{"_id":"56cb80a4c675f50b00a4b826","__v":4,"category":{"_id":"56c7bab4606ee717003c4766","project":"56c35c56c0c4630d004e864c","__v":18,"pages":["56c7c193f9aa3b0d00c8458f","56cb80a4c675f50b00a4b826","56cb83859f4ae20b00644f1f","56cb853a245b841300806f82","56cb863c32011d2500681925","56cb88a4245b841300806f8b","56cb9915245b841300806fa7","56cb9a079f4ae20b00644f48","56cb9b5bc675f50b00a4b859","56cba5929f4ae20b00644f5d","56cba5c5d5c6241d00ef5e93","56cbab9c9f4ae20b00644f76","56cbad69c675f50b00a4b881","56cbb060d5c6241d00ef5ebb","56cf3c4d6c5d7a13005ee88c","56cf3d0e287eb20b009f9ec7","56cf3d7c5267d70b00494c42","56cf3ee0287eb20b009f9ecd"],"version":"56c35c56c0c4630d004e864f","sync":{"url":"","isSync":false},"reference":false,"createdAt":"2016-02-20T01:00:36.607Z","from_sync":false,"order":0,"slug":"buzz-concepts","title":"Buzz Concepts"},"githubsync":"","version":{"_id":"56c35c56c0c4630d004e864f","project":"56c35c56c0c4630d004e864c","__v":8,"createdAt":"2016-02-16T17:28:54.864Z","releaseDate":"2016-02-16T17:28:54.864Z","categories":["56c35c57c0c4630d004e8650","56c7b9e5379b311700ed8fe3","56c7bab4606ee717003c4766","56c7bb3613e5400d001e8cbd","56cf3f5a5267d70b00494c4b","56cf3f866c5d7a13005ee894","56fd3956caad892200847bce","599da256e7742b002588bb02"],"is_deprecated":false,"is_hidden":false,"is_beta":false,"is_stable":true,"codename":"","version_clean":"0.5.0","version":"0.5"},"parentDoc":null,"project":"56c35c56c0c4630d004e864c","user":"56c39c05bc41330d009f25d7","updates":[],"next":{"pages":[],"description":""},"createdAt":"2016-02-22T21:41:56.311Z","link_external":false,"link_url":"","sync_unique":"","hidden":false,"api":{"results":{"codes":[]},"settings":"","auth":"required","params":[],"url":""},"isReference":false,"order":0,"body":"The diagram below shows the relationship between these key objects:\n[block:image]\n{\n  \"images\": [\n    {\n      \"caption\": \"\",\n      \"image\": [\n        \"https://files.readme.io/6YeRJ9MmQzGsgCA3UiZG_accounts%20users%20roles%20permissions.png\",\n        \"accounts users roles permissions.png\",\n        \"463\",\n        \"361\",\n        \"#75574b\",\n        \"\"\n      ]\n    }\n  ]\n}\n[/block]\n\n[block:api-header]\n{\n  \"type\": \"basic\",\n  \"title\": \"Accounts\"\n}\n[/block]\nBuzz supports multi-tenant SaaS usage through the establishment of [Accounts](doc:accounts) that separate access for most objects. Outside of Users enabled as [Super Users](doc:super-users) all actions within Buzz are restricted to the scope of the Account in which the requesting user exists.\n\nOnly Super Users or Multi-Account users can create or edit Accounts.\n[block:api-header]\n{\n  \"type\": \"basic\",\n  \"title\": \"Users\"\n}\n[/block]\nEvery action in Buzz is completed by a [User](doc:users). Users may be set as Super Users, for access across Accounts, but only a Super User can create or edit another Super User.\n[block:api-header]\n{\n  \"type\": \"basic\",\n  \"title\": \"Roles\"\n}\n[/block]\nEvery User must be assigned a [Role](doc:role), which determines the User’s rights to read, edit, write and delete Objects. A Role is defined by a series of Permissions, each of which corresponds to an Object.\n\nGlobal Roles are created by the system administrator and are available to all Accounts. The only reason to create a Role other than the global ones is if you need different or more granular permissions for certain objects than what is provided by the Global Roles. In these cases, you can create your own Roles that inherit permissions from one of the Global Roles.\n[block:api-header]\n{\n  \"type\": \"basic\",\n  \"title\": \"Permissions\"\n}\n[/block]\nPermissions are defined by the Object name and a 4-bit operator corresponding to read, create, update, and delete privileges, respectively.\n[block:parameters]\n{\n  \"data\": {\n    \"h-0\": \"Action\",\n    \"h-1\": \"Read\",\n    \"h-2\": \"Create\",\n    \"h-3\": \"Update\",\n    \"h-4\": \"Delete\",\n    \"0-0\": \"Value\",\n    \"0-1\": \"1\",\n    \"0-2\": \"2\",\n    \"0-3\": \"4\",\n    \"0-4\": \"8\"\n  },\n  \"cols\": 5,\n  \"rows\": 1\n}\n[/block]\nIf a Permission is set to 1, the User enabled can only read that type of object. If set to 3, the User can Read and Create the object (1+2). When a Permission is set to 15 then have full rights to the object (1+2+4+8). Examples:\n[block:parameters]\n{\n  \"data\": {\n    \"h-0\": \"Object\",\n    \"h-1\": \"Value\",\n    \"h-2\": \"Description\",\n    \"0-0\": \"advertiser\",\n    \"0-2\": \"User can read, create, and update advertisers, but not delete them\",\n    \"0-1\": \"7\",\n    \"1-0\": \"campaign\",\n    \"1-2\": \"User has full access to campaigns\",\n    \"1-1\": \"15\",\n    \"2-0\": \"line_item\",\n    \"2-2\": \"User can read and create line_items, but cannot edit or delete them\",\n    \"2-1\": \"3\",\n    \"3-0\": \"segment\",\n    \"3-2\": \"User cannot perform any action on segments\",\n    \"3-1\": \"0\"\n  },\n  \"cols\": 3,\n  \"rows\": 4\n}\n[/block]","excerpt":"","slug":"accounts-users-roles-permissions","type":"basic","title":"Accounts, Users, Roles, Permissions"}

Accounts, Users, Roles, Permissions


The diagram below shows the relationship between these key objects: [block:image] { "images": [ { "caption": "", "image": [ "https://files.readme.io/6YeRJ9MmQzGsgCA3UiZG_accounts%20users%20roles%20permissions.png", "accounts users roles permissions.png", "463", "361", "#75574b", "" ] } ] } [/block] [block:api-header] { "type": "basic", "title": "Accounts" } [/block] Buzz supports multi-tenant SaaS usage through the establishment of [Accounts](doc:accounts) that separate access for most objects. Outside of Users enabled as [Super Users](doc:super-users) all actions within Buzz are restricted to the scope of the Account in which the requesting user exists. Only Super Users or Multi-Account users can create or edit Accounts. [block:api-header] { "type": "basic", "title": "Users" } [/block] Every action in Buzz is completed by a [User](doc:users). Users may be set as Super Users, for access across Accounts, but only a Super User can create or edit another Super User. [block:api-header] { "type": "basic", "title": "Roles" } [/block] Every User must be assigned a [Role](doc:role), which determines the User’s rights to read, edit, write and delete Objects. A Role is defined by a series of Permissions, each of which corresponds to an Object. Global Roles are created by the system administrator and are available to all Accounts. The only reason to create a Role other than the global ones is if you need different or more granular permissions for certain objects than what is provided by the Global Roles. In these cases, you can create your own Roles that inherit permissions from one of the Global Roles. [block:api-header] { "type": "basic", "title": "Permissions" } [/block] Permissions are defined by the Object name and a 4-bit operator corresponding to read, create, update, and delete privileges, respectively. [block:parameters] { "data": { "h-0": "Action", "h-1": "Read", "h-2": "Create", "h-3": "Update", "h-4": "Delete", "0-0": "Value", "0-1": "1", "0-2": "2", "0-3": "4", "0-4": "8" }, "cols": 5, "rows": 1 } [/block] If a Permission is set to 1, the User enabled can only read that type of object. If set to 3, the User can Read and Create the object (1+2). When a Permission is set to 15 then have full rights to the object (1+2+4+8). Examples: [block:parameters] { "data": { "h-0": "Object", "h-1": "Value", "h-2": "Description", "0-0": "advertiser", "0-2": "User can read, create, and update advertisers, but not delete them", "0-1": "7", "1-0": "campaign", "1-2": "User has full access to campaigns", "1-1": "15", "2-0": "line_item", "2-2": "User can read and create line_items, but cannot edit or delete them", "2-1": "3", "3-0": "segment", "3-2": "User cannot perform any action on segments", "3-1": "0" }, "cols": 3, "rows": 4 } [/block]