Skip to main content
No Result Found
Connect and get help from 7,000+ developers on our Discord community. Ask the CommunityAsk the Community

Centralized Role-based access control (RBAC)

Learn how BrowserStack’s centralized RBAC ensures users have consistent access to products and projects across your organization.

BrowserStack provides a centralized RBAC framework that enables users to maintain consistent product roles across all products and multiple projects within any Group or Organization.

This Centralized Role Based Access Control feature is in beta and available to some customers.

Types of roles

BrowserStack uses two categories of roles to manage access:

  • IAM roles: These roles control ownership and administrative privileges across all BrowserStack products. They determine a user’s ability to grant access to others. The IAM roles are Owner, Admin, and User.

  • RBAC roles: These roles define what a user can do within BrowserStack’s global entities (Dashboards, Integrations, Projects) and within individual product environments. RBAC roles are standardized so that permissions such as read, create, update, delete, etc., remain consistent across all products, teams and projects. The common roles include:

    • Admin: Has full permissions to view, create, update, delete, archive, and manage all entities.
    • User: Has moderate permissions tailored to their responsibilities.
    • Viewer: Has read-only access to view resources without making any changes.
  • To view the default permissions for Admin, User, and Viewer roles, go to the Roles & Permissions page and select RBAC roles. You can also customize these roles to fit your requirements. For details, see the Custom roles page.
  • Going forward, product-specific roles will be deprecated and streamlines into one as RBAC role.

Member and guest roles for each product

After assigning IAM and RBAC roles, you can set the user’s access level for each product as a Member (licensed) or a Guest(unlicensed).

  • Member role (Licensed): A member is a fully licensed user of a product and has complete operational access aligned with their RBAC role. For example, User, Viewer, Admin.
  • Guest role (Unlicensed): A Guest is an unlicensed user with limited, view-only access. Guest access is useful when licenses are limited or when users only need visibility.
  • Some BrowserStack products do not support Guest access. For these products, all users must be assigned as Members.
  • When the RBAC role is Viewer and all product access levels are set to Guest, you cannot modify these settings.

Invite users

There are a two ways to invite User Members on BrowserStack:

  • Send invitation email
  • Share invitation link
  1. Log in to your BrowserStack account.
  2. Click the User Profile icon in the top-right corner. Select User Management, then click the Invitations tab or go to the Invitations page. The Invitations tab in User Management, showing options to invite members, set product access and roles, and view pending invitations. The image also shows license usage and license limit warning states.
  3. In the Send invitation email section, enter the email addresses of the users you want to invite. Separate multiple addresses with commas.
  4. Select IAM Role, RBAC Role, Primary team and Additional teams using the dropdown menus as needed. For more information about IAM role and RBAC role, refer to the Types of Roles section.
  5. Click Product access type to open the product access selection window. Product access selection window showing a list of products and options to assign Member or Guest access types for each product.
  6. In this window, select the products you want to assign to the user and choose the appropriate access type (Member or Guest) for each product. Click Save.
  7. Click Send invite. The invited users receive an email to join your organization on BrowserStack.

Anyone from the organisation can copy the default invite link and share it to onboard new users with ease. Anyone joining the organisation with the link with have User role and access to all the products as member or guest?

  1. Log in to your BrowserStack account.
  2. Click the User Profile icon in the top-right corner, then select User Management and click Invitations. Click the Invitations Tab
  3. Click the Copy link button in the Share invitation link section.
  4. Share the copied link via email, Slack, text, etc. Anyone who receives this link will be able to join your organization on BrowserStack.

Apart from the default invite link, Owners and Admins can customize the invite link to modify the IAM role, RBAC role, additional teams and product roles:

  1. Log in to your BrowserStack account.
  2. Click the User Profile icon in the top-right corner, then select User Management and click Invitations.
  3. Click the Create custom link option below the Share invitation link section. Create custom link option in the Invitations page
  4. In the Share invite link with users window, select the desired IAM Role, RBAC Role, Primary Team, and any Additional Teams.
    Share invite link with users dialog showing IAM Role, RBAC Role, team selection, and product access options
  5. Under Modify product access, select the products you want to grant access to and choose the appropriate access type (Member or Guest) for each product. You can scroll down in the dialog to view products that do not support the guest role. Share invite link with users dialog showing IAM Role, RBAC Role, team selection, and product access options
  6. Set the Link expiration period as required.
  7. Click Generate Link to create the custom invitation link, then click Done. The link with the selected permissions will be copied to your clipboard.
  8. Share the generated link with the members you want to invite to your organization with the selected permissions.

Custom Invite Link is available only to Owners and Admins. Custom Invite link will expire in 15 days from the date of link generation.

License limit reached for some products. Excess users added to these products will have view-only access. View preferences.

View user details

You can view each user’s details, including their IAM role, RBAC role, and product-level permissions, in the User Management section:

  1. Go to the User Management section in your BrowserStack account.
  2. In the user list, locate the user whose access details you want to view. Click the (more options) icon next to their name, then select View Details: The BrowserStack user management screen showing a list of users with clickable names to view details
  3. On the user details page, review the assigned IAM role, RBAC role, and product access for that user. You can see products that support the guest role at the top of the dialog. The user details page in BrowserStack, displaying IAM role, RBAC role, and product access information and products that support the guest role
  4. You can scroll down in the dialog to view products that do not support the guest role. The user details page in BrowserStack, showing products that do not support the guest role

Viewing user access helps you quickly audit permissions and ensure users have the correct access levels.

Modify access for user

You can modify a user’s access to update their IAM role, RBAC role, or product-level permissions.

To change a user’s product access:

  1. Log in to your BrowserStack account.
  2. Click the User Profile icon in the top-right corner, then select User Management and click Invitations.
  3. Find the user whose invite needs to be resent from the Pending Invitations table.
  4. Click the three dot (…) icon in the entry of the user and click Modify access.
  5. Modify the required access for the invite and click Save.
  6. Alternatively, after you add the user to the organization, you can still change their product access. Go to the User Management section in your BrowserStack account.
  7. In the user list, locate the user whose access you want to modify. Click the (more options) icon next to their name, then select Modify access: The BrowserStack user management screen with the more options menu open and the Modify access option highlighted
  8. In the Modify access dialog, update the IAM role, RBAC role, or product access (Member or Guest) as needed. You can see products that support the guest role at the top of the dialog.
    The Modify user access dialog in BrowserStack, showing options to change IAM role, RBAC role, and product access
  9. You can scroll down in the dialog to view products that do not support the guest role. The modify user access dialog in BrowserStack, showing products that do not support the guest role
  10. Click Save to apply the changes. The user’s access updates immediately.

You can only change the member or guest role for users who are not assigned the Viewer RBAC role.

Override access at a project level

You can override a user’s default RBAC role within a specific project by assigning a different role for that project. You can also override access of a team at project level. This lets you reassign any role to the user for that project, providing flexibility to tailor permissions as needed.

For example, you can change a user’s role from Admin to Viewer in a specific project to restrict edit or delete permissions.

  • The user retains their original Admin access for other products and projects.
  • The overridden role applies only to the selected project, ensuring granular control over permissions.
  • Use this feature to maintain security and limit access where necessary.

To override access at a project level:

  1. Go to the Manage Projects page. Click the three dots icon next to the project, then select Manage Access. Manage Projects page showing project list and access options
  2. In the Add users/teams to project dialog, add the user or team to whom you want to assign a different role. Confirm added users/teams dialog
  3. In the confirmation dialog, select the desired project-level role from the dropdown. For example, if Sarah’s RBAC role is User, you can change it to Admin for this specific project. Click Confirm. Role selection dropdown for user in project
  4. The updated role appears in the project access list. Project access list showing updated roles
  5. Alternatively, if the user is already added to the project, select the project. In the Access tab, click the user’s current role and choose a new role from the dropdown to update their permissions.

Override access of a team at project level

A team-level override allows you to assign a different role to a user within a specific team, regardless of their default RBAC role. For example, if a user’s default RBAC role is User, but you add them to a team, you can assign them the Admin role for that team.

To override access of a team at project level:

In the project access panel, select the team and choose the desired role (for example, Admin) from the dropdown. Team role selection dropdown in project access

For more information on project-level access, refer to Project management.

You can manage project access using APIs. For more information, refer to the Project API documentation.

  • Changing the role of an Owner of the project is not allowed.
  • You cannot override the project role of a user whose RBAC role is Viewer.
  • The effective override priority is user-level first, then team-level, and finally project-level (default).

Assign roles using Automated User Provisioning

If you use Automated User Provisioning (AUP) with your identity provider, you can assign IAM roles and RBAC roles to users using the BrowserStack attribute. This allows you to manage role assignments directly from your identity provider (IdP) instead of manually assigning roles in BrowserStack.

Attribute Name: primary_role

Default assignment as User, in case of:

  • Unexpected, empty or no value
  • Attribute controlled by BrowserStack UI

Expected values when attribute is controlled from your identity provider:

The bstack_role attribute accepts comma-separated values in the following format: IAM_role, RBAC_role

  • First value: IAM role (Owner, Admin, or User)
  • Second value: RBAC role (Admin, User, or Viewer)

Examples

Attribute Value Description
Admin,User Assigns IAM role as Admin and RBAC role as User.
User,Viewer Assigns IAM role as User and RBAC role as Viewer.
Admin,Admin Assigns IAM role as Admin and RBAC role as Admin.
No value/Empty The user is assigned to the organization with default settings.

Assign product access using Automated User Provisioning

If you use Automated User Provisioning (AUP) with your identity provider, you can assign product access to users using the BrowserStack attribute. This allows you to manage product access assignments directly from your identity provider (IdP) instead of manually assigning product access in BrowserStack.

Attribute Name: primary_product

By default, no product access is assigned. This is possible in two scenarios:

  • Unexpected, empty or no value specified
  • Product attribute is controlled from Account section

Expected values when attribute is controlled from your identity provider:

The primary_product attribute accepts comma-separated values. You can add product access in the format Product_name:Access_level where Access_level is either Member or Guest.

Examples

Attribute Value Description
Visual-Testing:Member,App-Percy:Guest Assigns Percy product access as Member, and App Percy product access as Guest.
No value/Empty The user is assigned to the organization with default settings.

Supported product attribute values

Attribute values Product Update
Browser-Testing Live
Automate
Visual-Testing Percy
Automate-Testing Automate
Live-Testing Live
Mobile-App-Testing App Live
App Automate
App-Automate-Testing App Automate
App-Live-Testing App Live
App-Percy App-Percy
App-Accessibility-Testing App Accessibility
Accessibility-Testing Accessibility Testing
Test-Management Test Management
Test-Observability Test Reporting & Analytics
Low-Code-Automation Low Code Automation
Bug-Capture Bug Capture
Requestly Requestly
Testing-Toolkit Testing Toolkit
Central-Scanner Central Scanner
Automate-turboscale Automate TurboScale
Accessibility-Design-Toolkit Accessibility Design Toolkit

User management APIs

We provide the following User Management APIs to support the latest RBAC changes:

We're sorry to hear that. Please share your feedback so we can do better

Contact our Support team for immediate help while we work on improving our docs.

We're continuously improving our docs. We'd love to know what you liked





Thank you for your valuable feedback

Is this page helping you?

Yes
No

We're sorry to hear that. Please share your feedback so we can do better

Contact our Support team for immediate help while we work on improving our docs.

We're continuously improving our docs. We'd love to know what you liked





Thank you for your valuable feedback!

Talk to an Expert
Download Copy Check Circle