Manage Groups

Security Requirements and Controls

LogScale's group management system enables organizations to efficiently control user permissions by creating and managing groups of users with specific access levels and roles across repositories and views. Organizations can create new groups, assign permissions, manage user memberships either directly or through external system synchronization, and modify group roles as needed, with the requirement that users must have the "Manage Users" permission or be root users to perform these administrative tasks.

Assigning permissions to individual users in larger organizations can be a cumbersome task. LogScale allows you to create groups and either manage user memberships directly in LogScale or by synchronizing with an external system.

Either way, you need to create groups in LogScale first.

Then you need your group to have users and permissions assigned to it. Any user who is assigned the Change user access permission can assign permissions to groups for a repository.

Note

You need to be a root user or have the Manage Users on self-hosted installations to create groups and assign them users and permissions.

Note

If you intend to administer access to repositories and views centrally by an organization owner or root only, be sure not to grant the Change user access permission to anyone. In practice, this means removing the permission from all roles thus not allowing any users to go to a repository or view and add another user or group directly.

Create New Groups
Security Requirements and Controls
  1. Click user menu icon and select Organization Settings. In Users and permissionsGroups.

  2. Click +Add... to create a new group.

  3. Enter a group name, such as "Operations", and select the permission levels to apply to the new group. (See all types described at Permission levels.) Then click Next:

    Screenshot of the LogScale 'Create Group' dialog showing the initial configuration interface. The form displays a text field for entering the group name (such as 'Operations') and a selection panel for choosing permission levels to apply to the new group. Permission levels likely include options for organization-level access, repository and view access, and other security categories. At the bottom of the dialog is a 'Next' button that advances to the repository selection screen. This interface is the entry point for defining a new user group and its basic permission framework.

    Figure 39. Create Groups


  4. For the Repository and view level, choose whether the group should apply a role to a selection of repositories and views or to all current and future repositories and views. Select the preferred repositories or views and click Next.

  5. Select a role for the new group, for example, Admin, then click Create group. You now have an empty group with no users assigned but the Admin role is given to all the selected repositories or views:

    Screenshot of the LogScale interface showing a newly created group with no users assigned. The interface displays the group details page with an empty Users list and the assigned Admin role (or whichever role was selected) applied to the previously selected repositories or views. This screen appears immediately after completing the group creation process by clicking 'Create group' and serves as the starting point for adding users to the group or configuring role exceptions for specific repositories.

    Figure 40. New Group Created


    Afterwards, the added users are in the Users list.

  6. If you have a few repositories that need to be treated differently, click Exceptions to apply different permissions to selected repositories.

To get add a group through your own application, use the addGroup() mutation of the GraphQL API.

Note

Only users who have accepted the email invitation and completed the first log-in process can be added to a group.

Add Users to Groups

You can assign users to a group from the user interface. Below are the steps to do this:

  1. Click on the user menu icon and select Organization Settings. Under the Users and permissions heading, click Groups.

  2. Next, select a group to which you want to add users. In the group panel, click the Users tab.

  3. On the right will be a button labeled, + Add.... Click it and then a box will appear with a list of users, like the one in the screenshot below:

    Screenshot of the LogScale 'Assign Users to Groups' dialog showing a user selection interface. This popup appears after clicking the '+ Add...' button in the Users tab of a group management page. The interface displays a dropdown or selection field where administrators can choose which existing user to add to the current group, along with a 'Save' button to confirm the assignment. This dialog enables administrators to populate groups with members who will automatically inherit all permissions and access rights assigned to the group, supporting efficient role-based access control management.

    Figure 45. Assign Users to Groups


  4. Select the user you want to add to the group. You may add more than one. Ones that are already added will remain in the group.

    When you're finished, click Save. The users you selected will then be added and shown under the Users tab for the group.

To add a user with your own program or from the command-line, see the addUsersToGroup() page in the GraphQL API documentation.

Grant permissions to specific assets to groups
Security Requirements and Controls
  1. Click on the user menu icon and select Organization SettingsGroups.

  2. Click the name of the group to view or edit from the list.

  3. Click the Asset permissions tab. The list shows all available assets for the repositories and views the group can access. Use the filter buttons to narrow the list of assets.

    Screenshot of the LogScale Asset permissions interface showing a filterable list of all assets to which a selected group has access. The screen displays the Asset permissions tab with asset names, their types, associated repositories or views, and the specific permissions granted to the group for each asset. Filter buttons at the top allow administrators to narrow the displayed assets by various criteria, while a prominent '+Assign asset' button provides the entry point for granting additional permissions.

    Figure 46. Asset permissions list for group


  4. Click +Assign asset.

  5. Select the asset to give the group access to and click Next. Use the filter buttons to limit the list of assets.

    Screenshot of the 'Select asset to assign' dialog showing a filterable list of available assets that can be assigned to a group. The interface includes filter buttons at the top to narrow down assets by type or location, a scrollable list of assets organized by repository or view in the main area, and a 'Next' button at the bottom to proceed with the permission assignment workflow. This dialog appears after clicking '+Assign asset' in the Asset permissions tab and allows administrators to precisely select which specific asset will receive custom permission settings for the entire group.

    Figure 47. Select asset to assign


    If the asset is in a repository to which the group does not have read access, you see a dialog when setting the additional asset permissions that the group will be granted read permissions automatically to ALL assets in the view.

    If the group already has read access to the view where the asset is located, you will not see this dialog.

    Screenshot of a warning dialog that appears during the asset permission assignment process when the selected asset belongs to a repository or view to which the group does not currently have read access. The dialog alerts administrators that proceeding will automatically grant the group read access to ALL assets in that view, not just the selected asset. This critical notification requires administrator acknowledgment and understanding of the broader permission implications before specific asset permissions can be assigned.

    Figure 48. Select asset to assign when group has no read access to view


    When granting permission to an asset in a repository or view the group does not have permissions to, you are required to acknowledge that by granting permission, the group is automatically given read access.

  6. Select the permission(s) to assign to the group for this asset. Click Next and then Confirm.

    If assigning permissions to an asset in a view for which the group does not have read access, you must check the box that you understand that the group will be granted read permission to the view before you can click Confirm.

Direct asset permission assignments are automatically removed from a group if that group loses all access to the view.