Skip to main content
Version: 0.0.2 (latest)

Roles Reference

Every Identity in MASS has a role that controls what actions it can perform across the system. A role is assigned when the identity is created and can be updated at any time.

Built-in Roles

RoleDescription
super_adminFull system access, including identity and role management. Use only for break-glass scenarios.
storage_adminCreate and manage VolumeGroups, Volumes, and cluster-wide storage settings.
operatorOperational tasks: monitor nodes, view hardware status, manage node lifecycle.
volume_managerCreate and manage Volumes and VolumeGroups, but cannot change cluster settings.
identity_managerCreate and manage Identities and AccessPolicies.
auditorRead-only access to audit logs and system status. No configuration changes.
viewerRead-only access to all resources.
usergroup_adminManage group membership only.
memberDefault role. No system privileges — data access is granted exclusively through AccessPolicies.

Recommendations for Initial Setup

When setting up the cluster for the first time, consider creating the following accounts:

Account purposeRecommended role
Day-to-day storage administrationstorage_admin
User and access managementidentity_manager
Monitoring and reportingauditor or viewer
Regular users who mount volumesmember (access via AccessPolicy)

Avoid using super_admin for routine operations. Reserve it for emergency access when other administrator accounts are unavailable.

Custom Roles

In addition to the built-in roles, you can create custom roles tailored to your organization's needs. Navigate to Access → Roles → + Add Role to define a role with a specific set of permissions.

Custom roles allow you to apply the principle of least privilege — granting each identity only the access it requires, without relying on a built-in role that may be broader than needed.