Home / Edge/Access Management

Access Management

Cribl Edge provides a range of access-management features for users with different security requirements. Access management serves these common enterprise goals:

  • Security: Limit the blast radius of inadvertent or intentional errors, by restricting each user’s actions to their needed scope within the application.
  • Accountability: Ensure compliance, by restricting read and write access to sensitive data.
  • Operational efficiency: Match enterprise workflows, by delegating access over subsets of objects/resources to appropriate users and teams.

Where Can I Find Access Control Details?

See the following topics, according to your needs:

  • Authentication: Authenticating users via local basic auth or external options (SSO, Splunk, LDAP).
  • Members: Cribl Suite users given controlled access to the product.
  • Teams: Groups of Members who share the same Permissions.
  • Permissions: Fine-grained access control configurable at separate levels (Organization, Workspace, product, Fleet, and lower-level resources like Cribl Stream Projects and Cribl Search Datasets).
  • Local Users: Cribl Edge’s original Role-based model for creating users, and for managing their access across a Cribl deployment.
  • Roles: Cribl Edge’s original RBAC model for managing Roles and Policies, and for assigning them to users.

Which Access Method Should I Use?

Cribl supports both the Members/Permissions and the legacy Users/Roles models, and these models are cross-compatible for many use cases. However, certain purposes require you to choose a specific model:

  • Cribl.Cloud relies only on Members/Permissions. See Cribl.Cloud Organization-level Permissions starting at Inviting Members, and product- and lower-level Permissions starting at Product‑Level Permissions.

    Cribl.Cloud’s Organization-level Permissions include an Owner superuser. This option has no exact counterpart at the on-prem (customer-managed) Organization level, but you can manage overall access to an on-prem deployment by using Workspace-level Permissions.

  • Stream Projects and Subscriptions rely only on Members/Permissions. See Project‑Level Permissions.

  • GitOps integration authorization requires the legacy gitops Role. This legacy Role has no counterpart Permission.

  • Collectors: The collect_all Role specifically enables creating, configuring, and running Collection jobs on all Stream Worker Groups. This legacy Role has no counterpart Permission.

  • Notifications: The notification_admin Role specifically enables creating and receiving all Notifications. This legacy Role has no counterpart Permission.

  • Search granular resources (Datasets, Dataset Providers, and search results) can be shared via Members/Permissions. For details, see the Cribl Search Sharing page.