Skip to content

Lightrun persona-based role management overview

Starting with version 1.70.2, Lightrun replaces its previous role system with a persona-based role mechanism, providing finer-grained control over resources and user actions, improving security, and operational clarity.

This approach aligns permissions with common organizational personas—such as Developers, Company Admin, and Security—allowing administrators to:

  • Delegate tasks precisely.
  • Enforce least-privilege access.
  • Reflect real job functions across both the plugin and Management Portal.

Each role is composed of one or more categories, and each category contains predefined permissions at specific access levels. Assigning a role grants all associated permissions, giving precise control over the actions a user can perform. Roles are predefined to reflect common organizational personas.

Lightrun supports role assignment in both RBAC (Role-Based Access Control) and non-RBAC environments:

  • Non-RBAC environments: Offer only two basic roles: Developer and Company Admin.
  • RBAC environments: Provide a broader, predefined set of roles for finer-grained access control.

    Example: The Company Admin role includes full management permissions at the company level, such as user administration, webhook creation, and authentication.

Migrating to persona-based roles

To maintain compatibility with legacy roles, upgrading from versions prior to 1.70.2 or higher automatically converts existing roles to their persona-based equivalents:

  • Users with the legacy default_user role → Developer role
  • Users with the legacy ROLE_MANAGER role → Company Admin role
  • Existing Group adminsGroup Admin role (retain Environment-level administrative permissions)

Key benefits

Better alignment with job functions

Example: Developers can log in to the plugin and the Management Portal, while Company Admins perform management tasks such as configuring features, managing users, and maintaining Lightrun entities (e.g., agent pools, tags, and custom sources).

Finer control over what each user can see and do

Example: Developers have Read (R) permissions to view PII redaction patterns, whereas Company Admins can create and manage those patterns.

More precise and flexible permission management

Example: Group Admins (RBAC only) can manage access within their assigned Environment without affecting organization-wide settings, while Company Admins retain full control at the company level.

Reduced risk of granting unnecessary access

Example: Company Viewers (RBAC-only) can access dashboards and logs for monitoring purposes without the ability to modify system configurations, keeping sensitive actions restricted.

Persona-based roles terminology

Understanding the following terms is important for working with Lightrun’s persona-based role system.

Company

The top-level organizational unit in Lightrun. All users and configurations belong to a company.

Role

Roles are preset and predefined in Lightrun. A user can have multiple roles, and all permissions from those roles apply. If roles overlap, the highest permission level takes precedence.

Example: A user assigned both the Developer and Company Admin roles inherits permissions from both, but the broader Company Admin permissions override where conflicts exist.

Category

A collection of related operations with permissions. Roles include one or more categories that define the actions a user can perform.

Permissions

Predefined access levels that control what a user can do within a category. Permissions cannot be modified or removed.

  • Read (R): View information without making changes.
  • Write & Read (WR): View and modify information.

Understanding persona-based roles

Each role is composed of one or more categories, and each category contains permissions at specific access levels. Assigning a role to a user grants all associated permissions, ensuring precise control over user actions.

Understanding role

Roles are preset and designed to reflect common organizational personas such as Developer, Company Admin, Security, and Group Admins.

Example: The Company Admin role includes full management permissions at the company level, such as user administration, webhook creation, and authentication.

Built-in roles and categories

Lightrun roles are predefined and aligned with common organizational personas. The table below provides a high-level overview of all roles and their scope.

Built-in roles

Role Role capabilities Environment
Developer Access runtime diagnostics and observability. Non-RBAC & RBAC
Company Admin Full administrative control at the company level. Non-RBAC & RBAC
Company Viewer Read-only access to company-wide settings. RBAC only
Group Admin Manage user groups and related resources. RBAC only
Security Manage Security configurations and audit controls. RBAC only
AppSec Manage application Security features. RBAC only
Incident Responder Resolve cases, configure debugging runbooks, and review case results. RBAC only

Predefined role categories

Each role is composed of one or more categories that define the functional areas in which users can operate. Understanding these categories clarifies what permissions a role grants.

Category Description Audience
Company config Company-level settings and user management Company Admin
Security Controls for protecting data, audit events, PII redaction, blocklists IT Specialists
Environment Runtime spaces such as agent pools, dashboards, debugger configurations Company Admin
AppSec Application Security monitoring, Runtime Reachability AppSec / Company Admin / Company Viewer
Debugging Runbooks Tools for tracking, managing, and resolving cases, uploading configs, viewing case results Company Admins and developers

Roles cheat sheet

The following matrix provides a detailed mapping of how each predefined role corresponds to categories and the specific permissions included within those categories. This mapping clarifies the access granted to users based on their assigned role.

Use this summary matrix for quick reference.

Persona-based roled cheat sheet

Get started

Start creating users with assigned roles:


Last update: October 22, 2025