Below is a complete reference of IAM permissions and corresponding conditions applicable to Dynatrace services. Refer to it when you need to define access policies based on a fine-grained set of permissions and conditions that can be enforced per service.
AppEngine
Grants permission to install and update apps
shared:app-id
- The ID of the app.IN
,=
,!=
,startsWith
,NOT IN
,NOT startsWith
app-engine:app-installer
- The ID of the user that installed the app.IN
,=
,!=
,startsWith
,NOT IN
,NOT startsWith
Grants permission to list and run apps and gives basic access to the Launcher
shared:app-id
- The ID of the app.IN
,=
,!=
,startsWith
,NOT IN
,NOT startsWith
app-engine:app-installer
- The ID of the user that installed the app.IN
,=
,!=
,startsWith
,NOT IN
,NOT startsWith
Grants permission to uninstall apps
shared:app-id
- The ID of the app.IN
,=
,!=
,startsWith
,NOT IN
,NOT startsWith
app-engine:app-installer
- The ID of the user that installed the app.IN
,=
,!=
,startsWith
,NOT IN
,NOT startsWith
Grants permission to use the function-executor
Grants permission to read EdgeConnects
Grants permission to write EdgeConnects
Grants permission to delete EdgeConnects
App Settings service
Grants permission to read app settings objects belonging to the schema
settings:schemaId
- A string that uniquely identifies a single app settings schema. The identifier of a schema can be found in the info box of a settings screen. The condition will match if the object's schemaId property matches.IN
,=
,!=
,startsWith
,NOT startsWith
shared:app-id
- A string that matches an app identifier. Only applicable to objects of schemas that have been added via apps. The condition will match if the object's app-id property matches.IN
,NOT IN
,startsWith
,NOT startsWith
,=
,!=
Grants permission to write settings objects belonging to the schema
settings:schemaId
- A string that uniquely identifies a single settings schema. The identifier of a schema can be found in the info box of a settings screen. The condition will match if the object's schemaId property matches.IN
,=
,!=
,startsWith
,NOT startsWith
shared:app-id
- A string that matches an app identifier. Only applicable to objects of schemas that have been added via apps. The condition will match if the object's app-id property matches.IN
,NOT IN
,startsWith
,NOT startsWith
,=
,!=
Automation Server
Grants permission to read workflows
Grants permission to write workflows
Grants permission to execute workflows
Grant admin permissions for workflows.
Grants permission to read scheduling rules
Grants permission to write scheduling rules
Grants permission to read business calendars
Grants permission to write business calendars
Cloud Automation service
Grants permission to read resources stored in the Git repository
cloudautomation:project
- A string that uniquely identifies your Cloud Automation project.IN
,=
,!=
cloudautomation:stage
- A string that uniquely identifies your Cloud Automation stage.IN
,=
,!=
cloudautomation:service
- A string that uniquely identifies your Cloud Automation service.IN
,=
,!=
Grants permission to write/edit resources stored in the Git repository
cloudautomation:project
- A string that uniquely identifies your Cloud Automation project.IN
,=
,!=
cloudautomation:stage
- A string that uniquely identifies your Cloud Automation stage.IN
,=
,!=
cloudautomation:service
- A string that uniquely identifies your Cloud Automation service.IN
,=
,!=
Grants permission to delete resources stored in the Git repository
cloudautomation:project
- A string that uniquely identifies your Cloud Automation project.IN
,=
,!=
cloudautomation:stage
- A string that uniquely identifies your Cloud Automation stage.IN
,=
,!=
cloudautomation:service
- A string that uniquely identifies your Cloud Automation service.IN
,=
,!=
Grants permission to read metadata of Cloud Automation
Grants permission to read events in Cloud Automation
cloudautomation:project
- A string that uniquely identifies your Cloud Automation project.IN
,=
,!=
cloudautomation:stage
- A string that uniquely identifies your Cloud Automation stage.IN
,=
,!=
cloudautomation:service
- A string that uniquely identifies your Cloud Automation service.IN
,=
,!=
cloudautomation:event
- A string that uniquely identifies your Cloud Automation event type.IN
,=
,!=
Grants permission to send events to Cloud Automation
cloudautomation:project
- A string that uniquely identifies your Cloud Automation project.IN
,=
,!=
cloudautomation:stage
- A string that uniquely identifies your Cloud Automation stage.IN
,=
,!=
cloudautomation:service
- A string that uniquely identifies your Cloud Automation service.IN
,=
,!=
cloudautomation:event
- A string that uniquely identifies your Cloud Automation event type.IN
,=
,!=
Grants permission to read logs of Cloud Automation
Grants permission to write logs for Cloud Automation
Grants permission to read projects in Cloud Automation
cloudautomation:project
- A string that uniquely identifies your Cloud Automation project.IN
,=
,!=
Grants permission to write/edit projects in Cloud Automation
cloudautomation:project
- A string that uniquely identifies your Cloud Automation project.IN
,=
,!=
Grants permission to delete projects in Cloud Automation
cloudautomation:project
- A string that uniquely identifies your Cloud Automation project.IN
,=
,!=
Grants permission to read stages in Cloud Automation
cloudautomation:project
- A string that uniquely identifies your Cloud Automation project.IN
,=
,!=
cloudautomation:stage
- A string that uniquely identifies your Cloud Automation stage.IN
,=
,!=
Grants permission to read services in Cloud Automation
cloudautomation:project
- A string that uniquely identifies your Cloud Automation project.IN
,=
,!=
cloudautomation:stage
- A string that uniquely identifies your Cloud Automation stage.IN
,=
,!=
cloudautomation:service
- A string that uniquely identifies your Cloud Automation service.IN
,=
,!=
Grants permission to write/edit services in Cloud Automation
cloudautomation:project
- A string that uniquely identifies your Cloud Automation project.IN
,=
,!=
cloudautomation:stage
- A string that uniquely identifies your Cloud Automation stage.IN
,=
,!=
cloudautomation:service
- A string that uniquely identifies your Cloud Automation service.IN
,=
,!=
Grants permission to delete services in Cloud Automation
cloudautomation:project
- A string that uniquely identifies your Cloud Automation project.IN
,=
,!=
cloudautomation:stage
- A string that uniquely identifies your Cloud Automation stage.IN
,=
,!=
cloudautomation:service
- A string that uniquely identifies your Cloud Automation service.IN
,=
,!=
Grants permission to read integrations used in Cloud Automation
Grants permission to write/edit integrations used in Cloud Automation
Grants permission to delete integrations used in Cloud Automation
Grants permission to read secrets used in Cloud Automation
Grants permission to write secrets used in Cloud Automation
Grants permission to delete secrets used in Cloud Automation
Grants permission to manage a Cloud Automation instance
Grants permission to read the usage statistics of a Cloud Automation instance
Davis service
Grants permission to view Davis analyzers
Grants permission to execute Davis analyzers
Davis CoPilot exposes generative AI capabilities in Dynatrace
Grants permission to interact with the Davis CoPilot conversational interface
Grants permission to execute the Natural Language to DQL generative AI capability
Deployment service
Grants permission to write ActiveGate network zones
Grants permission to write ActiveGate groups
Grants permission to write OneAgent network zones
Grants permission to write OneAgent host groups
Grants permission to write OneAgent host tags
Grants permission to write OneAgent host properties
Grants permission to write OneAgent communication settings
Developer Observability
Grants permission to set breakpoint using DevObs live debugger
dev-obs:k8s.deployment.name
- Kubernetes deployment names of the agents where the user is allowed to set breakpoints=
,IN
,startsWith
,!=
,NOT IN
,NOT startsWith
dev-obs:k8s.namespace.name
- Kubernetes namespaces of the agents where the user is allowed to set breakpoints=
,IN
,startsWith
,!=
,NOT IN
,NOT startsWith
dev-obs:host.group.name
- Host groups of the agents where the user is allowed to set breakpoints=
,IN
,startsWith
,!=
,NOT IN
,NOT startsWith
dev-obs:process.group.name
- Process groups of the agents where the user is allowed to set breakpoints=
,IN
,startsWith
,!=
,NOT IN
,NOT startsWith
Grants permission to set breakpoint using DevObs live debugger
dev-obs:k8s.deployment.name
- Kubernetes deployment names of the agents where the user is allowed to set breakpoints=
,IN
,startsWith
,!=
,NOT IN
,NOT startsWith
dev-obs:k8s.namespace.name
- Kubernetes namespaces of the agents where the user is allowed to set breakpoints=
,IN
,startsWith
,!=
,NOT IN
,NOT startsWith
dev-obs:host.group.name
- Host groups of the agents where the user is allowed to set breakpoints=
,IN
,startsWith
,!=
,NOT IN
,NOT startsWith
dev-obs:process.group.name
- Process groups of the agents where the user is allowed to set breakpoints=
,IN
,startsWith
,!=
,NOT IN
,NOT startsWith
Grants permission to manage breakpoints set in DevObs live debugger
Grants permission to manage breakpoints set in DevObs live debugger
Document service
Grants permission to create and update documents of the document service
Grants permission to read documents of the document service
Grants permission to delete documents of the document service
Grants admin permissions for documents of the document service
Grants permission to read environment shares of the document service
Grants permission to create and update environment shares of the document service
Grants permission to claim environment shares of the document service
Grants permission to delete environment shares of the document service
Grants permission to delete direct shares of the document service
Grants permission to read direct shares of the document service
Grants permission to create and update direct shares of the document service
Grants permission to read deleted documents of the document service
Grants permission to remove deleted documents from the trash of the document service
Grants permission to restore deleted documents from the trash of the document service
API for sending emails
Grants permission to send emails from @apps.dynatrace.com with send email API
Environment and management zone user permissions. See Migrate role-based permissions to Dynatrace IAM for more information.
Role IAM permissions work the same way as classic roles do, which means that the environment:roles:viewer
permission is a part of any other role permission. For example, a policy granting environment:roles:manage-settings
permission also allows a user to access the web UI.
Grants user the Access environment permission.
environment:management-zone
- A string that uniquely identifies a management zone. Applies the permission on the management zone level for the specified management zone.IN
,startsWith
,NOT startsWith
,=
,!=
Grants user the Change monitoring settings permission.
environment:management-zone
- A string that uniquely identifies a management zone. Applies the permission on management zone level for the specified management zone.IN
,startsWith
,NOT startsWith
,=
,!=
Grants user the Download/install OneAgent permission. Users who have this permission assigned are also able to view monitoring data for all management zones.
Grants user the View sensitive request data permission.
environment:management-zone
- A string that uniquely identifies a management zone. Applies the permission on management zone level for the specified management zone.IN
,startsWith
,NOT startsWith
,=
,!=
Grants user the Configure capture of sensitive data permission. Users who have this permission assigned are also able to view monitoring data for all management zones.
Grants user the Replay session data without masking permission.
environment:management-zone
- A string that uniquely identifies a management zone. Applies the permission on management zone level for the specified management zone.IN
,startsWith
,NOT startsWith
,=
,!=
Grants user the Replay session data permission.
environment:management-zone
- A string that uniquely identifies a management zone. Applies the permission on management zone level for the specified management zone.IN
,startsWith
,NOT startsWith
,=
,!=
Grants user the Manage security problems permission.
environment:management-zone
- A string that uniquely identifies a management zone. Applies the permission on management zone level for the specified management zone.IN
,startsWith
,NOT startsWith
,=
,!=
Grants user the View security problems permission.
environment:management-zone
- A string that uniquely identifies a management zone. Applies the permission on management zone level for the specified management zone.IN
,startsWith
,NOT startsWith
,=
,!=
Grants user the View logs permission.
environment:management-zone
- A string that uniquely identifies a management zone. Applies the permission on management zone level for the specified management zone.IN
,startsWith
,NOT startsWith
,=
,!=
Extensions service
Grants permission to read extension and environment configurations
extensions:extension-name
- A string that uniquely identifies a single extensionIN
,NOT IN
,startsWith
,NOT startsWith
,!=
,=
Grants permission to write (update/create/delete) extension and environment configurations
extensions:extension-name
- A string that uniquely identifies a single extensionIN
,NOT IN
,startsWith
,NOT startsWith
,!=
,=
Grants permission to read extension monitoring configurations
extensions:host
- A string that uniquely identifies a single host for monitoring configuration assignmentIN
,=
extensions:host-group
- A string that uniquely identifies a single host group for monitoring configuration assignmentIN
,=
extensions:ag-group
- A string that uniquely identifies a single ActiveGate group for monitoring configuration assignmentIN
,=
extensions:management-zone
- A string that uniquely identifies a single management zone for monitoring configuration assignmentIN
,=
extensions:extension-name
- A string that uniquely identifies a single extensionIN
,NOT IN
,startsWith
,NOT startsWith
,!=
,=
Grants permission to write (update/create/delete) extension monitoring configurations
extensions:host
- A string that uniquely identifies a single host for monitoring configuration assignmentIN
,=
extensions:host-group
- A string that uniquely identifies a single host group for monitoring configuration assignmentIN
,=
extensions:ag-group
- A string that uniquely identifies a single ActiveGate group for monitoring configuration assignmentIN
,=
extensions:management-zone
- A string that uniquely identifies a single management zone for monitoring configuration assignmentIN
,=
extensions:extension-name
- A string that uniquely identifies a single extensionIN
,NOT IN
,startsWith
,NOT startsWith
,!=
,=
Grants permission to execute actions for extension
extensions:host
- A string that uniquely identifies a single host for monitoring configuration assignmentIN
,=
extensions:host-group
- A string that uniquely identifies a single host group for monitoring configuration assignmentIN
,=
extensions:ag-group
- A string that uniquely identifies a single ActiveGate group for monitoring configuration assignmentIN
,=
extensions:management-zone
- A string that uniquely identifies a single management zone for monitoring configuration assignmentIN
,=
extensions:extension-name
- A string that uniquely identifies a single extensionIN
,NOT IN
,startsWith
,NOT startsWith
,!=
,=
Geolocation Service
Grants permission to lookup geolocations for IP adresses.
Hub provides catalog content, such as Dynatrace Apps, Extensions, and Technologies, in the context of the environment.
Grants permission to read the hub catalog content.
Hyperscaler authentication service
Grants permission to authenticate against AWS.
IAM
Allows (or denies) using service users
iam:service-user-email
- Service users emailsIN
,=
Identity federation service
Enables reading federations details and downloading federation Service Provider metadata.
Enables creating, updating and deleting federations.
Enables reading the account card to review configuration of the account.
Enables the setting and clearing of the default federation for the account.
Enables the creation, updating, and deletion of federated domains in the account. Federated domains participate in federation discovery.
Enables reading the environment card to review the configuration applied to environment.
Enables configuring federation discovery on the environment level in the account.
Business Insights Service
Grants permission to read data from the Opportunity Insights API
API for sending notifications
Grants permission to read self notifications.
Grants permission to write self notifications.
Authorization of OAuth token issuing actions (token exchange)
Allows management of light OAuth clients
oauth2:scopes
- Requested scopes for the generated OAuth clients=
,NOT IN
OpenPipeline
Grants permission to read the OpenPipeline configuration
Grants permission to write the OpenPipeline configuration
Settings service
Enables reading of settings objects belonging to the schema
settings:schemaId
- A string that uniquely identifies a single settings schema. The identifier of a schema can either be found via the dedicated schema endpoint in the Dynatrace Environment API or in the info box of a settings screen. The condition will match if the object's schemaId property matches.IN
,=
,!=
,startsWith
,NOT startsWith
shared:app-id
- A string that matches an app identifier. Only applicable to objects of schemas that have been added via apps. The condition will match if the object's app-id property matches.IN
,NOT IN
,startsWith
,NOT startsWith
,=
,!=
settings:schemaGroup
- A schema group that allows to address multiple individual schemas at once. The group of a schema can either be found via the dedicated schema endpoint in the Dynatrace Environment API or in the info box of a settings screen. The condition will match if the schema of the object has a schemaGroup property that matches.IN
,=
settings:entity.hostGroup
- The host group attribute of an entity for which a setting is stored. This is e.g. useful to grant access to settings scopes of all hosts which belong to the same host group.IN
,=
,!=
settings:scope
- The exact scope identifier a setting object has or will have. This condition allows to grant access to the scope of e.g., an individual host. In this case the scope equals the entity identifier, e.g. HOST-48B8F52F33098830.IN
,=
,!=
,startsWith
,NOT startsWith
environment:management-zone
- The name of a management zone. This condition is applicable to either: any settings object that is allowed on the scope of an entity that can be matched into a management zone or settings objects of the schemas builtin:alerting.maintenance-window, builtin:alerting.profile, builtin:anomaly-detection.metric-events, builtin:monitoring.slo and builtin:problem.notifications.IN
,=
,startsWith
Enables writing of settings objects belonging to the schema
settings:schemaId
- A string that uniquely identifies a single settings schema. The identifier of a schema can either be found via the dedicated schema endpoint in the Dynatrace Environment API or in the info box of a settings screen. The condition will match if the object's schemaId property matches.IN
,=
,!=
,startsWith
,NOT startsWith
shared:app-id
- A string that matches an app identifier. Only applicable to objects of schemas that have been added via apps. The condition will match if the object's app-id property matches.IN
,NOT IN
,startsWith
,NOT startsWith
,=
,!=
settings:schemaGroup
- A schema group that allows to address multiple individual schemas at once. The group of a schema can either be found via the dedicated schema endpoint in the Dynatrace Environment API or in the info box of a settings screen. The condition will match if the schema of the object has a schemaGroup property that matches.IN
,=
settings:entity.hostGroup
- The host group attribute of an entity for which a setting is stored. This is e.g. useful to grant access to settings scopes of all hosts which belong to the same host group.IN
,=
,!=
settings:scope
- The exact scope identifier a setting object has or will have. This condition allows to grant access to the scope of e.g., an individual host. In this case the scope equals the entity identifier, e.g. HOST-48B8F52F33098830.IN
,=
,!=
,startsWith
,NOT startsWith
environment:management-zone
- The name of a management zone. This condition is applicable to either: any settings object that is allowed on the scope of an entity that can be matched into a management zone or settings objects of the schemas builtin:alerting.maintenance-window, builtin:alerting.profile, builtin:anomaly-detection.metric-events, builtin:monitoring.slo and builtin:problem.notifications.IN
,=
,startsWith
Enables reading settings schemas
settings:schemaId
- A string that uniquely identifies a single settings schema. The identifier of a schema can either be found via the dedicated schema endpoint in the Dynatrace Environment API or in the info box of a settings screen. The condition will match if the schema's schemaId property of the schema matches.IN
,=
,!=
,startsWith
,NOT startsWith
shared:app-id
- A string that matches an app identifier. Only applicable to objects of schemas that have been added via apps. The condition will match if the object's app-id property matches.IN
,NOT IN
,startsWith
,NOT startsWith
,=
,!=
settings:schemaGroup
- A schema group that allows to address multiple individual schemas at once. The group of a schema can either be found via the dedicated schema endpoint in the Dynatrace Environment API or in the info box of a settings screen. The condition will match if the schema's schemaId property of the schema matches.IN
,=
SLO service
Grants permission to read Service-Level Objectives
Grants permission to write Service-Level Objectives
Grants permission to read Service-Level Objectives Templates
Platform State Service
Grants permission to read app-states
shared:app-id
- The ID of the app.IN
,NOT IN
,startsWith
,NOT startsWith
,=
,!=
Grants permission to write app-states
shared:app-id
- The ID of the app.IN
,NOT IN
,startsWith
,NOT startsWith
,=
,!=
Grants permission to delete app-states
shared:app-id
- The ID of the app.IN
,NOT IN
,startsWith
,NOT startsWith
,=
,!=
Grants permission to read user-app-states
shared:app-id
- The ID of the app.IN
,NOT IN
,startsWith
,NOT startsWith
,=
,!=
Grants permission to write user-app-states
shared:app-id
- The ID of the app.IN
,NOT IN
,startsWith
,NOT startsWith
,=
,!=
Grants permission to delete user-app-states
shared:app-id
- The ID of the app.IN
,NOT IN
,startsWith
,NOT startsWith
,=
,!=
State Management - Clear app-states and user-app-states of specific apps.
Grants permission to delete all app-states
shared:app-id
- The ID of the app.IN
,NOT IN
,startsWith
,NOT startsWith
,=
,!=
Grants permission to delete user-app-states of the current user
shared:app-id
- The ID of the app.IN
,NOT IN
,startsWith
,NOT startsWith
,=
,!=
Grants permission to delete user-app-states of all users
shared:app-id
- The ID of the app.IN
,NOT IN
,startsWith
,NOT startsWith
,=
,!=
Grail
Grants permission to read records from the events-table
storage:bucket-name
- This condition reduces the effect of the record-level permission to a defined list of buckets.=
,!=
,IN
,NOT IN
,startsWith
,NOT startsWith
storage:event.kind
- Gives high-level information about what kind of information the event contains, without being specific to the contents of the event. Helps to determine the record type of a raw event.=
,IN
,startsWith
storage:event.type
- The unique type identifier of a given event.=
,IN
,startsWith
storage:event.provider
- Source of the event, for example the name of the component or system that generated the event.=
,IN
,startsWith
storage:k8s.namespace.name
- The name of the namespace that the pod is running in.=
,IN
,startsWith
storage:k8s.cluster.name
- The name of the cluster that the pod is running in.=
,IN
,startsWith
storage:host.name
- Name of the host.=
,IN
,startsWith
storage:dt.host_group.id
- Id of the host group.=
,IN
,startsWith
storage:dt.security_context
- Custom field for security context.=
,IN
,startsWith
storage:gcp.project.id
- Google Cloud Platform Project ID.=
,IN
,startsWith
storage:aws.account.id
- Amazon Web Services Account ID.=
,IN
,startsWith
storage:azure.subscription
- Azure subscription.=
,IN
,startsWith
storage:azure.resource.group
- Azure resource group.=
,IN
,startsWith
Grants permission to write events to Grail
Grants permission to read timeseries from the metrics-table
storage:bucket-name
- This condition reduces the effect of the record-level permission to a defined list of buckets.=
,!=
,IN
,NOT IN
,startsWith
,NOT startsWith
storage:k8s.namespace.name
- The name of the namespace that the pod is running in.=
,IN
,startsWith
storage:k8s.cluster.name
- The name of the cluster that the pod is running in.=
,IN
,startsWith
storage:host.name
- Name of the host.=
,IN
,startsWith
storage:dt.host_group.id
- Id of the host group.=
,IN
,startsWith
storage:metric.key
- The identifier of a metric, grouping numeric measurements that share the same measurement semantics (i.e. were measured "the same way".)=
,IN
,startsWith
storage:dt.security_context
- Custom field for security context.=
,IN
,startsWith
storage:gcp.project.id
- Google Cloud Platform Project ID.=
,IN
,startsWith
storage:aws.account.id
- Amazon Web Services Account ID.=
,IN
,startsWith
storage:azure.subscription
- Azure subscription.=
,IN
,startsWith
storage:azure.resource.group
- Azure resource group.=
,IN
,startsWith
Grants permission to write metrics from 2nd gen to Grail & from 3rd gen to 2nd gen storage
Grants permission to read records from the logs-table
storage:bucket-name
- This condition reduces the effect of the record-level permission to a defined list of buckets.=
,!=
,IN
,NOT IN
,startsWith
,NOT startsWith
storage:k8s.namespace.name
- The name of the namespace that the pod is running in.=
,IN
,startsWith
storage:k8s.cluster.name
- The name of the cluster that the pod is running in.=
,IN
,startsWith
storage:host.name
- Name of the host.=
,IN
,startsWith
storage:dt.host_group.id
- Id of the host group.=
,IN
,startsWith
storage:log.source
- The location where the log comes from.=
,IN
,startsWith
storage:dt.security_context
- Custom field for security context.=
,IN
,startsWith
storage:gcp.project.id
- Google Cloud Platform Project ID.=
,IN
,startsWith
storage:aws.account.id
- Amazon Web Services Account ID.=
,IN
,startsWith
storage:azure.subscription
- Azure subscription.=
,IN
,startsWith
storage:azure.resource.group
- Azure resource group.=
,IN
,startsWith
Grants permission to write logs to Grail
Grants permission to read records from entities
storage:entity.type
- The type of the entity.=
,IN
,startsWith
storage:dt.security_context
- Custom field for security context.=
,IN
,startsWith
Grants permission to read records from the spans-table
storage:bucket-name
- This condition reduces the effect of the record-level permission to a defined list of buckets.=
,!=
,IN
,NOT IN
,startsWith
,NOT startsWith
storage:k8s.namespace.name
- The name of the namespace that the pod is running in.=
,IN
,startsWith
storage:k8s.cluster.name
- The name of the cluster that the pod is running in.=
,IN
,startsWith
storage:host.name
- Name of the host.=
,IN
,startsWith
storage:dt.host_group.id
- Id of the host group.=
,IN
,startsWith
storage:dt.security_context
- Custom field for security context.=
,IN
,startsWith
storage:gcp.project.id
- Google Cloud Platform Project ID.=
,IN
,startsWith
storage:aws.account.id
- Amazon Web Services Account ID.=
,IN
,startsWith
storage:azure.subscription
- Azure subscription.=
,IN
,startsWith
storage:azure.resource.group
- Azure resource group.=
,IN
,startsWith
Grants permission to read records from the bizevents-table
storage:bucket-name
- This condition reduces the effect of the record-level permission to a defined list of buckets.=
,!=
,IN
,NOT IN
,startsWith
,NOT startsWith
storage:event.kind
- Gives high-level information about what kind of information the event contains, without being specific to the contents of the event. Helps to determine the record type of a raw event.=
,IN
,startsWith
storage:event.type
- The unique type identifier of a given event.=
,IN
,startsWith
storage:event.provider
- Source of the event, for example the name of the component or system that generated the event.=
,IN
,startsWith
storage:k8s.namespace.name
- The name of the namespace that the pod is running in.=
,IN
,startsWith
storage:k8s.cluster.name
- The name of the cluster that the pod is running in.=
,IN
,startsWith
storage:host.name
- Name of the host.=
,IN
,startsWith
storage:dt.host_group.id
- Id of the host group.=
,IN
,startsWith
storage:dt.security_context
- Custom field for security context.=
,IN
,startsWith
storage:gcp.project.id
- Google Cloud Platform Project ID.=
,IN
,startsWith
storage:aws.account.id
- Amazon Web Services Account ID.=
,IN
,startsWith
storage:azure.subscription
- Azure subscription.=
,IN
,startsWith
storage:azure.resource.group
- Azure resource group.=
,IN
,startsWith
Grants permission to read records from all system tables (for example, dt.system.events
).
storage:bucket-name
- This condition reduces the effect of the record-level permission to a defined list of buckets.=
,!=
,IN
,NOT IN
,startsWith
,NOT startsWith
storage:event.kind
- Gives high-level information about what kind of information the event contains, without being specific to the contents of the event. Helps to determine the record type of a raw event.=
,IN
,startsWith
storage:event.type
- The unique type identifier of a given event.=
,IN
,startsWith
storage:event.provider
- Source of the event, for example the name of the component or system that generated the event.=
,IN
,startsWith
storage:dt.security_context
- Custom field for security context.=
,IN
,startsWith
Grants permission to read records from Grail buckets. Required additionally to a table permission.
storage:table-name
- Table name of the bucket that can be accessed.=
,!=
,IN
,NOT IN
,startsWith
,NOT startsWith
storage:bucket-name
- Name of the bucket that can be accessed.=
,!=
,IN
,NOT IN
,startsWith
,NOT startsWith
Read data from fieldsets
storage:table-name
- Name of the table from which fieldset(s) can be accessed.=
,!=
,IN
,NOT IN
,startsWith
,NOT startsWith
storage:bucket-name
- Name of the bucket from which fieldset(s) can be accessed.=
,!=
,IN
,NOT IN
,startsWith
,NOT startsWith
storage:fieldset-name
- Name of the fieldset(s) which can be accessed.=
,!=
,IN
,NOT IN
,startsWith
,NOT startsWith
Grants permission to read bucket definitions from Grail
Grants permission to write bucket definitions to Grail
Grants permission to delete bucket definitions from Grail
Grants permission to delete all records from a bucket (not delete the bucket itself) in Grail.
Read filter-segments from grail
Write filter-segments in grail
Delete own filter-segments in grail
Write and delete all filter-segments in grail
Unified analysis
Grants permission to read the screen definition of a unified analysis screen
SaaS Upgrade Assistant service
Grants permission to use the SaaS Upgrade Assistant app
Provides APIs to access vulnerabilities that are affecting customer environments
Allows viewing vulnerabilities
Allows modifying vulnerability related information