Skip to main content
LangWatch provides role-based access control (RBAC) to manage user permissions and access levels. This allows you to control who can access your LangWatch workspace and what they can do.

Role-Based Access Control (RBAC) System

LangWatch implements a comprehensive Role-Based Access Control (RBAC) system that manages permissions across organizations, teams, and projects. This system provides fine-grained control over what users can access and modify within the platform.

Permission Structure

Actions

The system defines six core actions that can be performed on resources:
ActionDescription
viewRead-only access to view resources
createAbility to create new resources
updateAbility to modify existing resources
deleteAbility to remove resources
manageFull CRUD access plus administrative settings
shareAbility to share resources with others

Resources

Permissions are applied to the following resource types:
ResourceDescription
organizationOrganization-level settings and management
projectIndividual projects within teams
teamTeam management and settings
analyticsAnalytics dashboards and reports
costCost tracking and billing information
tracesLLM trace data and logs
scenariosTest scenarios and evaluations
annotationsData annotations and labeling
evaluationsCreating and managing evaluations
datasetsManaging datasets
triggersCreating and managing triggers
workflowsCreating and managing workflows
promptsCreating and managing prompts

Predefined Roles

Team Roles

Admin

Full administrative access to all team resources and settings.
ResourcePermissions
Projectsview, manage
Analyticsview, manage
Costview
Tracesview, share
Annotationsview, manage
Evaluationsview, manage
Datasetsview, manage
Triggersview, manage
Workflowsview, manage
Promptsview, manage
Scenariosview, manage
Teamview, manage

Member

Same permissions as Admin but cannot manage team settings.

Viewer

Read-only access to most resources for observation and reporting purposes.
ResourcePermissions
Projectsview
Analyticsview
Tracesview
Annotationsview
Evaluationsview
Datasetsview
Triggersview
Workflowsview
Promptsview
Scenariosview
Teamview

Organization Roles

Admin

Complete control over organization settings and all teams.
ResourcePermissions
Organizationview, manage, delete

Member

Basic organization access for team members.
ResourcePermissions
Organizationview

Permission Hierarchy

The system implements a hierarchical permission model where:
  • manage permissions automatically include view, create, update, and delete permissions
  • This means if a user has analytics:manage, they automatically have analytics:view, analytics:create, analytics:update, and analytics:delete

Custom Roles

Overview

Organizations can create custom roles to provide more granular permission control beyond the predefined roles. Custom roles allow organizations to:
  • Define specific permission combinations
  • Create roles tailored to specific job functions
  • Implement least-privilege access principles
  • Maintain compliance with organizational policies

Creating Custom Roles

Custom roles are created at the organization level and can be assigned to users within any team in that organization. Custom roles can be found under settings.

Required Fields

  • Name: Unique role name (1-50 characters)
  • Description: Optional description of the role’s purpose
  • Permissions: Array of specific permissions
The following screenshot shows the roles interface in LangWatch.
LangWatch RBAC Roles Interface
To create a new role, click the “Create Role” button. Add the name and description of the role and click the “Create” button.
Creating Custom Roles in LangWatch
Once the role is created, you can attach it to a user under the teams page.
Adding Roles to Users in LangWatch

Custom Role Management

Permissions Required

  • Create/Update/Delete Custom Roles: organization:manage permission
  • Assign Custom Roles: team:manage permission

Best Practices

  • Naming Convention: Use descriptive names that clearly indicate the role’s purpose
  • Documentation: Provide clear descriptions explaining when to use each role
  • Regular Review: Periodically review custom roles to ensure they’re still needed
  • Least Privilege: Grant only the minimum permissions required for the role’s function
  • Testing: Test custom roles in a development environment before deploying

Custom Role Limitations

  • Custom roles cannot grant permissions that exceed the organization admin’s capabilities
  • Custom roles are organization-scoped and cannot be shared across organizations
  • Users can only have one custom role assignment per team
  • Custom roles cannot be assigned to organization-level users (only team members)

Public Sharing

The system supports public sharing of traces, allowing access without authentication when resources are explicitly shared publicly.

Security Considerations

  • Principle of Least Privilege: Grant only necessary permissions
  • Regular Audits: Periodically review role assignments and permissions
  • Separation of Duties: Use different roles for different functions
  • Access Reviews: Implement regular access reviews for sensitive roles
  • Monitoring: Track permission usage and changes for security auditing
This RBAC system provides the flexibility to implement complex organizational structures while maintaining security and ease of management.