User permissions

User permissions

Permissions on the Intelligence Center are granular controls on user access
to features and data. They're predefined,
and assigned to users through roles.

Permissions are usually named with the convention <verb> <object>, where:

  • <verb> describes the action allowed, and
  • <object> describes the object being acted on.

To see a full list of permissions:

  • make a GET /permissions request,
  • or sign in on the Intelligence Center and
    go to Settings > User management > Permissions

The table of permissions below
covers permissions as they are applied in the Intelligence Center.

Control access through groups, roles, and permissions

What a user is allowed to access is determined by a combination of:

  • Groups

    Groups are used to organize users and
    defines the resources that its members are allowed to access.

  • Roles

    Roles are sets of permissions that determine the tasks a user assigned that role can perform.

The following flow chart is an example of
how to decide what to assign to your user
to give a certain level of access:

Permissions flow chart

Groups

Groups allow you to name the resources
it's members are allowed to access.

You can set for a group:

Allowed sources

Allowed sources are sources that
members of the group can access data from.

An allowed source has two properties:

  • the source
  • a TLP color

Sources can be:

  • Groups. By default, a group has itself as an allowed source. You can add other groups as allowed sources to give group members access to intelligence created by members of that group.
  • Incoming feeds. Entities and observables that are ingested through an incoming feed have their source automatically set to the name of the incoming feed.
  • Enrichers. When an observable or entity is enriched, the resulting entities and observables have their source set to the name of the enricher used.

TLP colors set for a source determines the most restrictive TLP (inclusive) that that members of this group can access. By default, this is set to RED for a source. This means that group members can access objects with TLP colors WHITE, GREEN, AMBER, and RED.

Setting an allowed source's to a less restrictive TLP color would prevent group members from accessinng objects with more restrictive TLP colors. For example, setting the TLP color for an allowed source to GREEN would mean that objects with TLP colors AMBER and RED cannot be accessed by group members.

Allowed roles

Groups must specify a set of roles that group members can be assigned to.

Setting allowed roles for a group does not actually assign the role to group members. You must first add roles to the allowed roles of a group, then explicitly assign those roles to the user.

Roles

Roles are sets of permissions that grant read
or modify access to a given resource.

modify permissions grant both read and modify permissions
for a resource.

A role can contain any number of permissions. Users inherit their permissions from the roles that they are assigned.

Table of permissions

The following table describes permissions as
they are applied in the Intelligence Center.

Permissions required for each endpoint is documented in the API reference.

All -modify permissions already
include -read level permissions.

For example, modify users permissions
include read users permissions,
so you can assign a user modify users
without read users.

📔

Permission dependencies

Some permissions depend on other permissions.

For example, a user must first have read-tickets permissions in order to be able to read task comments with read ticket-comments permisisons.

PermissionDescription
install knowledge-packsInstall knowledge packs. Note: To install knowledge packs in the UI, also requires read knowledge-packs permissions.
lock/unlock usersUnlock or deactivate user accounts. Note: Also requires modify users.
modify blob-uploadsManually upload files in the UI through + > Upload. Note: Different from files permissions.
modify collaboratorsAdd and remove users in workspaces. Note: Also requires read workspaces.
modify configurationsModify the following settings in the Intelligence Center UI: Settings > System settings, Settings > STIX and TAXII > STIX
modify knowledge-packsView, create, and modify knowledge packs.
modify discovery-rulesView, create, modify, enable/disable, and run discovery rules. Note: Requires additional permissions to access some fields: Search query (requires read entities for autocomplete), Correlated workspaces (requires read workspaces)
modify draft-entitiesView, create, and modify draft entities.
modify enrichersEdit, enable, and disable enrichers.
modify enrichment-rulesView, create, modify, enable/disable, and run enrichment rules. Note: Requires additional permissions to access some fields: Source (requires read sources), Enrichers (requires read enrichers)
modify entitiesView, create, and modify entities. Note: Requires additional permissions to see all fields and options. Min. permissions include: read extracts (related observables), read attack (MITRE ATT&CK classifications), read sources (sources)
modify extractsView, create, and modify observables
modify filesView, create, and modify files.