API Endpoints and Permission Categories
This document outlines the various API endpoints and their associated permission categories, providing a clear reference for understanding the access control within our system.Note: In the early days we are going to describe these concepts as things like ‘instance_read’ or ‘instance_write’, We realize these are confusing. Any questions about what permissions are attributed to what actions should be asked via our support channels.
Creating Custom Roles
- Accessing Role Management: Custom roles can be created and managed through the CLI. Team roles can be managed on the ‘Manage’ page by users with team_read level access.
- Defining Permissions: When creating a custom role, anyone can select from a wide range of permissions, such as instance creation, billing access, monitoring, etc. This allows for precise control over what each role can and cannot do.
- Assigning Custom Roles: Once a custom role is created, it can be assigned to team members through the team management interface.
Important Elements
- constraints: Constraints can be added at different levels to enforce certain parameters of the body to be specific values
- params: You can use wildcards to represent placeholder values. (Useful if you want to generate many keys all doing similar operations)
Examples
The following json would create a user that has access to the specified categories. In this instance, someone with these permissions would be able to create an instance as well as access billing informationText
Text
Permission Categories
instance_read
The following permissions would allow a user to read the instance logs of instance id 1227 onlyText
Text
instance_write
- Create Instances
- Update Instances
- Destroy Instances
- Reboot Instances
- Execute Command
- Change Bid Price
user_read
Text
user_write
Text
billing_read
Text
billing_write
Text
machine_read
Text
machine_write
misc
Text
team_read
Text
team_write
JSON