Auth & Security

Authorization

Overview

Authorization is enforced via role-based access control (RBAC) at organization, team, and resource levels. Permissions cover Console navigation, API operations, agent enablement, release gate configuration, and Admin Center access.

Service accounts for automation should receive minimal roles (typically QA Engineer or custom role with runs:create and projects:read only).

Who should read this

  • QA engineers, SREs, platform teams, and developers operating Zof Console and APIs.

When to use this workflow

  • Onboarding new team members to Zof terminology and workflows
  • Authoring internal runbooks aligned with Console labels
  • Designing CI/CD or webhook integrations against documented behavior

Step-by-step procedure

Review default roles

Admin Center → Roles → inspect built-in role permission matrices.

Document which roles can approve remediation, edit release gates, and manage API keys.

Assign roles to members

Admin Center → Users → select member → assign organization role.

Optional team-level overrides for large organizations.

Validate API enforcement

Attempt restricted operation with lower-privilege key in staging.

Confirm 403 Forbidden with clear error code before production automation.

Key concepts

Organization Admin
Full Admin Center access including billing, security, and policy packs.
QA Lead
Manage test assets, approve release gates, view all runs in scope.
Engineer
Trigger runs, view results, limited policy configuration.
Viewer
Read-only access to dashboards and reports.

Best practices

  • Principle of least privilege for automation service accounts
  • Audit role changes via Admin Center audit log monthly
  • Separate approvers from executors for governed remediation workflows

Was this page helpful?

Authorization | Zof AI Documentation