As a Dynatrace administrator, you can use the default Dynatrace policies and bind them to user groups similar to any other policy.
You can assign policies to groups via the user group details either on the account level, which includes all environments in that account, or on the individual environment level. You can find the default policies in the Policy overview of Account Management.
Grants administrative access across all Platform Services.
//StatesALLOW state:app-states:delete, state:app-states:read, state:app-states:write, state:user-app-states:read, state:user-app-states:write, state:user-app-states:delete, state-management:user-app-states:delete, state-management:user-app-states:delete-all, state-management:app-states:delete;//DocumentsALLOW document:documents:read, document:documents:write, document:documents:delete, document:documents:admin, document:environment-shares:read, document:environment-shares:write, document:environment-shares:claim, document:environment-shares:delete, document:direct-shares:read, document:direct-shares:write, document:direct-shares:delete, document:trash.documents:read, document:trash.documents:restore, document:trash.documents:delete;//Unified analysis screensALLOW unified-analysis:screen-definition:read;//Live DebuggerALLOW dev-obs:breakpoints:set;ALLOW dev-obs:breakpoints:manage;//GrailALLOW storage:bucket-definitions:read, storage:filter-segments:read, storage:fieldset-definitions:read, storage:fieldset-definitions:write;ALLOW storage:filter-segments:read, storage:filter-segments:write, storage:filter-segments:share, storage:filter-segments:delete, storage:filter-segments:admin;//OpenPipelineALLOW openpipeline:configurations:read, openpipeline:configurations:write;//HubALLOW hub:catalog:read;//AppEngineALLOW app-engine:apps:run, app-engine:functions:run, app-engine:edge-connects:read, app-engine:edge-connects:write, app-engine:edge-connects:delete, app-engine:apps:install, app-engine:apps:delete;//NotificationsALLOW email:emails:send, notification:self-notifications:read, notification:self-notifications:write, notification:notifications:read, notification:notifications:write;//AutomationEngineALLOW automation:workflows:read, automation:calendars:read, automation:rules:read, automation:workflows:write, automation:workflows:run, automation:calendars:write, automation:rules:write, automation:workflows:admin;//DavisALLOW davis:analyzers:read, davis:analyzers:execute;//Davis CopilotALLOW davis-copilot:conversations:execute, davis-copilot:nl2dql:execute, davis-copilot:dql2nl:execute, davis-copilot:document-search:execute;//IAMALLOW iam:service-users:use, oauth2:clients:manage;//SettingsALLOW settings:objects:read, settings:schemas:read, app-settings:objects:read, app-settings:objects:write, settings:objects:write, settings:objects:admin, app-settings:objects:admin;//ExtensionsALLOW extensions:definitions:read, extensions:definitions:write, extensions:configurations:read, extensions:configurations:write, extensions:configuration.actions:write;//DeploymentALLOW deployment:activegates.network-zones:write, deployment:activegates.groups:write, deployment:oneagents.network-zones:write, deployment:oneagents.host-groups:write, deployment:oneagents.host-tags:write, deployment:oneagents.host-properties:write;//ClassicsALLOW environment:roles:viewer, environment:roles:replay-sessions-with-masking, environment:roles:agent-install, environment:roles:configure-request-capture-data, environment:roles:manage-security-problems, environment:roles:manage-settings, cloudautomation:resources:read, cloudautomation:resources:write, cloudautomation:resources:delete, cloudautomation:metadata:read, cloudautomation:events:read, cloudautomation:events:write, cloudautomation:logs:read, cloudautomation:logs:write, cloudautomation:projects:read, cloudautomation:projects:write, cloudautomation:projects:delete, cloudautomation:stages:read, cloudautomation:services:read, cloudautomation:services:write, cloudautomation:services:delete, cloudautomation:integrations:read, cloudautomation:integrations:write, cloudautomation:integrations:delete, cloudautomation:secrets:read, cloudautomation:secrets:write, cloudautomation:secrets:delete, cloudautomation:instance:manage, cloudautomation:statistics:read;// Hyperscaler AuthenticationALLOW hyperscaler-authentication:aws:authenticate;//GeolocationsALLOW geolocation:locations:lookup;// Vulnerability serviceALLOW vulnerability-service:vulnerabilities:read;ALLOW vulnerability-service:vulnerabilities:write;// Security Intelligence ServiceALLOW security-intelligence:enrichments:run;//SLOsALLOW slo:slos:read, slo:slos:write, slo:objective-templates:read;//BusinessInsightsALLOW insights:opportunities:read;ALLOW insights:moments:read;
Grants advanced permissions to build, deploy, and run fully featured Dynatrace Apps and automated workflows that make the use of key Platform Services.
//StatesALLOW state:app-states:delete, state:app-states:read, state:app-states:write, state:user-app-states:read, state:user-app-states:write, state:user-app-states:delete, state-management:user-app-states:delete, state-management:user-app-states:delete-all;//DocumentsALLOW document:documents:read, document:documents:write, document:documents:delete, document:environment-shares:read, document:environment-shares:write, document:environment-shares:claim, document:environment-shares:delete, document:direct-shares:read, document:direct-shares:write, document:direct-shares:delete, document:trash.documents:read, document:trash.documents:restore, document:trash.documents:delete;//Unified analysis screensALLOW unified-analysis:screen-definition:read;//Live DebuggerALLOW dev-obs:breakpoints:set;//GrailALLOW storage:bucket-definitions:read;ALLOW storage:filter-segments:read, storage:filter-segments:write, storage:filter-segments:share, storage:filter-segments:delete;//OpenPipelineALLOW openpipeline:configurations:read;//HubALLOW hub:catalog:read;//AppEngineALLOW app-engine:apps:run, app-engine:functions:run, app-engine:edge-connects:read, app-engine:apps:install;//NotificationsALLOW email:emails:send, notification:self-notifications:read, notification:self-notifications:write, notification:notifications:read, notification:notifications:write;//AutomationEngineALLOW automation:workflows:read, automation:calendars:read, automation:rules:read, automation:workflows:write, automation:workflows:run, automation:calendars:write, automation:rules:write;//DavisALLOW davis:analyzers:read, davis:analyzers:execute;//Davis CopilotALLOW davis-copilot:conversations:execute, davis-copilot:nl2dql:execute, davis-copilot:dql2nl:execute, davis-copilot:document-search:execute;//IAMALLOW iam:service-users:use;//SettingsALLOW settings:objects:read, settings:schemas:read, app-settings:objects:read;//ClassicsALLOW environment:roles:viewer, environment:roles:replay-sessions-with-masking, environment:roles:view-security-problems, environment:roles:manage-security-problems;// Hyperscaler AuthenticationALLOW hyperscaler-authentication:aws:authenticate;//GeolocationsALLOW geolocation:locations:lookup;// Vulnerability serviceALLOW vulnerability-service:vulnerabilities:read;ALLOW vulnerability-service:vulnerabilities:write;// Security Intelligence ServiceALLOW security-intelligence:enrichments:run;//SLOsALLOW slo:slos:read, slo:slos:write, slo:objective-templates:read;//BusinessInsightsALLOW insights:opportunities:read;ALLOW insights:moments:read;//ExtensionsALLOW extensions:definitions:read;
Grants access to Dynatrace environment and run Dynatrace Apps.
//StatesALLOW state:app-states:delete, state:app-states:read, state:app-states:write, state:user-app-states:read, state:user-app-states:write, state:user-app-states:delete, state-management:user-app-states:delete, state-management:user-app-states:delete-all;//DocumentsALLOW document:documents:read, document:documents:write, document:documents:delete, document:environment-shares:read, document:environment-shares:write, document:environment-shares:claim, document:environment-shares:delete, document:direct-shares:read, document:direct-shares:write, document:direct-shares:delete, document:trash.documents:read, document:trash.documents:restore, document:trash.documents:delete;//Unified analysis screensALLOW unified-analysis:screen-definition:read;//Live DebuggerALLOW dev-obs:breakpoints:set;//GrailALLOW storage:bucket-definitions:read;ALLOW storage:fieldset-definitions:read;ALLOW storage:filter-segments:read, storage:filter-segments:write, storage:filter-segments:delete;//OpenPipelineALLOW openpipeline:configurations:read;//HubALLOW hub:catalog:read;//AppEngineALLOW app-engine:apps:run, app-engine:functions:run, app-engine:edge-connects:read;//NotificationsALLOW email:emails:send, notification:self-notifications:read, notification:self-notifications:write, notification:notifications:read, notification:notifications:write;//AutomationEngineALLOW automation:workflows:read, automation:calendars:read, automation:rules:read;ALLOW automation:workflows:write WHERE automation:workflow-type = "SIMPLE";ALLOW automation:workflows:run;//DavisALLOW davis:analyzers:read, davis:analyzers:execute;//Davis CopilotALLOW davis-copilot:conversations:execute, davis-copilot:nl2dql:execute, davis-copilot:dql2nl:execute, davis-copilot:document-search:execute;//SettingsALLOW settings:objects:read, settings:schemas:read, app-settings:objects:read;//ClassicsALLOW environment:roles:viewer, environment:roles:view-security-problems;//GeolocationsALLOW geolocation:locations:lookup;// Vulnerability serviceALLOW vulnerability-service:vulnerabilities:read;//SLOsALLOW slo:slos:read, slo:objective-templates:read;//BusinessInsightsALLOW insights:opportunities:read;ALLOW insights:moments:read;//ExtensionsALLOW extensions:definitions:read;
Grants unconditional access to ALL Grail tables and to ALL Grail buckets.
//Grail read dataALLOWstorage:application.snapshots:read,storage:bizevents:read,storage:buckets:read,storage:entities:read,storage:events:read,storage:logs:read,storage:metrics:read,storage:security.events:read,storage:smartscape:read,storage:spans:read,storage:system:read,storage:user.events:read,storage:user.sessions:read;//Lookup tablesALLOWstorage:files:read WHERE storage:file-path startsWith "/lookups/";
Grants access to the Grail bucket management and configuration of OpenPipeline processing capabilities.
// OpenPipelineALLOW openpipeline:configurations:read, openpipeline:configurations:write;// Grail read dataALLOW storage:bucket-definitions:write, storage:bucket-definitions:delete, storage:bucket-definitions:truncate;
Grants permission to ingest data into OpenPipeline.
ALLOW openpipeline:events:ingest, openpipeline:events.custom:ingest, openpipeline:security.events:ingest, openpipeline:security.events.custom:ingest, openpipeline:events.sdlc:ingest, openpipeline:events.sdlc.custom:ingest;
Grants read access to the Grail application snapshots table.
//Grail read dataALLOW storage:application.snapshots:read;ALLOW storage:buckets:read WHERE storage:table-name = "application.snapshots";
Grants unconditional access to the bizevents table and to all bizevent buckets, including all custom bizevent buckets.
//Grail read dataALLOW storage:buckets:read WHERE storage:table-name = "bizevents";ALLOW storage:bizevents:read;
Grants read access to all entities.
//Grail read dataALLOWstorage:entities:read,storage:smartscape:read;
Grants unconditional access to the Grail events table and to all event buckets (excluding security events).
//Grail read dataALLOW storage:buckets:read WHERE storage:table-name = "events" AND storage:bucket-name NOT IN ("default_security_events", "default_security_custom_events");ALLOW storage:events:read;
Grants unconditional access to the logs table and all log buckets, including all custom log buckets.
//Grail read dataALLOW storage:buckets:read WHERE storage:table-name = "logs";ALLOW storage:logs:read;//ClassicsALLOW environment:roles:logviewer;
Grants unconditional access to the metrics table and all metrics buckets, including all custom metrics buckets.
//Grail read dataALLOW storage:buckets:read WHERE storage:table-name = "metrics";ALLOW storage:metrics:read;
Grants unconditional access to the security events from both, events
and security.events
tables and to the default security event buckets.
// Grail read permission for security events residing in the `events` tableALLOW storage:buckets:read WHERE storage:bucket-name IN ("default_security_events", "default_security_custom_events");ALLOW storage:events:read;// Grail read permission for security events residing in the `security.events` tableALLOW storage:buckets:read WHERE storage:table-name = 'security.events';ALLOW storage:security.events:read;
Grants unconditional permissions to read sensitive data in Dynatrace.
//Read sensitive request dataALLOW environment:roles:view-sensitive-request-data;
Grants unconditional access to the spans table and all spans buckets, including all custom spans buckets.
//Grail read dataALLOW storage:buckets:read WHERE storage:table-name = "spans";ALLOW storage:spans:read;
Grants read access to all Dynatrace system events data.
//Grail read dataALLOW storage:buckets:read WHERE storage:table-name = "dt.system.events";ALLOW storage:system:read;
The legacy default policies were used previously to provide access to Dynatrace. They are not accessible for new policy assignments, but existing assignments of these policies remain until removed.
Grants admin permissions to view, run, and install Dynatrace Apps, and view workflows.
ALLOW app-engine:functions:run, app-engine:apps:run, app-engine:apps:install, app-engine:edge-connects:read, app-engine:edge-connects:write, app-engine:edge-connects:delete, app-engine:apps:delete;ALLOW hub:catalog:read;ALLOW automation:workflows:read, automation:rules:read, automation:calendars:read;ALLOW document:documents:read, document:documents:write, document:documents:delete, document:environment-shares:read, document:environment-shares:write, document:environment-shares:claim, document:environment-shares:delete, document:direct-shares:read, document:direct-shares:write, document:direct-shares:delete, document:trash.documents:read, document:trash.documents:restore, document:trash.documents:delete;ALLOW davis:analyzers:read, davis:analyzers:execute;ALLOW state:app-states:read, state:app-states:write, state:app-states:delete, state:user-app-states:read, state:user-app-states:write, state:user-app-states:delete, state-management:app-states:delete, state-management:user-app-states:delete, state-management:user-app-states:delete-all, app-settings:objects:read, app-settings:objects:write;ALLOW settings:objects:read, settings:objects:write, settings:schemas:read where settings:schemaId startsWith "app:";ALLOW settings:objects:read, settings:objects:write, settings:schemas:read where settings:schemaId = "service:davis.copilot.datamining-blocklist";ALLOW oauth2:clients:manage where oauth2:scopes="app-engine:edge-connects:connect";ALLOW email:emails:send, notification:self-notifications:read, notification:self-notifications:write, notification:notifications:read, notification:notifications:write;ALLOW storage:bucket-definitions:read, storage:bucket-definitions:write, storage:bucket-definitions:truncate, storage:bucket-definitions:delete;ALLOW storage:fieldset-definitions:read, storage:fieldset-definitions:write;ALLOW storage:filter-segments:read, storage:filter-segments:write, storage:filter-segments:share, storage:filter-segments:delete, storage:filter-segments:admin;ALLOW openpipeline:configurations:read, openpipeline:configurations:write;ALLOW hyperscaler-authentication:aws:authenticate;
Grants permissions to install and delete customs apps. You need to add an additional app-engine:apps:run
permission to run Dynatrace Apps and Launcher. permission is necessary to access AppEngine.
ALLOW app-engine:apps:install, app-engine:apps:delete WHERE shared:app-id startsWith "my";ALLOW hub:catalog:read;ALLOW email:emails:send;
Grants full access to manage EdgeConnect.
ALLOW app-engine:edge-connects:read, app-engine:edge-connects:write, app-engine:edge-connects:delete;ALLOW oauth2:clients:manage where oauth2:scopes="app-engine:edge-connects:connect";
Grants basic access to AppEngine, that is to run Dynatrace Apps and Launcher, gives read access to workflows.
ALLOW app-engine:apps:run, app-engine:functions:run, app-engine:edge-connects:read;ALLOW automation:workflows:read, automation:rules:read, automation:calendars:read;ALLOW hub:catalog:read;ALLOW document:documents:read, document:documents:write, document:documents:delete, document:environment-shares:read, document:environment-shares:write, document:environment-shares:claim, document:environment-shares:delete, document:direct-shares:read, document:direct-shares:write, document:direct-shares:delete, document:trash.documents:read, document:trash.documents:restore, document:trash.documents:delete;ALLOW davis:analyzers:read, davis:analyzers:execute;ALLOW state:app-states:read, state:app-states:write, state:app-states:delete, state:user-app-states:read, state:user-app-states:write, state:user-app-states:delete, state-management:user-app-states:delete, app-settings:objects:read;ALLOW email:emails:send, notification:self-notifications:read, notification:self-notifications:write, notification:notifications:read, notification:notifications:write;ALLOW storage:bucket-definitions:read;ALLOW storage:fieldset-definitions:read;ALLOW storage:filter-segments:read, storage:filter-segments:write, storage:filter-segments:delete;
Grants admin access to workflows.
ALLOW automation:workflows:admin, automation:workflows:read, automation:workflows:write, automation:workflows:run, automation:rules:read, automation:rules:write, automation:calendars:read, automation:calendars:write;
Grants basic read access to workflows.
ALLOW automation:workflows:read, automation:workflows:write, automation:workflows:run, automation:rules:read, automation:rules:write, automation:calendars:read, automation:calendars:write;
Grants permission to send emails from @apps.dynatrace.com
using a public send email API endpoint.
ALLOW email:emails:send;
Permission to access 'Environment Roles Viewer' features (equivalence RBAC permission).
ALLOW environment:roles:viewer;
Permission to access 'Environment Manage Settings' features (equivalence RBAC permission).
ALLOW environment:roles:manage-settings;
Permission to access 'Configure Request Capture Data' features (equivalence RBAC permission). Management zones not supported.
ALLOW environment:roles:configure-request-capture-data;
Permission to access 'Agent Install' features (equivalence RBAC permission). Management zones not supported.
ALLOW environment:roles:agent-install;
Permission to access 'Manage Security Problems' features (equivalence RBAC permission).
ALLOW environment:roles:manage-security-problems;
Permission to access 'Replay Sessions With Masking' features (equivalence RBAC permission).
ALLOW environment:roles:replay-sessions-with-masking;
Permission to access 'Replay Sessions Without Masking' features (equivalence RBAC permission).
ALLOW environment:roles:replay-sessions-without-masking;
Permission to access 'Log Viewer' features (equivalence RBAC permission).
ALLOW environment:roles:logviewer;
Permission to access 'View Security Problems' features (equivalence RBAC permission).
ALLOW environment:roles:view-security-problems;
Permission to access 'View Sensitive Request Data' features (equivalence RBAC permission).
ALLOW environment:roles:view-sensitive-request-data;
Grants access to view, add, activate, update, and delete all the extensions and their monitoring configurations.
ALLOW extensions:definitions:read, extensions:definitions:write, extensions:configurations:read, extensions:configurations:write, extensions:configuration.actions:write;
Grants access to view all the extensions and their monitoring configurations.
ALLOW extensions:definitions:read, extensions:configurations:read;
Grants read access to the Hub catalog content.
ALLOW hub:catalog:read;
Grants permissions to authenticate against hyperscalers.
ALLOW hyperscaler-authentication:aws:authenticate;
Grants permission to write events to the ingest endpoints.
ALLOW storage:events:write;
Grants read access to Dynatrace settings.
ALLOW settings:objects:read, settings:schemas:read;
Grants permission to read and write Dynatrace settings.
ALLOW settings:objects:read, settings:objects:write, settings:schemas:read;
Grants unconditional access to all Grail system tables prefixed with "dt.".
ALLOW storage:buckets:read WHERE storage:table-name STARTSWITH "dt.";ALLOW storage:system:read;
Grants unconditional access to all the Grail tables and default buckets (excluding security events).
ALLOW storage:buckets:read WHERE storage:bucket-name IN ( "default_logs", "default_bizevents", "default_events", "default_metrics", "default_spans", "default_selfmon_events", "default_davis_events", "default_k8s_ops_events", "default_davis_custom_events", "default_davis_k8s_ops_events", "default_application_snapshots" );ALLOW storage:events:read, storage:logs:read, storage:metrics:read, storage:entities:read, storage:smartscape:read, storage:bizevents:read, storage:spans:read, storage:application.snapshots:read;
Grants permission to write metrics to Grail.
ALLOW storage:metrics:write;