Permission management guide

Effective permission management is key to achieving both security and collaboration efficiency. You can establish a systematic permission management strategy using Alpacon’s IAM (Identity and Access Management) features.

For more details, see IAM overview.


Role-based permission system

Alpacon provides three roles to manage user permissions hierarchically.

Permissions by role

User (regular user)

  • Permission scope: Access and use of assigned resources
  • Key features:
    • Access servers in groups they belong to
    • Control servers via Websh
    • Manage their own profile and settings
  • Applicable to: General team members, developers, operators

Staff (administrator)

  • Permission scope: User permissions + user and group management
  • Key features:
    • Invite users and manage accounts
    • Create groups and manage members
    • Register servers and change settings
    • Manage some workspace settings
  • Applicable to: Team leaders, project managers

Superuser (super administrator)

  • Permission scope: Staff permissions + highest system-wide administrative privileges
  • Key features:
    • Manage all users and groups
    • Manage all workspace settings
    • Manage billing and subscriptions
    • Access audit logs
  • Applicable to: System administrators, CTO, security officers

For more details, see User management.


Group-based permission management

Using groups allows you to efficiently manage permissions by logically separating users and servers.

Group design strategies

1. Team-based group structure

Create groups based on your organization’s team structure.

Example:

  • Backend Team: Backend server access
  • Frontend Team: Frontend and build server access
  • DevOps Team: All infrastructure server access
  • Data Team: Database and analytics server access

2. Environment-based group structure

Separate access permissions based on server environments.

Example:

  • Production Group: Production servers (restricted access)
  • Staging Group: Staging servers
  • Development Group: Development servers (open access)

3. Project-based group structure

Manage servers and personnel by project.

Example:

  • Project A Team: Project A related servers
  • Project B Team: Project B related servers
  • Shared Infrastructure: Common infrastructure servers

For more details, see Groups overview.


Principle of least privilege

Enhance security by granting users only the minimum permissions necessary to perform their tasks.

Implementation methods

1. Limit use of default group

  • Only register servers requiring common access in the Alpacon users default group
  • Separate sensitive servers into dedicated groups
  • New users start in the default group, with additional groups assigned as needed

2. Minimize roles

  • Most users should start with the User role
  • Grant Staff role only to those performing actual administrative tasks
  • Restrict Superuser role to a minimal number of people (2-3)

3. Regular permission reviews

  • Review user permissions and group memberships quarterly
  • Immediately revoke permissions for departed employees or role changes
  • Deactivate long-unused accounts

Server access control

Enhance security by designating which groups can access each server.

Access control scenarios

Protecting production servers

Group: Production-Access
- Members: Senior Engineers, DevOps Team
- Servers: Production Web Server, Production DB Server

Regular developers are restricted from direct access to production servers

Separating development environments

Group: Dev-Team-A
- Members: Team A developers
- Servers: Team A dev server, shared dev DB

Group: Dev-Team-B
- Members: Team B developers
- Servers: Team B dev server, shared dev DB

Each team can only access their own development servers

For more details, see Server connection.


Activity monitoring and auditing

Track user activities to prevent security incidents and support post-incident analysis.

Monitoring targets

User activity logs

You can check each user’s activity history:

  • Login time and IP address
  • Server access history
  • Configuration change history
  • Task success/failure status

For more details, see User detail - Activity tab.

Server access history

You can check the history of users and groups that accessed each server:

  • Access records by system user
  • Access records by system group

For more details, see Server detail - Access tab.

Command execution history

You can check the record of commands executed on servers:

  • Execution time and user
  • Command content and results

For more details, see Server detail - Activity tab.


Permission management checklist

A checklist for effective permission management.

Initial setup

  • Design and create groups matching your organizational structure
  • Assign appropriate servers to each group
  • Determine roles (User/Staff/Superuser) for each user
  • Place users in appropriate groups

Operations phase

  • Grant minimum permissions when registering new users
  • Assign new servers only to appropriate groups
  • Allow access to sensitive servers only to restricted groups
  • Minimize server list in default group (Alpacon users)

Regular reviews

  • Review user permissions quarterly (roles and group memberships)
  • Immediately deactivate or delete accounts of departed employees
  • Check and take action on long-unused accounts
  • Review appropriateness of group structures
  • Identify abnormal behavior patterns in activity logs

Security enhancements

  • Restrict production server access to Senior level and above
  • Limit Superuser role to 2-3 people
  • Consider dual approval process for critical operations
  • Provide regular security training and share guidelines