Granular Permissions for Alerting and Protect
We're thrilled to announce a major granularity enhancement to Role-Based Access Control (RBAC) in Kentik. Gone are the days of broad, level-based access for Kentik Alerting and Protect. Build custom roles to define exactly who can create, view, update, or delete your critical alert policies, notification channels, and DDoS mitigations.
What's New?
We've rolled out a comprehensive set of permissions and custom roles specifically for Alerting and Protect. This update moves these modules into our modern RBAC framework, replacing the legacy user-level system for these features.
You can now create custom roles with specific permissions for:
- Alerts: Control who can read, acknowledge, or clear alerts.
- Alerting Policies: Manage permissions for creating, reading, updating, and deleting policies.
- Notification Channels: Define who can create, read, and update notification channels.
- DDoS Mitigation: Assign precise control over who can create, view, start, stop, and delete mitigations.
- BGP Announcements: Manage who has the ability to view or withdraw BGP announcements.
Why It Matters
This is a huge step forward for security and operational efficiency. By creating custom roles, you can ensure your team members have exactly the access they need to do their jobs.
- Enforce Least Privilege: Grant NOC operators the ability to acknowledge alerts without letting them change policies.
- Delegate with Confidence: Allow your network security team to manage mitigations without giving them full administrator access to your entire Kentik account.
- Streamline Workflows: Create roles like "Mitigation Authors" or "Alerting Policy Viewers" to match your team's specific responsibilities.
Take control of your user permissions today!
Ready to fine-tune your team's access? Administrators can head over to the Manage RBAC Roles page in your Organization Settings. From there, you can click "+ Create a Role" to start building your own custom roles with these powerful new permissions!
Your existing permissions within Alerting and Protect were all migrated to this new RBAC schema and existing role access will be unaffected by this update.
We're excited to see how you use these new controls to secure and streamline your network operations. As always, let us know if you have any feedback!