Skip to content

Roles

RAMP uses a comprehensive role-based access control (RBAC) system to govern who can view, edit, and manage resources. Roles exist at multiple levels and can be assigned to individual users or to groups.

RAMP has four levels of roles:

LevelScopeExamplesAssigned By
Application RolesEntire tenantAdministrator, SuperUser, GlobalTemplateEditorAdministrators
Template RolesSingle templateTemplate Owner, Template EditorTemplate Owners
Instance RolesSingle instanceInstance Head, Executor, ObserverInstance Heads
System RolesSingle systemSystem Manager, CoordinatorAdministrators, System Managers

Application roles are tenant-wide roles assigned through the Administration area. They fall into several categories.

RoleValueDescription
Administrator1Manages system settings, users, groups, and configuration. Cannot access content (templates, instances, systems) without additional roles.
SuperUser2Full access to all content. Bypasses most permission checks. Cannot edit completed/cancelled instances or use force actions.
TenantAdministrator3Manages multi-tenant infrastructure. Cannot access tenant content. Uses separate login at /_tenantadmin/login. Only available when multi-tenancy is enabled.

Global template roles grant permissions across all templates in the system, including templates created in the future.

RoleValueDescription
GlobalTemplateOwner11Full control of all templates: edit settings, assign roles, publish, approve, delete.
GlobalTemplateEditor12Edit and publish on all templates. Cannot delete templates or assign roles.
GlobalTemplateViewer13Read-only access to all templates. Can add comments.
GlobalTemplateApprover14Can approve published versions on all templates.

Global instance roles grant permissions across all instances in the system.

RoleValueDescription
GlobalInstanceHead20Full control of all instances: manage team, control lifecycle, force actions.
GlobalInstanceDeputyHead21Nearly full control. Cannot assign Instance Head role.
GlobalInstanceEditor22Edit notes and comments on all instances. Edit draft properties.
GlobalInstanceExecutor23Execute steps on all instances. Start instances.
GlobalInstanceObserver24Read-only access to all instances. Can add comments.
RoleValueDescription
TemplateCreator10Can create new templates. Automatically becomes Template Owner on created templates.
SystemManager30Can manage systems: add stages, assign system roles.
CalendarManager50Can manage calendars, time zones, and holidays.
MessageSubscriber60Receives general system notifications.
PreEscalationSubscriber61Receives pre-escalation warnings.
EscalationSubscriber62Receives escalation alerts.

Use global roles. Assigning roles to individual templates and instances creates unnecessary overhead when the same people work across everything.

Example: Instead of assigning John as Template Editor on 50 templates individually, assign him GlobalTemplateEditor once.

Template roles are assigned per template and control what a user can do with that specific template.

RoleDescriptionCan EditCan PublishCan ApproveCan DeleteCan Assign Roles
Template OwnerFull control of the templateYesYesYesYesYes
Template EditorEdit and publish versionsYesYesNoNoNo
Template ViewerRead-only accessNoNoNoNoNo
Template ApproverApprove published versionsNoNoYesNoNo
  1. Navigate to the template.
  2. Open the Roles tab.
  3. Click Add Team Member.
  4. Select the user and the desired role.
  5. Click Assign.

Instance roles are assigned per instance and control what a user can do during the instance lifecycle.

RoleDescriptionEdit PropertiesExecute StepsForce ActionsManage Team
Instance HeadFull instance controlDraft/PlannedYesYesYes
Deputy HeadNearly full controlDraft/PlannedYesYesPartial
EditorEdit notes and draftsDraft onlyNoNoNo
ExecutorExecute stepsNoYesNoNo
ObserverRead-only with commentsNoNoNoNo
  1. Navigate to the instance.
  2. Open the Team tab.
  3. Click Add Team Member.
  4. Search for the user in the member search dialog.
  5. Select the role.
  6. Click Assign.

Force actions are powerful operations reserved for Instance Head and Deputy Head roles. They allow overriding the normal step workflow.

ActionDescription
Force Complete (F-OK)Force a step to completed status regardless of its current state
Force Skip (F-SKIP)Force a step to be skipped
Force Abort (F-ABORT)Force a step to be aborted
Force CancelForce cancel the entire instance

System roles are assigned per system and control management and coordination.

RoleDescription
CoordinatorSystem-scoped coordination. Automatically receives Template Viewer and Instance Observer for all items in the system. Can edit release planning.
Deputy CoordinatorSame permissions as Coordinator (supports organizational hierarchy).

Coordinators and Deputy Coordinators automatically gain visibility into all templates and instances associated with their system, without needing explicit template or instance role assignments.

RAMP evaluates permissions in the following order:

  1. SuperUser check — SuperUser bypasses most permission checks (except read-only objects and force actions).
  2. Global role check — global roles are checked before entity-specific assignments.
  3. Entity role check — template, instance, or system-specific roles are evaluated.
  4. Group role inheritance — roles inherited through group membership are included.
  5. Most permissive wins — when a user has multiple roles, the most permissive role determines access.

When a user has both global roles and entity-specific roles, the most permissive applies:

Global RoleEntity RoleEffective Permission
GlobalTemplateViewerTemplate Owner on Template AViewer on all templates, Owner on Template A
GlobalTemplateEditorTemplate Viewer on Template BEditor on all templates (including B)
GlobalInstanceObserverInstance Head on Instance XObserver on all instances, Head on Instance X
(none)Template Editor on Template CEditor on Template C only
  • Administrator content block — Administrator alone cannot access content. Combine with content roles for access.
  • TenantAdministrator isolation — TenantAdministrator has no access to any tenant content. This is enforced at the authorization level.
  • Read-only objects — Completed and Cancelled instances are immutable. Even SuperUser cannot edit them.
  • Last owner protection — the last Template Owner or Instance Head cannot be removed. At least one must always remain.
ActionSuperUserAdminGlobalTemplateOwnerGlobalTemplateEditorGlobalTemplateViewerTemplateOwnerTemplateEditorTemplateViewer
ViewYesNoYesYesYesYesYesYes
CreateYesNoYesYesNo
Edit settingsYesNoYesYesNoYesNoNo
Create versionYesNoYesYesNoYesYesNo
Publish versionYesNoYesYesNoYesNoNo
Approve versionYesNoYesNoNoYesNoNo
DeleteYesNoYesNoNoYesNoNo
Assign rolesYesNoYesNoNoYesNoNo
ActionSuperUserGlobalInstanceHeadGlobalInstanceDeputyHeadInstanceHeadDeputyHeadEditorExecutorObserver
ViewYesYesYesYesYesYesYesYes
Edit (Draft)YesYesYesYesYesYesNoNo
Set PlannedYesYesYesYesYesNoNoNo
Start (Running)YesYesYesYesYesNoYesNo
PauseYesYesYesYesYesNoNoNo
CompleteYesYesYesYesYesNoNoNo
CancelYesYesNoYesNoNoNoNo
Force actionsNoYesYesYesYesNoNoNo
Execute stepsYesYesYesYesYesNoYesNo
Assign teamYesYesNoYesPartialNoNoNo

All role assignments and removals are logged in the audit trail:

  • Template roles — visible in the template’s History tab
  • Instance roles — visible in the instance’s History tab
  • Application roles — visible in the Tenant Admin Audit Log
  • Least privilege — assign the minimum role needed. Start with Viewer or Observer, promote as needed.
  • Use groups — assign roles to groups rather than individuals for easier management.
  • Multiple owners — assign at least two Template Owners per template and two Instance Heads per instance for redundancy.
  • Regular audits — review role assignments quarterly. Remove roles from departed or reassigned staff.
  • Limit SuperUser — restrict SuperUser to fewer than five users. Use global roles for broader access instead.
  • Separate Administrator from content — keep the Administrator role for system management. Assign content roles explicitly where needed.