Permissions and Roles
Define and audit system access by assigning roles, whether manually in the UI or via your identity provider.
This ensures all users and groups have the granular permissions their responsibilities require.
Permission Definitions
Permissions are the individual building blocks of access. The following permissions can be combined to create custom roles or used to understand the capabilities of predefined roles.
The following table describes Develocity permissions and lists the corresponding configuration file values:
Permission |
Config value |
Description |
Build data |
||
|---|---|---|
View Build Scans and build data |
|
Allows you to view Build Scans and associated build data. |
Publish Build Scans |
|
Allows you to publish Build Scans. |
Access build data via the API |
|
Allows you to access the Develocity API. |
Delete build scans |
|
Allows you to delete any Build Scan that you have access to. |
Test acceleration |
||
Use Test Distribution |
|
Allows you to use Test Distribution. |
|
Allows you to use Predictive Test Selection. |
|
Build caching |
||
Read Build Cache data |
|
Allows you to read Build Cache data. |
Read and write Build Cache data |
|
Allows you to read and write Build Cache data. |
Read Build Cache data and write Bazel CAS data |
|
Allows you to read Build Cache data and write data to the content-addressable storage exposed by the Build Cache’s Bazel functionality. If you typically assign read-only access to the cache for developers and write access only for CI, consider granting this permission to developers who use Bazel. The |
Projects |
||
|
Allows you to access and push data that’s not associated with a project. |
|
|
Allows you to access and push all data for all projects, and data that’s not associated with a project. |
|
Administration |
||
Configure Edge nodes |
|
Allows you to configure Edge node functionality. |
Configure Build Caching |
|
Allows you to configure Build Cache functionality. |
Configure Test Distribution |
|
Allows you to configure Test Distribution functionality. |
|
Allows you to configure projects and project groups for project-level access control from the Administration console or by using the Develocity API. |
|
|
Allows you to configure access control settings, including user management and identity provider configuration. |
|
|
Allows you to configure operational settings, such as disk space management and email settings. |
|
Generate support bundles |
|
Allows you to generate support bundles. |
|
Permissions such as Configure access control permission and Configure operational settings permission allow privilege escalation. |
| The Access all data without an associated project and Access all data with or without associated project permissions are granted to all users automatically when project-level access control is disabled. |
You manage permissions by assigning roles to users, either in Develocity or by mapping roles from an external identity provider. Both methods are described later on this page.
Develocity includes a basic set of preconfigured roles, shown in the following table.
Predefined Roles
Develocity includes several predefined roles designed to cover the most common user personas.
Role |
Display name |
Description |
Permissions |
|
Administrator |
Administer Develocity |
Configure Edge nodes |
|
API Client |
Access build data via the API. Doesn’t include access to the administrative API endpoints. |
Access build data via the API |
|
CI Agent |
Use Develocity for CI builds |
Publish Build Scans |
|
Developer |
Use Develocity |
View Build Scans and build data |
For externally managed user accounts (LDAP or SAML 2.0), roles can be managed locally or by group/role membership defined by the provider. When using provider-defined membership, each Develocity role can be mapped to one external group/role.
|
Custom roles: You can create custom roles to meet specific security requirements by navigating to . |
Custom Roles
Configure via the User Interface
To create and manage custom roles in the Develocity UI:
-
Log in to Develocity as a user with the Administrator role.
-
Navigate to .
-
Select Add Role to create a new role.
-
Enter a name and description for the role.
-
Select the desired permissions for the role.
-
Click Save to store the role.
-
Click Apply in the upper-right corner to activate the changes.
|
Changes to access control settings may take up to 20 minutes to propagate through the various components of Develocity. |
Configure via Unattended Configuration
If you are managing Develocity using a GitOps or automated workflow, you can define the global settings using Unattended Configuration. Depending on your deployment strategy, you can provide these settings either as Integrated configuration within your values.yaml or as a Standalone configuration file.
version: 15
auth:
anonymousPermissions:
- viewScan
- publishScan
- predictiveTestSelection
external: null
projects:
acceptAnonymousProjects: true
enabled: false
roles:
acme-role:
assignToNewExternalUsers: false
description: ACME example role
displayName: ACME Role
identityProviderAttributeValue: null
permissions:
- publishScan
Deployment Templates
Download the appropriate YAML template to begin your infrastructure configuration.
For Develocity versions 2025.3 and prior, see the 2025.2 Administration Guide or the 2025.3 Administration Manual.
| Cluster Deployment |
Example template for cluster orchestration. |
| Standalone Deployment |
Example template for standalone setup. |
|
Pre-deployment Checklist
See Unattended Configuration for details. |