Manage Roles and Permissions with Role-based Access Controls (RBAC)
Manage user access and permissions across Amplitude's platform with greater control using Role-Based Access Controls (RBAC) to enhance security, compliance, and scalability for your enterprise.
Get startedRole-based Access Control (RBAC) lets you manage who can access specific areas of Amplitude and the actions they can perform in those areas. By offering granular access controls, your Amplitude administrators can scale Amplitude adoption and prevent unauthorized actions.
RBAC provides administrators a centralized location for assigning permissions to individual users or groups. For example, if your organization has an Analyst role, you can assign the same base permissions to that role. When a new analyst joins the team and is assigned Analyst, they automatically inherit the same set of permissions as everyone else with the Analyst role.
RBAC Provides the following benefits to your enterprise:
RBAC is available to organizations on any Enterprise plan. If you aren't on an Enterprise plan, go to your Account Management roles and permissions.
To learn more, take the Manage roles and permissions with RBAC course on Amplitude Academy.
Amplitude's RBAC contains three main layers: Roles, Permissions, and Actions. Roles contain permissions, and Permissions contain actions. An action is a singular task, editing a metric, or creating an annotation.
By default, your Amplitude organization contains four default roles, in order of increasing access:
Amplitude’s default roles cover most common use cases, but every organization has unique structures and responsibilities. Custom roles enable your organization to fine tune access for:
This flexibility enables your organization to follow the security best practice of providing the least amount of access that enables users to complete their work.
The Admin role has special permissions that custom roles don't have.
Admin-only permissions include:
Permissions define the specific actions Amplitude users can perform. They’re the building blocks of RBAC. Most permissions define a user’s ability to create, edit, or delete items in specific areas. Some permissions provide access to a single action, like marking a dashboard or metric as official.
Amplitude organizes permissions by product area:
In Amplitude, you assign roles to users for each project. This means that project membership determines access to that project, and roles within the project determine what a user can do.
Groups enable you to manage users at scale. They define the projects that a member of the group has access to, and their role within those projects. Groups most often map to teams in your organization. For example, the Business Intelligence team has a defined set of Amplitude projects where they do their work, and a set of permissions they need to do that work. As a result, you may have a group called "Business Intelligence," with access to Project A and Project B, with the Analyst role.
When you add a user to a group, admins can't change their permissions at the individual level for projects where access is granted through that group. This ensures permission consistency and simplifies troubleshooting when determining why a user has certain access levels.
When you try to modify permissions for a user who has group-assigned access, a tooltip appears stating "User(s) are assigned access to this project via Group(s)".
To change a user's permissions for projects they access through a group:
Amplitude displays warning indicators when permission assignments require attention:
Multiple: Displayed when a user has different roles for the same project, typically because they belong to multiple groups with different permission levels. When this occurs, Amplitude grants the user the union of all assigned role permissions for that project.
Conflict: Displayed when you manage roles for multiple users simultaneously and those users have a permissions mismatch for the same project.
The ACCESS VIA column in the User Overview panel indicates how a user received their project access:
| Access Via | Meaning |
|---|---|
| Direct | Role was assigned to the user directly through the Manage Project Access modal |
| [Group Name] | Role was assigned to the user through membership in the specified group |
RBAC Permissions
December 11th, 2025
Need help? Contact Support
Visit Amplitude.com
Have a look at the Amplitude Blog
Learn more at Amplitude Academy
© 2026 Amplitude, Inc. All rights reserved. Amplitude is a registered trademark of Amplitude, Inc.