Organization roles are available on the Pro plan and above. Some feature roles and capabilities require the Enterprise plan.
For granular, feature-by-feature restrictions (app allowlists, node denylists, concurrency limits), see Custom User Roles. That is a separate, complementary system that restricts what composable roles grant.
How it works
Union of permissions
A user with
{Member, Analytics, Templates} can do everything Member, Analytics, and Templates allow. Revoking one role does not remove permissions granted by another.Member is implicit
Every org member automatically holds Member. It is not shown in the Manage Roles picker and cannot be removed without removing the user from the org.
Scopes are independent
Organization roles apply across the org. Team roles apply inside a single team. A user can be a Team Admin on one team and a Team Member on another.
Admin vs Feature roles
Admin roles (Admin, Manager) grant broad authority. Feature roles (Security, Developer, Analytics, Templates) grant scoped access to one area.
Organization Roles
Admin
Full control: billing, SSO, members, and every feature area.
Manager
Member operations, credentials, analytics, and templates. No billing or security.
Member
Implicit baseline. Use agents, skills, flowbooks, and personal credentials.
Security
Permission groups, app policies, AI model access, and Gumstack security.
Developer
Gumstack servers and tools. Requires Gumstack on the org.
Analytics
Organization analytics, usage, and data export.
Templates
Curate the organization template library.
Admin
Role ID:
admin · Group: Admin · Scope: OrganizationCan access
- Billing, subscription, and credit limits
- SSO, SAML, and SCIM
- All member operations
- Organization credentials
- Team access and team settings
- Audit logs
- AI model access, app policies, permission groups
- Analytics, usage, and data export
- Organization template library
- Full Gumstack access (when enabled)
Can assign
Admin, Manager, Security, Developer, Analytics, Templates.
Manager
Role ID:
manager · Group: Admin · Scope: OrganizationCan access
- Invite, remove, and manage members
- Organization credentials
- Analytics, usage, and data export
- Organization template library
Can assign
Analytics, Templates, Member.
Member
Role ID:
member · Group: Feature · Scope: Organization and Team · Baseline: YesCan access
- Create and use agents, skills, flowbooks, and custom operators
- Read organization metadata
- Create teams
- Manage personal credentials
- Leave the organization or a team
Can assign
Nothing.
Security
Role ID:
security · Group: Feature · Scope: Organization · Plan: EnterpriseCan access
- Custom User Roles / permission groups
- App Policies
- AI Model Access Controls
- Gumstack analytics, tools, servers (on Gumstack-enabled orgs)
Can assign
Developer.
Developer
Role ID:
developer · Group: Feature · Scope: Organization · Requires: GumstackCan access
- Gumstack servers and tools
- Gumstack analytics for their own servers and tools
- Standard content (agents, skills, flowbooks, custom operators) via Member
Can assign
Nothing.
Analytics
Role ID:
analytics · Group: Feature · Scope: Organization · Plan: EnterpriseCan access
- Organization analytics dashboard
- Usage limits and credit consumption
- Data export
Can assign
Nothing.
Templates
Role ID:
templates · Group: Feature · Scope: OrganizationCan access
- Approve, reject, and delist template submissions
- Manage the organization template gallery
- Control template visibility across the organization
Can assign
Nothing.
Team Roles
Teams use a simpler two-role system.Team Admin
Role ID:
admin (team scope) · Scope: TeamCan access
- All team content (agents, flowbooks, skills, custom operators)
- Team credentials
- Team analytics
- Team membership
Can assign
Team Admin, Team Member.
Team Member
Role ID:
member (team scope) · Scope: Team · Baseline: YesCan access
Read access to team content.
Can assign
Nothing.
Organization ceiling: org Admins hold
organization:manage_team_access, which lets them manage team memberships and team roles on every team in the organization, regardless of their team-level role. This is how org admins unblock access issues.Managing Roles
Roles are assigned and revoked individually from the Manage Roles sheet. You pick the exact combination of roles the user should hold. This is not a promote or demote action.
Open the members page
Go to Organization Members or a team’s Members tab.
Open Manage Roles
Click the three-dot menu next to the member and choose Manage Roles. The sheet opens with every role the member currently holds pre-selected.
Adding a new member with roles
Pre-assign composable roles when you invite someone so they land with the right permissions as soon as they accept.
- Roles is a multi-select. Every invitee gets Member implicitly; pick any additional roles your own role lets you assign.
- User Permission Group picks the Custom User Role that applies subtractive restrictions on top of the composable roles. The default is General.
- Teams adds the invitee to one or more teams.
Best practices
Start minimal, then layer on
Start minimal, then layer on
Every user starts as Member automatically. Add the narrowest additional roles that match their responsibilities. You can always add more later.
Prefer feature roles over Manager or Admin
Prefer feature roles over Manager or Admin
If someone only needs analytics visibility, grant Analytics, not Manager. If they only curate templates, grant Templates. Keep the high-authority list short.
Use Security instead of Admin for guardrails
Use Security instead of Admin for guardrails
Permission groups, app policies, and AI model access no longer require Admin. Grant Security so platform and security teams can own guardrails without billing or SSO.
Review role assignments quarterly
Review role assignments quarterly
Composable roles make it easy to accumulate extras. Run a quarterly review and remove roles that are no longer needed.
How permissions resolve
When someone takes an action, Gumloop checks three things. The action goes through only if all three agree.1. Roles
The union of everything your composable roles grant at the relevant scope (organization or team). This is the ceiling on what you can do.
2. Item sharing
For a specific agent, flowbook, or skill, the owner can grant you Editor, Viewer, or Use only. Sharing overrides the default per item.
3. Permission group
Your Custom User Role can subtract from what roles and sharing allow. For example, it can block certain apps or nodes.
Role Comparison
Users with multiple roles get the union of the “Yes” columns.| Capability | Admin | Manager | Security | Developer | Analytics | Templates | Member |
|---|---|---|---|---|---|---|---|
| Billing and subscription | Yes | No | No | No | No | No | No |
| SSO / SAML / SCIM | Yes | No | No | No | No | No | No |
| Add and remove members | Yes | Yes | No | No | No | No | No |
| Assign roles | All | Analytics, Templates, Member | Developer | No | No | No | No |
| Audit logs | Yes | No | No | No | No | No | No |
| AI model access controls | Yes | No | Yes | No | No | No | No |
| App policies | Yes | No | Yes | No | No | No | No |
| Permission groups (Custom User Roles) | Yes | No | Yes | No | No | No | No |
| Organization credentials | Yes | Yes | No | No | No | No | No |
| Org analytics, usage, data export | Yes | Yes | No | No | Yes | No | No |
| Manage templates | Yes | Yes | No | No | No | Yes | No |
| Create agents, skills, flowbooks, custom operators | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Create teams | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Gumstack access (with Gumstack) | Yes | No | Yes | Yes | No | No | No |
Related Resources
Custom User Roles
Permission groups that restrict what composable roles grant.
App Policies
Allow or block specific apps for users.
AI Model Access Controls
Restrict which AI models users can call.
Audit Logging
Track every administrative action.
Teams
Group users and content for shared access.
