Overview
Custom roles and RBAC give you the ability to fine-tune access to the Devin application. Enterprise administrators can create custom roles with specific permissions and assign them to users or IdP groups, providing granular control over what actions users can perform within your Devin Enterprise deployment.Custom roles and RBAC are currently in limited access and only released to specific enterprises. Please contact Cognition support if you want custom roles unlocked for your enterprise.
Organization-Level Roles
Organization-level roles are assigned on an organization-by-organization basis and do not apply outside of the assigned organization. These roles control access to resources and actions within a specific organization. Organization-level roles can be configured with the following permissions:Permission | Description |
---|---|
Use DeepWiki | Access to DeepWiki functionality |
Use Ask Devin | Access to Ask Devin feature |
Use Devin Sessions | Access to create and use Devin sessions |
Manage Membership | Add/remove users and groups. Assign or unassign permission roles |
Manage Settings | Manage settings at the organization level |
Manage Playbooks | Create/edit/delete organization playbooks |
Manage Secrets | Create/edit/delete organization secrets |
Manage Knowledge | Create/edit/delete organization knowledge |
Manage Snapshots and Repository Indexing | Create/edit/delete machine snapshots and repository indexing |
Manage API Keys | Create/delete/use API keys |
Manage MCP Servers | Create/edit/delete MCP servers |
View Metrics | View organization metrics |
View Consumption | View organization consumption |
- Admin: Full administrative access within the organization
- Member: Standard user access with core functionality
- DeepWiki Only: Limited access restricted to DeepWiki and AskDevin functionality
Account-Level Roles (Enterprise Roles)
Account-level roles (also known as enterprise-level roles) are assigned across the entire enterprise and apply to every organization within the enterprise. Users with account-level roles automatically inherit corresponding organization-level permissions in all organizations that they are a member of. Account-level roles can be configured with the following permissions:Permission | Description |
---|---|
Manage Organizations | View/create/edit/delete enterprise organizations |
Manage Account Membership | View/create/edit/delete enterprise + organization membership |
Manage Enterprise Settings | View/edit settings at the enterprise + organization levels |
Manage Git Integrations | Create/edit/delete Git integrations (Github, Gitlab, ADO, Bitbucket). Manage repo permissions and repo indexing |
Manage Chat Integrations | Create/edit/delete chat integrations like Microsoft Teams or Slack |
Manage Ticket Integrations | Create/edit/delete ticketing integrations like Jira or Linear |
Use Account Tools | Use Devin sessions, Ask Devin, and DeepWiki across any org |
Manage Account Resources | Create/edit/delete playbooks, secrets, and knowledge across any org |
Manage Account Snapshots | Create/edit/delete machine snapshots in any org. Manage account level snapshots + index repos |
View Enterprise Infra Details | View enterprise infrastructure details |
Manage Account API Keys | Create/edit/delete/use API keys in the enterprise and any org |
Manage Account MCP Servers | Create/edit/delete MCP servers across any org |
View Account Metrics | View enterprise metrics |
Manage Billing | View/edit consumption for the enterprise |
- Admin: Full administrative access across the entire enterprise
- Member: Standard user access across all organizations in the enterprise
IdP Group Integration
Admins can assign custom roles to Identity Provider (IdP) groups. When you assign a role to an IdP group, every member of that group (as defined by your identity provider) will automatically be assigned that role.- Group Information Flow: During authentication, Devin Enterprise receives group information from your IdP
- Automatic Role Assignment: Users inherit permissions based on their IdP group membership
- Dynamic Updates: Group membership changes are reflected upon user reauthentication
IdP groups must be explicitly enabled for your Enterprise and are only supported for some enterprise SSO connections. Contact your administrator to enable group support.
Creating and Assigning Custom Roles
Enterprise admins or users with the Manage Account Membership permission are the only users who can configure custom roles. Navigate to your enterprise settings and select the “Roles” tab to manage both organization-level and account-level roles. To create a custom role:- Navigate to Enterprise Settings > Roles
- Click “Create a custom role” for either Organization or Enterprise level
- Provide a descriptive role name
- Select the specific permissions you want to grant
- Save the role
- Enterprise admins or users with the Manage Account Membership permission can navigate to the “Enterprise members” page in Enterprise settings and assign account-level roles
- Please note that this is the same set of users who are able to create, edit, and delete custom roles
- Organization admins or users with the Manage Organization Membership permission can navigate to the “Organization members” page and assign organization-level roles
- Please note that these users are able to assign custom roles on the organization level, but they may not be able to create, edit, or delete custom roles
We currently do not support multiple roles per user, but this feature is on our roadmap and we plan to support it soon. Each user can currently be assigned only one role per organization and one account-level role.
Best Practices
- Principle of Least Privilege: Grant users only the minimum permissions necessary for their role
- Use IdP Groups: Leverage IdP group integration for easier management of role assignments at scale
- Regular Audits: Periodically review role assignments and permissions to ensure they remain appropriate
- Descriptive Naming: Use clear, descriptive names for custom roles to make their purpose obvious
- Documentation: Maintain internal documentation of your custom roles and their intended use cases
Common Issues
If a user is not receiving the expected permission,- Verify the user is assigned to the correct role for that specific organization
- Ensure the role has the necessary permissions configured
- Check if IdP group membership is current (may require reauthentication)