Create Role
Summary
Create a Role to represent a group of users or service accounts that will receive specific permissions in a policy.
Description
A Role is a logical container that defines who will receive access to a Data Element within a policy. Roles do not hold permissions on their own. Instead, they become meaningful when paired with Data Elements and permissions in policy rules. Roles allow you to centralize and standardize access behavior across multiple users by grouping identities into functional categories such as Data Analysts, Customer Support, or Payment Service Applications.
Purpose
To establish an authorization boundary that policies can reference when granting or restricting access to sensitive data. Roles allow policies to express business intent clearly. For example, This group may tokenize credit card data,” or Only this role may unprotect values.
Prerequisites
None.
Roles can be created at any time, although they become active only after a Member Source is assigned in the next step.
Inputs
Typical inputs when creating a Role include:
- Role name.
- Description of its business purpose.
- Assignment mode. For example, manual assignment versus assignment from a Member Source.
These inputs help clearly define the role’s identity and intended usage in policy rules.
Outcome
A Role is created and ready to populate with members. It can now be linked to a Member Source and later associated with Data Elements and permissions within a policy.
Conceptual Examples
- Example 1: Protection Role
- A role named
r_cc_protectis created for payment‑processing applications responsible for protecting credit card numbers using tokenization before storage.
- A role named
- Example 2: Limited‑Access Role
- A role named
r_customer_support_maskedis created for agents who may view masked customer data but cannot unprotect or view clear‑text values.
- A role named
Tips
- Keep role names short but descriptive. For example
r_<domain>_<capability> - Use separate roles for different permission levels, such as protect versus unprotect, to keep policies clean and auditable.
- Avoid putting too many responsibilities in a single role. For example, smaller, purpose‑specific roles simplify long‑term maintenance.
- If possible, design roles around business functions and not individuals, to avoid maintenance churn.
- Note this can be created with the option of ALL_USERS.
Feedback
Was this page helpful?