run Tasks run
User groups user_groups Import import
User roles user_roles Create create
User roles user_roles Edit edit
User roles user_roles Edit members edit_members
Users users Create create
Users users Edit edit
Users users Reset password reset_password
Users users Revoke disable

Related information