Create a new Team

The Teams for a Project can be managed on the Teams page:

First Step is to create the Team

  • In your project, goto Manage Project and select Teams in the left nav
  • To Create a new Team click 'Create Team'

Second Step is to add Roles to the team

  • Under Teams, click on your newly created team
  • Select Roles
  • Click '+Grant Role'
  • Select the Roles you want for the Team. Note: if you do not see the Role(s) needed for your Team you will need to create the Roles.

Let's take a look at the list of the default roles:

Roles Description
Collaborator “CONNECT”, “READ”, “CREATE_SUBOBJECTS”, “UPDATE”, “DELETE”
Connector “CONNECT”
Consumer "CONNECT”, “READ”
Contributor “CONNECT”, “READ”, “CREATE_SUBOBJECTS”
Editor “CONNECT”, “READ”, “UPDATE”, “DELETE”
Impersonator “IMPERSONATE”
Manager “CONNECT”, “READ”, “CREATE_SUBOBJECTS”, “UPDATE”, “DELETE”, “MODIFY_PERMISSIONS”, “MODIFY_CREDENTIALS”
Owner “CONNECT”, “READ”, “CREATE_SUBOBJECTS”, “UPDATE”, “DELETE”, “MODIFY_PERMISSIONS”, “GRANTAUTH”, “MODIFY_CREDENTIALS”
Project Member “CONNECT”, “READ”

List of Permissions:

Permission Description
CONNECT The principal can connect to a Permissioned. This permission supercedes all others. If not granted, the principal is not aware of the Permissioned and can perform no operations against it.
READ The principal can read the Permissioned.
CREATE_SUBOBJECTS The principal can create objects that are contained within the Permissioned.
UPDATE The principal can update the Permissioned.
DELETE The principal can delete the Permissioned
MODIFY_PERMISSIONS The principal can assign, revoke and modify permissions against the Permissioned.
GRANTAUTH The principal can assign impersonating around another principal. This is solely used for Authentication Grants as a means of describing who can create new grants for a principal.
MODIFY_CREDENTIALS The principal can modify the credentials for another principal. This is solely used to describe rights against Identities.
IMPERSONATE The principal can impersonate a target principal. As such, when the principal is signed on, they can take on the authentication credentials of the target principal.