RightScale has an extensive Role Based Access Control (RBAC) to provide complete control over various parts of the platform. To view your own user roles across all of your accounts, go to Settings > User > Info. User Roles are account scoped but some roles can be granted at the Organization level from Governance application.
Administrative control of the RightScale Account. An account can have multiple users with 'admin' privileges. Only 'admins' can send and receive account invitations. Only an 'admin' can add/change public/private cloud infrastructures and credentials, modify user permissions, and accept account group invitations on behalf of a RightScale account. The RightScale account owner (the person who created the account) cannot have admin privileges revoked by another 'admin' user; the account owner will always have 'admin' user role privileges in the account he/she created. However, only an 'admin' user can revoke another user's 'admin' privileges. The 'admin' role is also needed to view and generate Infrastructure Audit Reports, view Customer Usage Reports (if the RightScale account is enabled for this feature), and to set account markups and markdowns in Optima.
Admins will also need actor permissions to add/change public/private cloud infrastructures and credentials.
Ability to manage all cloud related activity. You need 'actor' privileges in order to act on resources and services at the cloud infrastructure level such as launch/terminate servers, create volumes and snapshots, and run scripts on running servers. You will also need this permission to create and manage deployments and server arrays. Note: The ability to create security groups and related firewall rules requires the 'security_manager' user role.
Ability to view the RightScale account. If users do not have at least 'observer' role privileges, they will not be able to log into the Dashboard and view the account in Cloud Management.
Ability to create RightScale-specific components such as ServerTemplates, RightScripts, MultiCloud Images, Repositories, Credentials, and Alert Escalations. You will need this permission to essentially perform actions underneath the Design menu of the Dashboard. With this permission you can also browse the MultiCloud Marketplace (MCM) (from within the RightScale Dashboard) for ServerTemplates and RightScripts, but you will need the 'library' user role in order to import an object from the MCM. Note: You can also view publicly-viewable assets in the MCM using http://www.rightscale.com/library.
Ability to import objects from the MultiCloud Marketplace into a RightScale account. The ability to view the MultiCloud Marketplace (while logged into the RightScale dashboard) requires the 'designer' role.
Ability to manage network and firewall permissions that are used by instances in the cloud. You will need this permission in order to create security groups and define individual firewall rules within those security groups. You will also need this permission in order to create Virtual Private Clouds (VPCs) and subnets. Only trusted users should be granted this permission. You will also be able to view and generate Infrastructure Audit Reports.
Ability to log into running servers. For Linux servers running RightLink10, you can SSH into the instance using your default or custom login name. For Linux servers running RightLink prior to Rightlink10, you are identified by the first part of the email address used to log into the RightScale Dashboard. For Windows servers you can create a Remote Desktop Connection using RDP. Your managed SSH Key is used for authentication purposes. In order to establish a remote connection you must also make sure that the running instance has the appropriate firewall permissions to allow SSH (TCP port 22) and RDP (TCP port 3389) connections. See What is Server Login Control?
Ability to execute 'sudo' on running servers. (Applies to Linux-based (not Windows) servers only.) Similar to the 'security_manager' role, only trusted users should be granted this permission. Note: You will still need 'server_login' privileges in order to start an SSH/RDP session.
Ability to create sharing groups and share RightScale objects (ServerTemplates, RightScripts, and Macros) with other users. If you have a RightScale partner account, you can publish RightScale objects so that they appear in the MultiCloud Marketplace.
Ability to view the value of a RightScale Credential object.
(Enterprise only) Manages all accounts within a RightScale organization. Send account invitations and grant user role privileges across all accounts in the organization. The organization must have at least one 'enterprise_manager' user. An 'enterprise_manager' can also grant the same privileges to another user. See Organization.
Note : To enable the 'enterprise_manager' role, someone that is already an 'enterprise_manager' needs to be enable the role from the Governance module of RightScale.
ca_user role grants a user access to detailed billing information in the RightScale Optima site. This type of information is especially useful for users who want to keep track of their estimated infrastructure costs in order to stay within the allotted budget.
billing_center_admin role grants read-write access to Billing Centers and all accesses granted by ca_user within RightScale Optima for that organization.
billing_center_viewer role grants read-only access along with the ability to create reports and alerts for Billing Centers within RightScale Optima for that organization.
ss_end_user role grants a user End User privileges in Self-Service so they can view the Catalog along with managing CloudApps (e.g.: Launch, Terminate etc).
ss_observer role grants a user Observer privileges in Self-Service to view the Catalog and running CloudApps, but they can not take any action on them.
ss_designer role grants a user Designer privileges in Self-Service to view the Design menu to upload and publish CATs, manage Schedules, and interact with the Cloud Workflow Console.
policy_publisher role grants user access to the policy automation to publish or un-publish policy templates to the Catalog. Learn more about Policy Automation Access Control.
policy_designer role grants user access to the policy automation to design, upload, and test policy templates. Learn more about Policy Automation Access Control.
policy_manager role grants user access to the policy automation to apply policy templates and monitor them. Learn more about Policy Automation Access Control.
policy_manager role grants user view-only access to the policy automation to view running policies and incidents. Learn more about Policy Automation Access Control.