Skip to main content

Permissions

ThetaSecure ships with 173 system-defined permissions that cover every action across every module in the platform. These permissions are the building blocks of the role-based access control system. They cannot be modified or deleted because they represent the complete surface area of what is possible inside ThetaSecure.

This matters because zero trust is not just about network segmentation or device posture. It extends to administrative access itself. In a zero-trust environment, no administrator should have more access than their responsibilities require. ThetaSecure makes this achievable by providing permissions at an exceptionally granular level, so you can build roles that map precisely to each person's job function on a strict need-to-know basis.

Consider a practical example: your helpdesk team needs to reset passwords but should never touch authentication policies. A compliance officer needs to read every audit log category but should never modify user accounts. A network operations engineer needs to manage VPN configuration and RADIUS clients but has no business viewing identity audit trails. With 173 discrete permissions, each of these scenarios can be addressed with a custom role that grants exactly the right access and nothing more.

Permissions Overview

How Permissions Work

Every permission in ThetaSecure has three attributes:

AttributeDescription
Permission NameHuman-readable label describing the capability (e.g., "Read Gateway Apps")
ResourceThe module or data type the permission applies to (e.g., gateway_apps, users, audit)
ActionThe operation being granted (e.g., read, create, delete, manage, admin)

The internal identifier follows a resource:action pattern. For instance, users:create grants the ability to create new user accounts, while users:read only allows viewing existing users. This naming convention makes it straightforward to understand what any permission does, even without reading its description.

Permissions are not assigned to users directly. Instead, they are bundled into Roles, and roles are assigned to users or groups. This approach keeps access management scalable and auditable.

Permission Actions

ThetaSecure organizes permissions around seven action types, each representing a different level of access:

ActionPurposeExample
readView-only access to a resourceusers:read allows reading user profiles
listEnumerate resources (browse, search)devices:list allows listing registered devices
createProvision new resourcesgroups:create allows creating new groups
updateModify existing resourcesmfa_policies:update allows editing MFA policies
deleteRemove resources permanentlyroles:delete allows deleting custom roles
manageFull lifecycle control over a resourcedevices:manage allows approve, reject, block, and quarantine
adminElevated administrative controllicense:admin includes lockdown management

Some resources have additional specialized actions like assign (for policies and roles), sync (for directory connectors), evaluate (for policy testing), terminate (for active sessions), and revoke (for devices and signed URLs).

Create and Assign Permissions

Complete Permissions Catalog

Below is the full list of all 173 permissions available in ThetaSecure, organized by action type.

Approve and Assign

PermissionResourceDescription
Approve DevicesdevicesApprove pending device registrations
Assign PoliciespoliciesAssign policies to users/groups
Assign RolesrolesAssign roles to users/groups

Change

PermissionResourceDescription
Change Own PasswordprofileChange own password

Create

PermissionResourceDescription
Create Gateway App Policiesgateway_app_policiesCreate gateway app policies
Create Gateway Appsgateway_appsCreate gateway applications
Create GroupsgroupsCreate new groups
Create MFA Policiesmfa_policiesCreate MFA policies
Create Network App Policiesnetwork_app_policiesCreate network app policies
Create Network Appsnetwork_appsCreate network applications
Create Notification ProvidersnotificationsCreate notification providers
Create Notification TemplatesnotificationsCreate notification templates
Create OAuth ClientsclientsCreate OAuth2 clients
Create OAuth ScopesscopesCreate custom OAuth2 scopes
Create PermissionspermissionsCreate new permissions
Create PoliciespoliciesCreate authentication policies
Create RADIUS NAS ClientsradiusCreate RADIUS NAS clients
Create RADIUS PoliciesradiusCreate RADIUS policies
Create RolesrolesCreate new roles
Create Signed URLsstorageCreate signed URLs for file sharing
Create Signin ProfilesprofilesCreate signin profiles
Create Storage BackendsstorageCreate storage backends
Create Sync Profilessync-profilesCreate AD/LDAP sync profiles
Create UsersusersCreate new users
Create VPNvpnCreate VPN profiles, allocate IPs, register servers
Create Web App Policiesweb_app_policiesCreate web app policies
Create Web Appsweb_appsCreate web applications

Delete

PermissionResourceDescription
Delete ConnectorsconnectorsDelete connectors
Delete DevicesdevicesDelete/remove devices
Delete FilesstorageDelete files from storage
Delete Gateway App Policiesgateway_app_policiesDelete gateway app policies
Delete Gateway Appsgateway_appsDelete gateway applications
Delete GroupsgroupsDelete groups
Delete MFA Policiesmfa_policiesDelete MFA policies
Delete Network App Policiesnetwork_app_policiesDelete network app policies
Delete Network Appsnetwork_appsDelete network applications
Delete Notification ProvidersnotificationsDelete notification providers
Delete Notification TemplatesnotificationsDelete notification templates
Delete OAuth ClientsclientsDelete OAuth2 clients
Delete OAuth ScopesscopesDelete custom OAuth2 scopes
Delete PermissionspermissionsDelete permissions
Delete PoliciespoliciesDelete authentication policies
Delete RADIUS NAS ClientsradiusDelete RADIUS NAS clients
Delete RADIUS PoliciesradiusDelete RADIUS policies
Delete RolesrolesDelete roles
Delete Signin ProfilesprofilesDelete signin profiles
Delete Storage BackendsstorageDelete storage backends
Delete Sync Profilessync-profilesDelete sync profiles
Delete UsersusersDelete users
Delete VPNvpnDelete VPN profiles, release IPs, delete servers
Delete Web App Policiesweb_app_policiesDelete web app policies
Delete Web Appsweb_appsDelete web applications

Disconnect and Evaluate

PermissionResourceDescription
Disconnect RADIUS SessionsradiusDisconnect active RADIUS sessions
Evaluate PoliciespoliciesEvaluate/test authentication policies

License

PermissionResourceDescription
License AdminlicenseFull license administration including lockdown management

List

PermissionResourceDescription
List ConnectorsconnectorsList all sync connectors
List DevicesdevicesList all registered devices
List FilesstorageList files in storage
List Gateway Recordingsgateway_recordingsList gateway session recordings
List Gateway Sessionsgateway_sessionsList active gateway sessions
List GroupsgroupsList all groups
List Notification ProvidersnotificationsList notification providers
List Notification TemplatesnotificationsList notification templates
List PermissionspermissionsList all permissions
List RolesrolesList all roles
List Signed URLsstorageList signed URLs
List Storage BackendsstorageList storage backends
List Sync Profilessync-profilesList all sync profiles
List UsersusersList all users

Manage

PermissionResourceDescription
Manage Agent ReleasesreleasesEnable/disable releases and trigger sync
Manage DevicesdevicesApprove, reject, block, and quarantine devices
Manage FilesstorageFull permission to manage files in storage
Manage Gateway App Policiesgateway_app_policiesFull permission to manage gateway app policies
Manage Gateway Appsgateway_appsFull permission to manage gateway/remote server applications
Manage Group MembersgroupsAdd/remove users from groups
Manage Network App Policiesnetwork_app_policiesFull permission to manage network app policies
Manage Network Appsnetwork_appsFull permission to manage network applications
Manage Own ProfileprofileManage own profile including MFA enrollment
Manage RADIUS NAS ClientsradiusFull management of RADIUS NAS clients
Manage RADIUS PoliciesradiusFull management of RADIUS policies
Manage RolesrolesFull management of roles
Manage Web App Policiesweb_app_policiesFull permission to manage web app policies
Manage Web Appsweb_appsFull permission to manage web applications

Read

PermissionResourceDescription
Read Access AuditsauditRead access audit events
Read Auth AuditsauditRead authentication audit events
Read Gateway Appsgateway_appsRead gateway application information
Read Gateway Recordingsgateway_recordingsView/playback gateway session recordings
Read Gateway Sessionsgateway_sessionsRead gateway session details
Read GroupsgroupsRead group information
Read Identity AuditsauditRead identity audit events (users, groups, roles)
Read LicenselicenseView license information and usage metrics
Read MFA Policiesmfa_policiesRead MFA policies
Read Network App Policiesnetwork_app_policiesRead network app policy information
Read Network Appsnetwork_appsRead network application information
Read Notification AuditsauditRead notification audit events (email, SMS)
Read Notification ProvidersnotificationsRead notification provider details
Read Notification TemplatesnotificationsRead notification template details
Read OAuth ClientsclientsRead OAuth2 client information
Read OAuth ScopesscopesRead OAuth2 scopes
Read Own ProfileprofileRead own profile
Read PermissionspermissionsRead permission information
Read PoliciespoliciesRead authentication policies
Read RADIUS EventsradiusRead RADIUS events
Read RADIUS LogsradiusRead RADIUS logs
Read RADIUS NAS ClientsradiusRead RADIUS NAS client information
Read RADIUS PoliciesradiusRead RADIUS policies
Read RADIUS SessionsradiusRead RADIUS sessions
Read RADIUS StatsradiusRead RADIUS statistics
Read RolesrolesRead role information
Read Signin ProfilesprofilesRead signin profiles
Read Storage BackendsstorageRead storage backend details
Read Sync Profilessync-profilesRead sync profile information
Read System AuditsauditRead system audit events (jobs, cleanup)
Read UsersusersRead user information
Read VPNvpnRead VPN profiles, servers, allocations
Read VPN Flow LogsauditRead VPN flow logs and statistics
Read Web App Policiesweb_app_policiesRead web app policy information
Read Web Appsweb_appsRead web application information

Reset and Revoke

PermissionResourceDescription
Reset User PasswordusersReset user passwords (admin only)
Revoke DevicesdevicesRevoke device access
Revoke Signed URLsstorageRevoke signed URLs

System and Administrative

System and Update Permissions

PermissionResourceDescription
Storage AdminstorageFull storage administration access
System AdminsystemFull system administration access
System AuditsystemAccess to audit logs and events
System ConfigsystemManage system configuration
Terminate Gateway Sessionsgateway_sessionsTerminate active gateway sessions
Test Storage BackendsstorageTest storage backend connections
Trigger SyncconnectorsTrigger on-demand directory sync

Update

PermissionResourceDescription
Update DevicesdevicesUpdate device information
Update Gateway App Policiesgateway_app_policiesUpdate gateway app policies
Update Gateway Appsgateway_appsUpdate gateway applications
Update GroupsgroupsUpdate group information
Update MFA Policiesmfa_policiesUpdate MFA policies
Update Network App Policiesnetwork_app_policiesUpdate network app policies
Update Network Appsnetwork_appsUpdate network applications
Update Notification ProvidersnotificationsUpdate notification providers
Update Notification TemplatesnotificationsUpdate notification templates
Update OAuth ClientsclientsUpdate OAuth2 clients
Update OAuth ScopesscopesUpdate OAuth2 scopes
Update PermissionspermissionsUpdate permissions
Update PoliciespoliciesUpdate authentication policies
Update RADIUS NAS ClientsradiusUpdate RADIUS NAS clients
Update RADIUS PoliciesradiusUpdate RADIUS policies
Update RolesrolesUpdate roles
Update Signin ProfilesprofilesUpdate signin profiles
Update Storage BackendsstorageUpdate storage backends
Update Sync Profilessync-profilesUpdate sync profiles
Update UsersusersUpdate user information
Update VPNvpnUpdate VPN profiles, servers, allocations
Update Web App Policiesweb_app_policiesUpdate web app policies
Update Web Appsweb_appsUpdate web applications

View

PermissionResourceDescription
View DashboarddashboardView the dashboard
View Health StatushealthView system health status

Zero Trust in Practice

The breadth of this permissions catalog is intentional. In a zero-trust architecture, administrative access is treated with the same rigor as user access. Every administrator should be verified, every action should be authorized, and every session should be scoped to the minimum necessary privilege.

ThetaSecure enables this by ensuring that no two administrators need to share the same role. A SOC analyst monitoring threat activity receives read-only audit permissions. A directory administrator managing sync profiles receives connector and sync permissions only. A VPN operations engineer receives VPN and RADIUS permissions without touching identity or authentication configuration.

This separation ensures that even if an administrative account is compromised, the blast radius is contained to only the permissions assigned to that specific role. Combined with MFA enforcement and comprehensive audit logging, ThetaSecure's permission model provides defense in depth at the administrative layer.

Best Practices

Treat permissions as building blocks. Do not think of permissions in isolation. Think of them as LEGO pieces for constructing purpose-built roles. Start by listing the tasks a person needs to perform, then select only the permissions those tasks require.

Separate read from write access. Give read-level access broadly for visibility, but restrict create, update, and delete permissions to the people who actually perform those operations. This simple rule eliminates most accidental configuration changes.

Use the search bar. With 173 permissions, scrolling through the full list is impractical. When building a role in the Manage Permissions panel, search by keyword like "vpn", "audit", or "radius" to quickly find relevant permissions.

Review the Roles page regularly. Permissions themselves are static. The real risk is in how they are assembled into roles and who receives those roles. Audit your role assignments periodically to ensure they still match your team's actual responsibilities.