- Getting started
- Data security and compliance
- Organizations
- Authentication and security
- Licensing
- Tenants and services
- Accounts and roles
- External applications
- AI Trust Layer
- Notifications
- Logging
- Troubleshooting

Automation Cloud Public Sector admin guide
Roles
Roles are a collection of permissions and represent a more granular layer for managing user access, following the broader option of maintaining access through groups. You can add roles to either groups so that all member accounts inherit them, or to individual accounts.
Roles can include several permissions at either the organization level, or at the service level, so there are:
- organization-level roles: these roles control the permissions that accounts have on organization-wide options. They are available in the Automation CloudTM Public Sector portal by default and you cannot change them, nor can you add new ones.
- service-level roles: these roles control the access rights and actions that accounts can perform in each UiPath® service you own. They are managed from within each service and can include default roles which you cannot change, as well as custom roles that you create and manage in the service.
Accounts and groups typically have an organization-level role and one or more service-level roles.
In the following table you can view the roles that are assigned to accounts when they are added to a group. For example, adding an account to the Administrators default group grants them the Organization Administrator role for the organization and the Administrator role within your services. This user can manage both organization-level roles from Admin, then select Accounts and Groups, as well as service-level roles.
Group membership |
Organization-level role |
Service-level roles for Orchestrator |
---|---|---|
Administrators |
Organization Administrator | |
Automation Users |
User |
Automation User at folder level 1 Allow to be Automation User at tenant level |
Automation Developers |
User |
Automation User at folder level 1 Folder Administrator at folder level 1 Allow to be Automation User at tenant level Allow to be Folder Administrator at tenant level |
Everyone |
User |
No roles. |
Automation Express |
User |
Allow to be Automation User at tenant level |
[Custom group] |
User |
No roles by default, but you can add roles to the group as needed. |
1 The roles are assigned to the Shared modern folder, if it exists.
The organization level represents the highest level of scope.
At organization level, the Organization Administrator, User, and Insights Dashboard Viewer roles are available. You cannot change these roles or add new roles at the organization level.
Organization administrators have permission to modify organization-level settings, such as security, Single Sign-On (SSO), and licensing settings. Therefore, the number of organization-level roles is limited. Additionally, organization administrators can grant organization-level permissions, as well as cascade down to tenant-, service-, and folder-level permissions.
Organization-level roles also include organization-level service permissions for services such as Apps and AutomationOps.
This role grants access to every organization- and service-level feature within the organization. An account with this role can perform all administrative actions for the organization, such as creating or updating tenants, managing accounts, viewing organization audit logs, and so on. There can be multiple accounts with this role.
The organization administrator and the Tenant Admin roles are the only roles that allow access to the Admin section.
The first organization administrator for any given organization is appointed when the organization is created.
To grant this role to others, the organization administrator can add user accounts to the Administrators group, which is one of the default groups.
The organization administrator role includes the following organization-level permissions, which cannot be changed, as described in the following table:
Areas subject to permissions | View | Edit | Create | Delete |
---|---|---|---|---|
Usage charts and graphs |
|
|
|
|
Tenants |
|
|
|
|
Accounts and groups |
|
|
|
|
Security settings |
|
|
|
|
External applications |
|
|
|
|
Licenses |
|
|
|
|
API keys |
|
|
|
|
Resource center (Help) |
|
|
|
|
Audit logs |
|
|
|
|
Organization settings |
|
|
|
|
This is the basic level of access within the UiPath ecosystem. Local user accounts automatically become members of the Everyone group, which grants them the User role.
This role is granted to all accounts that are in the default groups Everyone, Automation Users, or Automation Developers.
This role provides read-only access to pages, such as the Home page, Resource Center (if available).
The users can view and access the provisioned services for their current tenant. However, the content they can view and the actions they can perform within each service depends on the service-level roles assigned to their account.
To grant access to everyone to a specific service, the users need to have the Everyone group mapped at service level. For example, if you want to grant all users access to view ideas in Automation Hub, you can assign the Everyone group to a role in Automation Hub.
The available services that currently incorporate this mapping into roles and grant minimal rights within them are:
- Studio Web
- Apps
- Test Cloud
Tenant-level roles control the access rights of accounts within the tenant settings and configuration area. They also define the permitted actions within each of the UiPath services in a given tenant.
Most of the tenant-level roles in the platform are cross-service roles as they grant permissions across multiple services within a particular tenant.
Currently, Tenant Administrator is the only role available at the tenant level.
The Tenant Administrator role allows you to effectively delegate responsibilities. The role grants access to manage all resources in the tenant, allowing operations such as role assignment, licensing management, and service provisioning.
The Tenant Administrator role can be assigned to multiple accounts.
Tenant-level roles are currently affected by the following known limitations:
-
Only the following services support the Tenant Administrator role: Orchestrator (includes Actions, Processes, Integration Service), Data Service, Document Understanding, Task Mining, Test Manager. The rest of the tenant-level services are currently not supported, and users with only the Tenant Administrator role cannot access these services.
-
The Tenant Administrator cannot access organization-level menus from the interface.
-
On the Admin > Tenants > Services screen, the Tenant Administrator can view enabled services, but cannot add or remove services.
-
On the Admin > Tenants > Manage access screen, the Tenant Administrator can view tenants they do not administer. However, if they access these tenants, they cannot perform any actions.
The Tenant Administrator role allows you to effectively delegate responsibilities. The role grants access to manage all resources1 in the tenant, allowing operations such as role assignment, licensing management, and service provisioning.
The Tenant Administrator role can be assigned to multiple accounts.
1The following services support the Tenant Administrator role:
- Orchestrator (includes Actions, Processes, Integration Service)
- Data Fabric
- Document Understanding
- Task Mining
- Test Manager
Tenant Administrator role permissions
Resource | Permissions | Description | |||||
---|---|---|---|---|---|---|---|
View | Create | Delete | Read | Update | |||
Centralized Access | Administration page | Grants permissions to centralized access, roles and role assignments. | |||||
Role | |||||||
Role assignments |
Resource | Permissions | Description | |||||||
---|---|---|---|---|---|---|---|---|---|
View | Create | Delete | Read | Update | Edit | Manage | |||
Data Fabric | Permission | Grants administrator permissions and is equivalent to the Data Fabric Administrator role. |
Resource | Permissions | Description | ||||
---|---|---|---|---|---|---|
Create | Delete | Read | Update | |||
Document Understanding | Classifier | Grants administrator permissions and is equivalent to the Document Understanding Administrator role. | ||||
Data Set Export | ||||||
Documents | ||||||
Document Type | ||||||
Extractor | ||||||
Monitor Processed Documents | ||||||
Monitor Processed Documents Detail | ||||||
Monitor Project Performance | ||||||
Project | ||||||
Project Version | ||||||
Project Version Label | ||||||
Tenant Settings |
Resource | Permissions | Description | |||||||
---|---|---|---|---|---|---|---|---|---|
View | Create | Delete | Read | Update | Edit | Manage | |||
Licensing | Quota | Grants permissions to manage quotas. |
Resource | Permissions | Description | ||||
---|---|---|---|---|---|---|
View | Create | Delete | Edit | |||
Orchestrator | Action Design | Grants administrator permissions and is equivalent to the Orchestrator Administrator role. | ||||
Alerts | ||||||
App Versions | ||||||
Audit | ||||||
Background Tasks | ||||||
Libraries | ||||||
License | ||||||
Machines | ||||||
Packages | ||||||
Robots | ||||||
Roles | ||||||
Settings | ||||||
Solution Deployments | ||||||
Solution Packages | ||||||
Tags | ||||||
Units | ||||||
Users | ||||||
Webhooks |
Resource | Permissions | Description | ||||
---|---|---|---|---|---|---|
View | Assign | Remove | Edit | |||
Task Mining | Manage Access | Grants administrator permissions and is equivalent to the Task Mining Administrator role. | ||||
Role |
Resource | Permissions | Description | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
View | Create | Delete | Read | Update | Edit | Assign | Toggle | AutomatedExecution | CreateAndUnlinkDefects | ExecutePerformanceTest | ManualExecution | OverrideTestResult | SmartTestGeneration | TestExecutionAssignment | |||
Test Manager | Performance Scenarios | Grants administrator permissions and is equivalent to the Test Manager administrator role. | |||||||||||||||
Process Heat Map | |||||||||||||||||
Process Heat Map Settings | |||||||||||||||||
Project | |||||||||||||||||
Project Settings | |||||||||||||||||
Prompt | |||||||||||||||||
Requirement | |||||||||||||||||
Role | |||||||||||||||||
Task Permissions | |||||||||||||||||
Test Case | |||||||||||||||||
Test Execution | |||||||||||||||||
Test Set |
- Navigate to Admin.
- Select Manage access at organization level.
- Select the Roles tab.
-
In the Role Name column, select the Tenant Administrator role.
You can now view the Tenant Administrator role permissions in the expanded panel.
- The rest of the tenant-level services are currently not supported, and users that only hold the Tenant Administrator role cannot access these services.
- The Tenant Administrator cannot access organization-level menus from the interface.
- On the Admin > Tenants > Services screen, the Tenant Administrator can view enabled services, but cannot add or remove services.
- On the Admin > Tenants > Manage access screen, the Tenant Administrator can view tenants they do not administer. However, if they access these tenants, they cannot perform any actions.
Service-level roles control access rights and permitted actions within each of your UiPath services, such as the Orchestrator service, or Data Service. The permissions for each service are managed within the service itself, not from the organization Admin page.
To grant permissions for a service to accounts, you can perform the following actions:
- In the selected service, assign service-level roles to a group to grant those roles to all member accounts.
- Add accounts to a group that already has the required service-level roles by navigating to Admin, then select Accounts and Groups.
-
In the selected service, .
For the following services, you can create and manage some services-level roles that are external to the service, at platform level:
-
Apps
-
AutomationOps
-
Document Understanding
-
IXP