Key Concepts
Key concepts for the Identity & Access Management (IAM) system in Confidence are:- Users - A user is a person who has access to the Confidence workspace.
- Groups - A group is a collection of users (and service accounts).
- Roles - A role is a set of permissions that can be assigned to a user or a group.
- Policies - A policy gives a user or a group one or several roles.
- Through a policy that gives the user or the group permission to all resources of a certain type
- By making the users or group the owner of a resource (typically done when creating a resource)
- Share a specific resource with a user or a group by selecting Permissions on the resource page
Manage the access for everyone on a resource by clicking ‘Permissions’ on the resource page and set the general access.
Get Started With Access Management
Default Settings
Your Confidence workspace comes with:- Predefined roles (full list in roles documentation):
Creator: Creators have no general read and edit privileges, but can create any resource. They are the owners of the resources they create, and can edit them.Reader: Can read everythingEditor: Can create, read, and edit everything
- A group called
Everyonethat all users belong to. You cannot remove this group. - A policy giving the group
Everyonethe roles ofCreatorandReader. This makes it possible for anyone to create any type of resource in Confidence, for example a flag, an A/B test, or a metric, and to see resources others have created. You can edit or remove this policy if you have the roleIAM AdminorAdmin.
- The group
Everyonehas the roleReaderby default. You can change this toEditor. - The creator selects an owner, who gets the role of
Owner. The owner, by extension, receives also the role ofEditorfor that resource.
When to Use Policies versus Manual Permissions
A policy gives a group or a user a certain role that implies they can do specific things, often for a specific type of resource. For example, you can have a policy that gives the group ‘Team A’ the role ofFlags Editor which
allows all users in ‘Team A’ to edit any feature flag. A manual permission gives
a user or a group read or edit rights for a particular instance of a resource.
Policies control permissions globally. When you give a user or group a role via a
policy, that group has that role for all resources that the role governs.
Returning to the example, if ‘Team A’ gets the role of Flags Editor, this
team can edit all flags regardless of flag ownership and manual permissions
set on individual instances of flags.
If you want to limit who can take certain actions on specific instances, make
sure that there are no policies for the roles that govern that action. For
example, if you want to limit who can edit an experiment on each experiment
itself, there must be no policy giving the role Editor to any
user or group. If you have a central experimentation team,
add an Experiment Editor role to the group of that team.
Handle New Users and Users Without Groups
Use a policy on the groupEveryone to set the ground rules for what everybody
can do. By default, Confidence has a policy that gives the group Everyone the roles of Creator and Reader.
Make sure to have a policy for the Everyone group in place, to handle users
that have no direct or indirect ownership. Confidence comes with a policy that
configures everyone to be a Creator by default. Change this under Admin >
Policies.
Learn more about the concepts of Confidence Identity & Access Management:

