# Role Based Access Control (RBAC)

Role Based access control (RBAC) streamlines permissions to various resources within the Nightfall console. There are two key components of RBAC within Nightfall - roles and permissions.&#x20;

A role is a collection of pre-defined permissions that can be assigned to user accounts within Nightfall. Default roles cannot be edited. A role can be assigned to more than one user account whereas an user account can only have one role. Permissions refer to the specific create, read, update, and delete actions you can take on resources such as policies, events, apps, etc within Nightfall.&#x20;

## Accessing the Users and Roles Page

To access the Users and Roles page:

1. Click **Settings** from the left menu.

<figure><img src="/files/u5OhE5H8YevDwLlZ4qLO" alt="" width="563"><figcaption></figcaption></figure>

2. Click the **Users & roles** tab.

<figure><img src="/files/SBITMQlR5QfgbNoF5M4D" alt="" width="563"><figcaption></figcaption></figure>

You can view the list of Users and the roles assigned to each user.&#x20;

<figure><img src="/files/oJpVzmtGihcTOqFCgE4b" alt=""><figcaption></figcaption></figure>

Click the **Roles** tab to access the Roles page.

<figure><img src="/files/1QIrW2CnOBZSAJmdrGbk" alt=""><figcaption></figcaption></figure>

The Roles page displays the Role name, Permissions assigned to a role and the number of users to whom the role is assigned, as shown in the following image.

<figure><img src="/files/yzClItDHA6VFC6sBuQUg" alt=""><figcaption></figcaption></figure>

You can click the **View permission details** button to expand the complete list of permissions associated with a Role.

<figure><img src="/files/8pOKBkElS9ro9ccNLRBO" alt=""><figcaption></figcaption></figure>

{% hint style="warning" %}
Currently, you can assign only a maximum of one role to a user. Also, you cannot create custom Roles and must use the out of the box Roles provided by Nightfall.
{% endhint %}

## Roles and Permissions

Nightfall provides you with five Roles. Each of the five Roles is associated with multiple permissions. The following table lists each role and the permissions associated with the Role.&#x20;

| Role                        | Permissions                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   |
| --------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| Security Analyst            | <ol><li><a href="/pages/8W9ipkz3Oz5Qovn4fu4t#exfiltration-posture-management-events">Exfiltration Events</a> </li><li><a href="/pages/8W9ipkz3Oz5Qovn4fu4t#preview-the-dlp-violations-content">Content Preview</a></li><li><a href="/pages/8W9ipkz3Oz5Qovn4fu4t#view-dashboard-and-create-reports">Dashboard</a></li><li><a href="/pages/8W9ipkz3Oz5Qovn4fu4t#view-detectors">Detectors</a></li><li><a href="/pages/8W9ipkz3Oz5Qovn4fu4t#take-actions-on-dlp-violations">DLP Violations</a></li><li><a href="/pages/8W9ipkz3Oz5Qovn4fu4t#view-dashboard-and-create-reports">Reporting</a></li><li>Encryption Events</li></ol>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 |
| Policy Manager              | <ol><li><a href="/pages/uRkXSXyukqIkAl3cNEvs#integrations">App Alert Management</a></li><li><a href="/pages/uRkXSXyukqIkAl3cNEvs#detectors">Detectors</a></li><li><a href="/pages/uRkXSXyukqIkAl3cNEvs#policies">DLP Policies</a></li><li><a href="/pages/uRkXSXyukqIkAl3cNEvs#detection-rules">Detection Rules</a></li><li><a href="/pages/uRkXSXyukqIkAl3cNEvs#integrations">App Management</a></li><li><a href="/pages/uRkXSXyukqIkAl3cNEvs#policies">Exfiltration/Posture Policies</a></li><li>Encryption Polices</li></ol>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                               |
| Security Events Manager     | <ol><li><a href="/pages/ttqW4mrIsKilJYZ1BOPW#exfiltration-posture-management-and-encryption-events">Exfiltration Events</a></li><li><a href="/pages/ttqW4mrIsKilJYZ1BOPW#preview-the-dlp-violations-content">Content Preview</a></li><li><a href="/pages/ttqW4mrIsKilJYZ1BOPW#view-dashboard-and-create-reports">Dashboard</a></li><li><a href="/pages/ttqW4mrIsKilJYZ1BOPW#view-detectors">Detectors</a></li><li><a href="/pages/ttqW4mrIsKilJYZ1BOPW#take-actions-on-dlp-violations">DLP Violations</a></li><li><a href="/pages/ttqW4mrIsKilJYZ1BOPW#view-dashboard-and-create-reports">Reporting</a></li><li>Encryption Events</li></ol>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   |
| Security Operations Manager | <ol><li><a href="/pages/WSLuyB90MhyOikKYnx5y#exfiltration-posture-management-and-encryption-events">Exfiltration Events</a></li><li><a href="/pages/WSLuyB90MhyOikKYnx5y#preview-the-dlp-violations-content">Content Preview</a></li><li><a href="/pages/WSLuyB90MhyOikKYnx5y#detection-rules">Detection Rules</a></li><li><a href="/pages/WSLuyB90MhyOikKYnx5y#view-dashboard-and-create-reports">Dashboard</a></li><li><a href="/pages/WSLuyB90MhyOikKYnx5y#exfiltration-posture-management-and-encryption-events">Encryption events</a></li><li><a href="/pages/WSLuyB90MhyOikKYnx5y#detectors">Detectors</a></li><li><a href="/pages/WSLuyB90MhyOikKYnx5y#policies">DLP Policies</a></li><li><a href="/pages/WSLuyB90MhyOikKYnx5y#take-actions-on-dlp-violations">DLP Violations</a></li><li><a href="/pages/WSLuyB90MhyOikKYnx5y#app-management-and-app-alert-management">App Alert Management</a></li><li><a href="/pages/WSLuyB90MhyOikKYnx5y#view-dashboard-and-create-reports">Reporting</a></li><li>Encryption policies</li><li><a href="/pages/WSLuyB90MhyOikKYnx5y#app-management-and-app-alert-management">App Management</a></li><li><a href="/pages/WSLuyB90MhyOikKYnx5y#policies">Exfiltration/Posture Policies</a></li></ol>                                                                                                                                                                                                                                                                                                                                                                                                 |
| System Administrator        | <ol><li><a href="/pages/bHpMs0NsZIjlBUQx8aZI#billing">Billing</a></li><li><a href="/pages/WSLuyB90MhyOikKYnx5y#exfiltration-posture-management-and-encryption-events">Exfiltration Events</a></li><li><a href="/pages/WSLuyB90MhyOikKYnx5y#preview-the-dlp-violations-content">Content Preview</a></li><li><a href="/pages/WSLuyB90MhyOikKYnx5y#detection-rules">Detection Rules</a></li><li><a href="/pages/bHpMs0NsZIjlBUQx8aZI#user-management">User Management</a></li><li><a href="/pages/WSLuyB90MhyOikKYnx5y#view-dashboard-and-create-reports">Dashboard</a></li><li><a href="/pages/WSLuyB90MhyOikKYnx5y#exfiltration-posture-management-and-encryption-events">Encryption events</a></li><li><a href="/pages/WSLuyB90MhyOikKYnx5y#detectors">Detectors</a></li><li><a href="/pages/WSLuyB90MhyOikKYnx5y#policies">DLP Policies</a></li><li><a href="/pages/bHpMs0NsZIjlBUQx8aZI#alert-management">Alert Service</a></li><li><a href="/pages/WSLuyB90MhyOikKYnx5y#take-actions-on-dlp-violations">DLP Violations</a></li><li><a href="/pages/WSLuyB90MhyOikKYnx5y#app-management-and-app-alert-management">App Alert Management</a></li><li><a href="/pages/bHpMs0NsZIjlBUQx8aZI#directory-sync">Directory Sync</a></li><li><a href="/pages/WSLuyB90MhyOikKYnx5y#view-dashboard-and-create-reports">Reporting</a></li><li>Encryption Policies</li><li><a href="/pages/WSLuyB90MhyOikKYnx5y#app-management-and-app-alert-management">App Management</a></li><li><a href="/pages/WSLuyB90MhyOikKYnx5y#policies">Exfiltration/Posture Policies</a></li><li><a href="/pages/bHpMs0NsZIjlBUQx8aZI#firewall-for-ai">API Keys</a></li></ol> |

You can learn more about each of the role from the following links.

[Security Analyst Role](/nightfall_settings/role_based_access_control/security_analyst.md)

[Policy Manager Role](/nightfall_settings/role_based_access_control/policy_manager.md)

[Security Events Manager Role](/nightfall_settings/role_based_access_control/security_events_manager.md)

[Security Operations Manager Role](/nightfall_settings/role_based_access_control/security_operations_manager.md)

[System Administrator Role](/nightfall_settings/role_based_access_control/system_administrator.md)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://help.nightfall.ai/nightfall_settings/role_based_access_control.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
