Roles
The Roles section allows administrators to define permission groups that control what users can view, create, update, or delete within SingleJump.
Roles provide a flexible and secure way to manage access across all platform resources.
A role can include permissions for:
- Devices
- Device Groups
- ACLs
- Audits
- Settings
- Users
- SSH Sessions
- And every other resource managed within SingleJump
Assigning roles to users ensures that each member of your team only has access to the areas they are authorized to manage.
Creating a Role
To create a new role, navigate to Roles → Create.
Fields
Name *
The name of the role.
Examples:
Super AdminUserRead OnlySupport Team
Choose a descriptive name that reflects the level of access.
Select All
This toggle enables or disables all permissions for the role.
Useful when creating high-privilege roles (e.g., Administrator).
Permissions Structure
Permissions are organized into three tabs:
- Resources
- Pages
- Widgets
Each tab lists the components of SingleJump that can be controlled through permissions.
Resource Permissions
Resource permissions allow granular control over CRUD operations for each model.
Each resource includes permissions such as:
- View – Allows viewing a single record
- View Any – Allows viewing the list of records
- Create – Allows creating new records
- Update – Allows editing
- Delete – Allows deleting
- Delete Any – Allows mass deletion
Resources include models such as:
- ACL
- Audit
- Device
- Device Group
- User
- Role
- Settings
- SSH Records
- Command Batches
- And many others
You can expand each category to customize permissions for that specific model.
Page Permissions
Some pages in SingleJump are not directly tied to a database model.
These appear under the Pages tab.
Examples:
- Settings
Widget Permissions
Widgets (dashboard blocks or interface elements) can also be permission-controlled.
Examples:
- Stats Overview
- Last SSH sessions
Summary
Roles provide a powerful way to manage user access in SingleJump.
By assigning different permissions to each role, administrators can:
- Control who can view or modify devices
- Limit access to sensitive settings
- Restrict who can execute SSH commands
- Separate responsibilities across teams
- Enforce strict least-privilege access policies
Combined with ACLs and device-level controls, Roles help ensure that only the right users can perform the right actions at the right time.