Teams (Share Devices)
Synpse supports granular access control different resources and action. Using built in role based access control (RBAC) model you can allow or deny access to different resources in your project.
Last updated
Synpse supports granular access control different resources and action. Using built in role based access control (RBAC) model you can allow or deny access to different resources in your project.
Last updated
Keep track of all your applications and production devices in one place. All projects in Synpse can be shared to any number of people. Let your support investigate devices and then share information with the engineering to fix it remote or on-site.
Go to your projects page and click "manage". Then, in the project members section click on "new member":
Enter your colleagues email or GitHub username (depends on how they authenticated to Synpse). Once added, they will be able to see your project.
Roles grant permissions to specific resources or actions on them. Project member can have one or more roles, this allows project administrator to finely tune who can access devices, update applications, etc.
Role name | Description |
ProjectAdministrator | Higher level privileged access. Can interact with all resources in the project. |
Reader | Read only access to the project resources. Can read everything except Secret content. |
Contributor | Standard developer role. Can interact with most of the resources. With exceptions that user can't grant other users accesses and can't delete devices. |
DeviceAdministrator | Device administrator can execute privileged methods on devices. Example: SSH, Wipe or Restart devices. |
UserAccessAdministrator | Second to ProjectAdministrator privileged. Can grant other users accesses. |
User can create custom roles or used default provided roles. If you wish to create custom roles, you will need to use either CLI or API.