Role hierarchy
The RBAC system follows a hierarchical structure with three distinct scopes:- Platform level — SuperAdmin role for platform-wide administration
- Organization level — Org Owner and Org Member roles for organization management
- Project level — Project Owner and Project Member roles for project-specific work
- Consumer level — End User role for workflow execution and chat
Role definitions
SuperAdmin — Platform administrator
SuperAdmin — Platform administrator
Scope: Entire MagOneAI platformSuperAdmins have complete control over the platform but operate within clear boundaries to ensure organization data isolation.Capabilities:
- Create and manage all organizations
- Assign Org Owners and manage organization membership
- Configure platform-level model providers and credentials
- Access the Admin Portal for platform administration
- View platform-wide audit logs and usage metrics
- Manage platform settings and infrastructure configuration
- Cannot access organization-specific data or resources directly
- Organization data remains isolated — SuperAdmins manage the containers, not the contents
- Cannot execute workflows or create agents (must be assigned an org/project role)
Org Owner — Organization administrator
Org Owner — Organization administrator
Scope: Single organizationOrg Owners have complete control within their organization and act as administrators for their business unit or department.Capabilities:
- Create and manage projects within the organization
- Add and remove organization members
- Assign organization and project roles to members
- Configure organization-level model providers
- Set organization policies and quotas
- View organization-wide audit logs and cost tracking
- Access all projects within the organization
- Cannot access other organizations or platform settings
- Cannot manage SuperAdmins or platform-level configuration
- Cannot view or modify platform-level provider configurations
Org Member — Standard organization user
Org Member — Standard organization user
Scope: Assigned projects within an organizationOrg Members are standard users who can access and work within projects they’re assigned to.Capabilities:
- Access projects they’re explicitly assigned to
- Create and manage resources (agents, workflows, tools, knowledge bases) within assigned projects
- Execute workflows and chat with agents in assigned projects
- View project-level audit logs and usage metrics
- Collaborate with other project members
- Cannot create new projects (must request from Org Owner)
- Cannot manage organization settings or membership
- Cannot access projects they’re not assigned to
- Cannot configure model providers
Project Owner — Project administrator
Project Owner — Project administrator
Scope: Single projectProject Owners have complete control within a specific project, including managing project members and settings.Capabilities:
- Full access to all project resources (agents, workflows, tools, knowledge bases)
- Add and remove project members
- Assign Project Owner and Project Member roles within the project
- Configure project settings and policies
- Delete or archive the project
- View project audit logs and cost tracking
- Share agents to MagOneAI Hub
- Cannot access other projects or organization settings
- Cannot create new projects (must be Org Owner or Org Member requesting a new project)
- Cannot configure model providers (uses organization-level configuration)
Project Member — Project contributor
Project Member — Project contributor
Scope: Single projectProject Members are contributors who create and manage resources within a project but cannot change project settings or membership.Capabilities:
- Create and edit agents, workflows, tools, and knowledge bases
- Execute workflows and test agents
- View project resources and audit logs
- Collaborate with other project members
- Use Studio for development
- Cannot manage project members or settings
- Cannot delete the project
- Cannot share agents to MagOneAI Hub (Project Owner approval required)
- Cannot configure project-level policies
End User — Consumer access
End User — Consumer access
Scope: MagOneAI Hub onlyEnd Users are consumers of agents and workflows. They have no access to Studio or Admin Portal.Capabilities:
- Chat with agents published to MagOneAI Hub
- Trigger workflows they have access to
- Complete human tasks assigned to them
- View their conversation history
- Access mobile and web Hub interfaces
- Cannot access Studio, Admin Portal, or any development tools
- Cannot create or modify agents, workflows, or other resources
- Cannot view audit logs or system configuration
- Limited to consuming published agents and workflows
Permissions matrix
This table shows the specific permissions granted to each role:| Permission | SuperAdmin | Org Owner | Org Member | Project Owner | Project Member | End User |
|---|---|---|---|---|---|---|
| Manage organizations | ✓ | - | - | - | - | - |
| Manage users (platform) | ✓ | - | - | - | - | - |
| Configure platform providers | ✓ | - | - | - | - | - |
| Create organizations | ✓ | - | - | - | - | - |
| Create projects | - | ✓ | - | - | - | - |
| Manage org members | - | ✓ | - | - | - | - |
| Configure org providers | - | ✓ | - | - | - | - |
| Access all org projects | - | ✓ | - | - | - | - |
| Manage project members | - | ✓ | - | ✓ | - | - |
| Manage project settings | - | ✓ | - | ✓ | - | - |
| Create agents | - | ✓ | ✓ | ✓ | ✓ | - |
| Create workflows | - | ✓ | ✓ | ✓ | ✓ | - |
| Create tools (MCP) | - | ✓ | ✓ | ✓ | ✓ | - |
| Create knowledge bases | - | ✓ | ✓ | ✓ | ✓ | - |
| Execute workflows | - | ✓ | ✓ | ✓ | ✓ | ✓ |
| Chat with agents | - | ✓ | ✓ | ✓ | ✓ | ✓ |
| Complete human tasks | - | ✓ | ✓ | ✓ | ✓ | ✓ |
| Access Studio | - | ✓ | ✓ | ✓ | ✓ | - |
| Access Admin Portal | ✓ | - | - | - | - | - |
| Access MagOneAI Hub | - | ✓ | ✓ | ✓ | ✓ | ✓ |
| View platform audit logs | ✓ | - | - | - | - | - |
| View org audit logs | - | ✓ | - | - | - | - |
| View project audit logs | - | ✓ | ✓ | ✓ | ✓ | - |
| Share agents to Hub | - | ✓ | - | ✓ | - | - |
| Delete projects | - | ✓ | - | ✓ | - | - |
Organization isolation
Organization isolation is a fundamental security principle in MagOneAI. Each organization functions as a complete data boundary with no cross-organization access.Isolation guarantees
- Data isolation — Organizations cannot see or access data from other organizations. This includes agents, workflows, execution logs, knowledge bases, and all metadata.
- User isolation — Users belong to specific organizations. A user in Organization A has no visibility into Organization B, even if the same person is a member of both organizations with different user accounts.
- Provider isolation — Model provider configurations are scoped to organizations. Credentials configured in one organization are not accessible to others.
- Audit isolation — Audit logs are scoped to organizations. Org Owners can only view logs for their organization.
SuperAdmin boundaries
SuperAdmins can perform administrative functions across organizations, but they respect data boundaries:- Can do: Create organizations, assign Org Owners, configure platform-level providers, view platform metrics
- Cannot do: Access organization-specific agents, workflows, or execution data without being explicitly granted an Org Owner or Org Member role
API key management
API keys provide programmatic access to MagOneAI workflows and agents. Keys are scoped to projects and inherit the permissions of the user who created them.Creating API keys
Navigate to project settings
In Studio, go to the project where you need API access and open Settings.
Generate a new API key
Click “Create API Key” and provide a descriptive name (e.g., “Production deployment - ETL workflow”).
Set key permissions
Choose whether the key can execute workflows, chat with agents, or both. Keys cannot create or modify resources.
Key rotation
To rotate an API key without downtime:- Create a new API key with the same permissions
- Update your application to use the new key
- Verify the new key is working in production
- Revoke the old key
Key revocation
Revoke a key immediately if:- The key is compromised or accidentally exposed
- The user who created the key leaves the organization
- The key is no longer needed
Audit trail
All API key usage is logged in the project audit trail:- Key creation with creator and permissions
- Every API request with key ID, endpoint, and timestamp
- Key revocation with user and reason
Role assignment workflows
Adding a new organization member
Invite the user
As an Org Owner, navigate to Organization Settings → Members and click “Invite Member”.
Assign organization role
Choose whether the user should be an Org Member (standard) or Org Owner (administrator).
Assign to projects
Select which projects the user should access and their role in each (Project Owner or Project Member).
Promoting a user to Project Owner
Review current access
Ensure the user is already a Project Member and has demonstrated the need for elevated permissions.
Update role
As an Org Owner or existing Project Owner, go to Project Settings → Members and change the user’s role to Project Owner.
Offboarding a user
Revoke organization access
As an Org Owner, remove the user from the organization in Organization Settings → Members.
Revoke OAuth tokens
If the user had OAuth integrations, revoke their tokens in the Admin Portal or organization settings.
Best practices
Apply least privilege
Assign the minimum role needed for each user’s responsibilities. Most users should be Project Members or End Users.
Regular access reviews
Quarterly review of all user roles and permissions. Remove access for inactive users.
Separate production and development
Use different projects for development and production with separate team assignments.
Limit Org Owners
Typically 2-3 Org Owners per organization. Too many reduces accountability.
Document role decisions
Maintain documentation explaining why each user has their assigned role.
Automate offboarding
Integrate with your HR system to automatically revoke access when employees leave.
Role-based access control is most effective when combined with other security measures. Use RBAC alongside HashiCorp Vault for secrets management, comprehensive audit logging, and network-level security controls for defense-in-depth.