Create Roles
Overviewβ
Creating Roles allows administrators to restrict identity permissions for performing privileged actions in the Secure Access admin console. For example, administrators can create and define a role called "Help Desk Admins" with permissions to perform limited privileged actions, like sending enrollment emails but not deleting identities.
What You'll Learnβ
This article will guide you through the process of:
- Creating a new role and customizing its permissions
Legend: π = Sensitive scope (see Sensitive or Administrative Permissions)
How to Create a Roleβ
Stepsβ
-
To create a role, click Roles from the left-hand navigation panel.

-
Click Create Role.

-
Enter the following information for the role you are creating:
- Name
- Description
- Then, in the Identities section, select the permissions the new role needs for managing identities (if any):
- Read Identities β View list of all identities and individual profiles
- Create Identities β Create identity profiles
- π Update Identities β Update identity profiles and manage identity status (suspend, reactivate)
- Delete Identities β Permanently delete identities
Selecting any π sensitive scope triggers special rulesβsee Sensitive or Administrative Permissions.
- In the Passkeys section, select all the permissions the new role needs for passkey management (if any):
- Read passkeys β View list of passkeys
- Create passkey emails β Create enrollment emails
- π Create passkey links β Send enrollment links
- π Create passkey via any method β Send enrollment of every kind
- Revoke passkey emails and passkey links β Revoke enrollment emails and enrollment links after they have been sent
- Update passkeys β Manage enrollment emails and revoke passkeys
- Delete passkeys β Permanently delete passkeys
Heads up: π items are sensitive scopes. If you select one, you must include all sensitive scopes. See Sensitive or Administrative Permissions.
- Select the Groups permission for the new role (if any):
- Read groups β View list of groups
- Create groups β Create groups
- π Update groups β Update group details
- Delete groups β Permanently delete groups
Heads up: π items are sensitive scopes. If you select one, you must include all sensitive scopes. See Sensitive or Administrative Permissions.
Note: To allow the role to manage users in a Groups, select the Read Identities permission under Identities (Step 4).
- Select the permissions for management of Devices for the new role (if any):
- View devices β List all devices in the fleet, see statistics
- Add devices β Add new devices
- Update devices β Update devices details
- Delete devices β Permanently remove devices
- Select the Roles permissions for the new role (if any):
- Read roles β View list of roles
- Create roles β Create roles
- π Update roles β Update roles
- Delete roles β Permanently delete roles
Heads up: π items are sensitive scopes. If you select one, you must include all sensitive scopes. See Sensitive or Administrative Permissions.
- Select the Events permissions for the new role (if any):
- Read events β View list of events
- Select the Applications permissions for the new role (if any):
- Read applications β View list of applications
- π Read application secrets β The ability to view secrets that are associated with applications
- Create applications β Create applications
- Update applications β Update application configurations
- Delete applications β Permanently delete applications
- Read app tiles β Read app tiles
- Create app tiles β Create app tiles
- Update app tiles β Update app tiles
- Delete app tiles β Delete app tiles
Heads up: π items are sensitive scopes. If you select one, you must include all sensitive scopes. See Sensitive or Administrative Permissions.
Note: To allow the role to manage identities for an application, select the Read Identities permission under Identities.
To allow the role to manage groups for an application, select the Read Groups permission under Groups.
- Select the Identity Providers permissions for the new role (if any):
- Read Identity Providers β View list of Identity Providers
- Create Identity Provider β Create Identity Provider
- Update Identity Provider β Update Identity Provider details
- Delete Identity Provider β Permanently delete Identity Provider
- Select the API Access permissions for the new role (if any):
- Read API Access β View API Access details and access tokens
- Update API Access β Create API Access Tokens
- Delete API Access tokens β Permanently delete API Access Tokens
- Select the Device Query permissions for the new role (if any):
- Read custom attributes β Read custom attributes
- Create custom attributes β Create custom attributes
- Update custom attributes β Update custom attributes
- Delete custom attributes β Delete custom attributes
- Select the Manage Attributes permissions for the new role (if any):
- Read managed attributes β Read managed attributes
- Create managed attributes β Create managed attributes
- Update managed attributes β Update managed attributes
- Delete managed attributes β Delete managed attributes
- Select the Policy permissions for the new role (if any):
- Read policy β View list of policy
- Update policy β Update policy rules
- Select the Branding permissions for the new role (if any):
- Read branding β View branding configuration
- Create branding β Create branding configurations
- Update branding β Update branding configuration
- Select the Integrations permissions for the new role (if any):
- Read integrations β View list of integrations
- Create integrations β Create integrations
- Update integrations β Update integrations details
- Delete integrations β Permanently delete integrations
- Select the Realms permissions for the new role (if any):
- Read realms β Read realms
- Create realms β Create new realms
- Update realms β Update realms
- Delete realms β Delete realms
- Select the Administration permissions for the new role (if any):
- Update tenant β Ability to update tenant-level settings
- Introspect tokens β Ability to introspect tokens assigned to a user
-
After you are finished selecting all the permissions for the new role, click Create Role, on the top right corner of the page.

-
Once created, the new role will now appear in the Roles table.

Sensitive or Administrative Permissions (Feature-flagged)β
Some permissions are sensitive scopes because they can be misused for privilege escalation or compromise (for example, modifying privileged identities, adding oneself to privileged groups, or generating credential-binding links for higher-privileged users). To reduce risk, when any sensitive scope is selected, all sensitive scopes must be selected together. This effectively makes the role Super Adminβequivalent and prevents partially privileged βbackdoorβ roles. This enforcement is currently feature-flag controlled (not GA).
Sensitive Scopes (current set)β
identities:updateβ Could change a higher-privileged userβs email to an attacker-controlled email to take over that account.groups:updateβ Could add oneself to a privileged group and escalate access.applications:read-secretsβ Could expose confidential application credentials.credential-binding-jobs:create-linksβ Could generate a passkey binding link for a privileged identity and use it to impersonate that user.credential-binding-jobs:createβ Similar impersonation risk when used against privileged identities.roles:updateβ Could silently widen privileges for other admins or self.
Enforcement rule (when the feature flag is enabled): Selecting any one of the above requires all to be selected. Otherwise, remove sensitive scopes and design a least-privilege role instead.
Example validation message (when enforcement is on):
All sensitive scopes must be selected together.
Include all sensitive permissions or remove them from the role.
Recommended Service Desk Role (Least Privilege)β
For a support-focused Service Desk role, use the non-sensitive scopes below. This allows common user lifecycle work without exposing sensitive operations. If a task requires sensitive scopes, escalate to a Super Admin.
Identity Management
identities:readidentities:createidentities:delete- Do not include
identities:update
Passkey Management
credential-binding-jobs:create-email(send enrollment emails)- Do not include
credential-binding-jobs:createorcredential-binding-jobs:create-links
Groups & Access
groups:read- Do not include
groups:update
Read-Only
policies:readapplications:read(no secrets)
FAQβ
Why require all sensitive scopes together?
To prevent partially privileged roles that can be chained into privilege escalation; the platform enforces this automatically for tenants with the feature flag enabled.
Is the enforcement GA?
No. It is feature-flagged and may be enabled for certain customers/tenants.