About user roles and permissions
This section provides details about the permissions available to each role on the Veracode Platform. To see which roles are often relevant to different users in your organization, see Common roles for user accounts.
To grant access to the Veracode APIs, administrators assign the necessary API roles to users with an API service account. To see the roles assigned to your account, you can click Your Account from the top navigation menu in the Veracode Platform.
Do not share your account credentials for the Veracode Platform with other users.
Administrator
Can manage users, teams, and SAML settings. Administrator access can be granted either by Veracode Technical Support or, if your organization uses SSO with IdP data preferred, through a SAML assertion. A user with the Administrator and eLearning roles is considered an eLearning administrator and can manage Veracode eLearning administration tasks.
Analytics Creator
Can access Veracode Analytics, where the user can view scan metrics of applications in the user's team portfolio, and create or edit custom reports.
Creator
Can create, edit, and delete application profiles, as well as request and delete scans for applications that belong to the user's teams. Can only create application profiles for teams in which the user with the Creator role is a member. Can assign applications to teams. Can allow next-day consultations for an application. Can schedule consultation calls for scan configurations. Can view the list of applications to which you have access. Can also promote a sandbox scan to a policy scan and delete sandbox scans. You can assign the Creator role for specific scan types or for all scan types. In addition, if your user account is restricted to specific scan types, you can only request scans of that type.
Delete Scans
Can delete scans.
eLearning
Can access Veracode eLearning courses, assessments, and/or the Knowledge Base.
Assigning a role to an eLearning user (learner) consumes one of your purchased Veracode eLearning seats when the learner launches a course. If a learner does not launch a course, you can assign the role to another user. You can only assign as many roles as you have purchased seats.
Executive
Can view Veracode Analytics and reports for all applications. Users with the Executive role must also have the eLearning role to access the Veracode eLearning summary reports. Can view all the applications. Can schedule consultation calls for policy scan results.
Free Trial Admin
Can edit users and teams in their organization. Can create up to nine additional users and four additional teams in the free trial organization. Can submit a support request. Can access DAST Essentials in the Veracode Platform. There can only be one free trial administrator in each free trial organization.
Free Trial User
Can edit their user account. Cannot add, edit, or delete users or teams in their organization. Can submit a support request. Can access DAST Essentials in the Veracode Platform.
Greenlight IDE User
Can access the Veracode Greenlight plugin in your IDE, perform Greenlight scans, and review Greenlight scan results. This role is only available to organizations that have active Veracode Greenlight subscriptions.
Mitigation Approver
Can approve mitigations for flaws. Can view the list of applications to which you have access.
Policy Administrator
Can access the Policies page, enabling the ability to create and edit policies, set default policies and notification rules, and assign different policies to applications. When assigned in combination with the Creator or Security Lead role, you can change policy assignments for individual applications using the application profile.
Reviewer
Can access reports and flaw details for applications that belong to the user teams, and propose mitigations, but cannot access the review modules page. Can review scan results and scan reports for sandboxes. Can view the list of applications to which you have access. Can schedule consultation calls for policy scan results.
Sandbox Administrator
Can create development sandboxes for scanning code in development for applications associated with the user account. For applications which the Sandbox Administrator can access, can edit or delete development sandboxes and propose mitigation comments.
You use the Sandbox Administrator role in addition to another role (Creator, Submitter, Reviewer, or Security Lead).
Sandbox User
Can create and edit development sandboxes that enable scanning code in development for applications that belong to the user teams. Can scan code within a development sandbox, delete their scan, review results of a sandbox scan, add comments, and propose mitigations. Can schedule consultation calls for sandbox scan results. You can promote the sandbox scan to a policy scan, which counts toward your policy compliance score, if you:
- Have the Sandbox User role with the Creator or Submitter role
- Have All Scan Types or Static Scan selected
Security Insights
Can access Veracode Analytics, where the user can view scan metrics of applications in the user's team portfolio and custom reports. To create or edit dashboards, you must have the Analytics Creator role.
Security Labs User
Can access the Veracode Security Labs interactive training labs.
Assigning this role to a Veracode Security Labs user consumes one of your purchased Security Labs seats. To see the number of remaining seats, select the Security Labs User help icon when assigning roles on the Admin page.
Security Lead
Can create, edit, and delete application profiles. Can view Veracode Analytics, reports, and flaw details for all applications. Can submit applications and approve scan requests made by Creators and Submitters. Can assign applications to teams. Can review all applications and scans, including receiving all notifications for these applications and scans, without any restrictions or team assignment limitations. Can allow next-day consultations for an application. Can schedule consultation calls. Can promote a sandbox scan to a policy scan.
You can assign the Security Lead role for all scan types or only for specific scan types. A scan type restricted assignment limits the type of scans you can create.
Submitter
Can request scans for applications that belong to the user's teams, has access to the review modules page, and can upload binaries. Can view the list of applications to which you have access. Cannot create, edit, or delete applications, or delete scans. If you are a vendor receiving a third-party scan request to submit a scan, you need to accept the third-party scan request first. Can promote a sandbox scan to become a policy scan. Can create, rename, and delete agents and regenerate agent tokens in Veracode Software Composition Analysis (SCA). Can schedule consultation calls for scan configurations.
You can assign the Submitter role for all scan types, or only for specific scan types. A scan type restricted assignment limits the type of scans you can submit.
Team Admin
Can manage users, including creating new users, resetting passwords, and updating roles. Can only view or manage users who are in the teams that the team admin manages and do not belong to any team that the team admin does not manage. Can add or remove team memberships from a user who is in one of the teams managed by the team admin. Cannot add users to teams that the team admin does not manage. Team admins cannot edit the roles for users who have the Administrator, Executive, Policy Administrator, Security Lead, Team Admin, or Workspace Administrator roles. Cannot create teams or business units, both of which require the Administrator role. When the administrator creates a user with the Team Admin role, the administrator assigns team membership to that user.
Vendor Manager
Can view the list of all third-party vendors for the organization. This role may not be available for your account.
Workspace Administrator
Can edit and delete workspaces in Veracode Software Composition Analysis. Can create, edit, and delete agents in a workspace. Can add teams to a workspace and remove them. Can manage rules in a workspace and view workspace reports. Can create and comment on issues. Can manage project settings.
Workspace Editor
Can create, edit, and delete agents in a workspace in Veracode Software Composition Analysis. Can manage rules in a workspace and view workspace reports. Can create and comment on issues. Can manage project settings.
Actions by role
The following tables show the actions that each role allows you to perform.
Action | Administrator | Creator | Delete Scans | Security Lead | Submitter |
---|---|---|---|---|---|
Create Application Profile | X | X | |||
Bulk Add Applications | X | ||||
Assign Application to Team | X | ||||
Request Manual, Static, or Pipeline Scan | X | X | X | ||
Request Discovery Scan | X | X | X | X | |
Delete Scans | X | X | X |
Action | Administrator | Creator | Executive | Reviewer | Security Lead |
---|---|---|---|---|---|
Comment on Static Results | X | ||||
View or Delete File Exchange Files | X | X | |||
Download Discovery Results | X | X | X | X | |
Download XML Results | X | X | X | ||
Download Discovery Site Lists | X | X | X |
Action | Executive | Mitigation Approver | Policy Administrator | Reviewer | Security Lead | Vendor Manager | Security Insights | Security Labs User | Analytics Creator |
---|---|---|---|---|---|---|---|---|---|
View Analytics | X | X | X | X | |||||
Edit Analytics | X | ||||||||
View Reports | X | X | X | ||||||
Access eLearning | X | ||||||||
Access Security Labs | X | ||||||||
Propose Mitigations | X | X | |||||||
Approve Mitigations | X | ||||||||
Create Policies | X | ||||||||
View Vendors Page | X | ||||||||
Publish Results | X |
To be able to access eLearning summary reports, users with the Executive role must also have the eLearning role. Users who are members of the team associated with the application can accept third-party terms or scan requests. Users with both the Reviewer and Security Insights role can view analytics only for the teams for which they have access.
Dynamic Analysis roles
The following tables summarize the Dynamic Analysis permissions available to certain roles on the Veracode Platform.
Action | Administrator | Creator | Submitter | Reviewer | Security Lead |
---|---|---|---|---|---|
Request/Create/ Submit Analysis | X | X | X | X | |
Upload or Enter URLs | X | X | X | X | |
Import URLs From Applications | X | X | X | X | |
Turn on Application Auto-Linking | X | X | |||
Manually Link Results to Application | X | X | X | X | |
Assign Teams | X | X | X | X |
Action | Creator | Submitter | Reviewer | Security Lead |
---|---|---|---|---|
Edit Analysis and Schedule | X | X | X | |
Edit Scan Configuration | X | X | X | |
Add or Delete Scan from Existing Analysis | X | X | X | |
View Results | X | X | ||
View Status | X | X | X | X |
View Analysis Configuration | X | X | X | |
Delete Analysis | X | X | X | |
View Vulnerability Summary | X | X | X | X |
Sandbox capabilities
The following table summarizes the Sandbox permissions available to each role on the Veracode Platform.
Developers can create sandboxes within existing application profiles, and use them to submit the application code for analysis while still in development. Sandbox scans do not affect the developer's ability to run a formal policy scan of the application, and the results of the sandbox scans do not degrade the policy status or flaw metrics of the production version of the application.
Action | Creator | Submitter | Reviewer | Sandbox Administrator | Sandbox User | Security Lead |
---|---|---|---|---|---|---|
Create Sandbox Profile | X | X | X | X | ||
Delete Sandbox | X | X | X | |||
Create Policy Scan | X | X | X | |||
Submit Policy Scan | X | X | X | |||
Create Sandbox Scan | X | X | X | X | ||
Submit Sandbox Scan | X | X | X | X | ||
Review Scan Results | X | X | X | |||
Review Scan Reports | X | X | X |
Veracode Software Composition Analysis roles
Action | Mitigation Approver | Security Lead | Executive | Creator | Reviewer | Submitter | Workspace Administrator | Workspace Editor |
---|---|---|---|---|---|---|---|---|
View the SCA Portfolio Page | X | X | X | X | X | X | X | |
Create and Delete Applications | X | X | ||||||
Edit Applications | X | X | ||||||
Add Teams to Applications | X | X | ||||||
View All Applications | X | X | ||||||
View Specific Applications | X | X | X | X | ||||
Request SCA (Static) Scans | X | X | ||||||
Propose Mitigations | X | X | ||||||
Approve Mitigations | X | |||||||
View the Workspace Portfolio Page | X | X | X | X | X | X | ||
Create Workspaces | X | X | ||||||
Delete Workspaces | X | X | X | |||||
Edit Workspaces | X | X | X | |||||
Add Teams to Workspaces | X | X | X | |||||
View All Workspaces | X | X | ||||||
View Specific Workspaces | X | X | X | X | X | |||
Manage Projects | X | X | X | |||||
Link Projects to Applications | X | X | X | |||||
Manage Agent-Based Scan Rules | X | X | X | |||||
Manage Integrations | X | |||||||
Manage Agents | X | X | X | X | ||||
Ignore and Unignore Issues | X |
Custom roles
You can create custom roles that are specific to your organization. Custom roles define specific permissions you grant to users. For example, if you only want certain users to manage application profiles, submit scans, and manage teams, you can assign those specific permissions to a custom role and assign it to their accounts.
If you have the Administrator role, you create custom roles with the Identity REST API. After you create a custom role, you assign it to users in the same way you assign standard Veracode roles.
Use APIs with a user account
The Upload Using the Veracode Plugins permission is available to the Submitter role on the Veracode Platform.
The Create Application Using the Veracode Plugins permission is available to the Creator role on the Veracode Platform.
Permissions
Roles are comprised of different permissions that allow users to perform specific Veracode tasks. To view the permissions associated with specific roles, use the Identity REST API.
The following table lists the Veracode permissions, their types, if applicable, and whether they apply to user accounts or API service accounts. Some roles have permission types. In some cases there are seemingly similar permissions types: retrieve, retrieveTeamOnly, and retrieveOg, for example. Individuals would have retrieve, a Team Admin would have retrieveTeamOnly, and an Administrator would have retrieveOrg.
Permission name | Permission ID | Description | Permission type 1 | User accounts | API service accounts |
---|---|---|---|---|---|
adminApi | 0x014e6adb7efc421c9cb1823799e9efc0 | Access Admin API | X | ||
appPortfolio | 0x05570a3e9c2e4c46a441829c81c3d462 | Application portfolio | X | X | |
approveDynamicScans | 0xbc79c56687034b41b6dfe10fe4398beb | Approve Dynamic scans | X | ||
approveDynamicScansforVsa | 0x782ef05256344e51b6ccbd587aa9e2cc | Approve Dynamic scans for ISM | X | ||
approveMitigations | 0xdf6b8e1f1d484fa6a361745f38858745 | Approve or reject proposed mitigations | X | X | |
archerReports | 0xa8bedc08bdb441bbb7fcf00979413ca6 | Run Archer reports | X | X | |
assignAppToAnyTeam | 0xe12feb4a5ceb400ebcd73283b653a5d4 | Assign application to any team | X | X | |
assignAppToTeam | 0x39428ad134c64ede944929e7503a980b | Assign application to team | X | X | |
changeAppAssuranceLevel | 0xac1ec9a6fb7a45b1956611c46cf27170 | Change application assurance level | X | X | |
changeArcherName | 0x745b956f0af949a7919fe2c5f27c5dd8 | Change the Archer name of an application | X | X | |
createApplicationProfile | 0x14c846c13a3e4c7889b691c83b28410c | Create a new application | X | X | |
createCollection | 0xb6a26a817dde4545b5767c90ed3d505e | Create a collection | X | X | |
createCurriculum | 0xc8f6e9b48605484298502304b6d12440 | Create an eLearning curriculum | X | X | |
createLoginAccount | 0x433f78748c2f45fabc62ac4929d4343d | Create a login account | X | X | |
createPolicyScan | 0xc0d9a8fa2ef241928ea0b1ea15eca846 | Create a policy scan for an application | X | X | |
createSandbox | 0x3bb562948f6c48c98706dba408131105 | Create a sandbox in an application | X | X | |
createSandboxScan | 0x83ac81e991f549cb84dc1918def976f1 | Create a sandbox scan for an application | X | X | |
createTeam | 0x4607ca84b1204f0cba25c1f7ad2c23b1 | Create a team | X | X | |
createUserForTeam | 0x4e38d0e516d54619a3a053579e6b72f9 | Create user for team | X | ||
customReport | 0x27f060f4419f46eab0ca5369bcb33722 | Custom report | X | ||
dashboard | 0x41759f0acc984fbfa041f69f53addb08 | Dashboard | X | ||
deleteApplicationProfile | 0x6a32ef82a5c94f03992cfb3add2962f8 | Delete an application | X | X | |
deleteCollection | 0x0c3241989c13484f94d38ab864609574 | Delete collection | X | X | |
deleteDiscoveryScan | 0xfb7b506d81cf40d9ae08a0aa925e28ce | Delete Discovery scan | X | ||
deleteDynamicAnalysis | 0x117f645522084a3c989f3a67eb3ede32 | Delete a Dynamic Analysis | X | ||
deleteLoginAccount | 0xe014fb2eaebb450f9656e7bd4ac8556e | Delete login account | X | X | |
deleteModuleScan | 0x2f0dbe5deb774bc2b828f2af72f1eb64 | Delete module scan results | X | ||
deletePolicyScan | 0xaa3164f8f50949dabe771b713627a184 | Delete a policy scan | X | X | |
deleteSandbox | 0x580782bbe6124bd7800ca40ea8f73abb | Delete a sandbox in an application | X | X | |
deleteSandboxScan | 0x9d15b54e9a404ff6819f06dabe003934 | Delete a sandbox scan | X | X | |
deleteTeam | 0x310a1f9f1ba34593ac85d2076667dfe3 | Delete a team | X | X | |
deleteUserForTeam | 0xca8b638578f24d4caecedd4a037d4c17 | Delete a user for team | X | ||
downloadDiscoverySiteList | 0xd8571d042d9147ff99ad757e7a92bf52 | Download Discovery site list | X | ||
downloadScanReport | 0x87d41465dbd3433d8081beb14e71d52c | Download scan reports | X | ||
downloadScanReportXML | 0x325eb8cee6e54e24bbb511a91bbbe41b | Download scan report as XML | X | ||
downloadScript | 0xa051ffcb3b0e40aaa016f8ab437c0b34 | Download crawl and login script | X | ||
downloadSiteList | 0xf3c2dcda0b5146bb8482030fbc68602e | Download the site list for the scan | X | ||
dynamicAnalysisResultImport | 0x0199820209da49d8b19ff6313a4a8ef0 | Dynamic Analysis result import | X | X | |
editDynamicAnalysisAutoLinkAppOptions | 0x62876d2ba4ef4ea0a443a3a1828a34dc | Change application-related options for Dynamic Analysis auto-linking | X | ||
editLoginAccount | 0x6b2d4c7b1b2d479f90570422dccfa2a1 | Edit login account | X | X | |
editMVSAGateway | 0xd81d94e66d8448a996ac8040862e0680 | Edit ISM gateway | X | ||
editsamlsettings | 0x33107bd802da4ce387f09d971f2bcec2 | Edit account SAML settings | X | ||
editTeam | 0xe4f5ac1b39cb40cbbdbbf1e0fa111b56 | Edit team | X | X | |
eLearningMentor | 0xd9d4c7ff5c304bb7a4f8ee132aad2df4 | Access eLearning mentor content | X | ||
eLearningProfessor | 0x67161f66bfa640d68837bbb1cdce7a37 | Access eLearning professor content | X | ||
enableNextDayConsultation | 0xb4d240aebe774189ab9de232339d9cb6 | Enable applications for next-day consultations for creation and update | X | X | |
enableRemediationConsultation | 0x26c8bc11fdab4318a0c32aa535d92106 | Allow user to schedule remediation consultations | X | ||
enableUploadConsultation | 0x42eccdd89a5b4da3be0ccbe229c46206 | Allow user to schedule upload consultations | X | ||
expireApiCredentials | 0xbfc0cd11fdba4e119bc69e3e3edc304f | Expire another user's API credentials | X | ||
expireApiCredentialsForTeam | 0xd8348b80bded4cc399702925df0b356f | Expire another user's API credentials if on a managed team | X | ||
exportCustomData | 0x9619f30a27b2442e9234f17f53190801 | Export custom data | X | X | |
fileExchange | 0x2a1330f088eb42ffaf5d53af32888182 | Access file exchange | X | ||
generateWafRules | 0x1a3495d757854b7cb0094f82b78b66c8 | Generate WAF rules | X | ||
importApplicationProfiles | 0x2fca338e725d400db60c59b31026cb5f | Import application profiles | X | ||
linkApp | 0x256e3e779407437488ecd77d8d1c32c4 | Link to application | X | ||
lookerAnalyticsCreator | 0x4e6e2e118963441ca30d9c5d000af00a | Analytics creator | X | ||
lookerAnalyticsViewer | 0x85b2a15b7ac742aa9c10d78486e12ef7 | Analytics viewer | X | ||
maintainDynamicApplication | 0x9a2d6afd9ce545448a0caca7ff689643 | Maintain Dynamic application | X | ||
ManageApiCredentials | 0x5c7c544ba1f141ffa5472a855f9cfcb8 | Manage API credentials | generate , retrieve , retrieveOrg , retrieveTeamOnly , revoke , revokeOrg , revokeTeamOnly | X | X |
ManageBusinessUnit | 0x0964d8d2f21b4c4e87d1b669941c7c27 | Manage business units | create , retrieve , update , delete | X | X |
manageCustomCleanserManagement | 0x872f894c19064e759e0d3d42577afea0 | Change mitigation behavior for flaws mitigated by custom cleanser | X | ||
manageElearning | 0x91d55287841a4782879cf3ceae3ba351 | Manage account-level eLearning | X | X | |
ManageOrganization | 0x4ea02dea2313421caab07c4bf73f6978 | Manage organizations | retrieve , update | X | X |
manageScaBlacklist | 0x6fb96418e98e482699290337f8cb0a89 | Manage SCA component blacklist for policy | X | ||
ManageTeam | 0x5404cb69b2d440f994d353f20ee27209 | Manage teams | create , retrieve , retrieveTeamOnly , update , updateTeamOnly , delete | X | X |
ManageUser | 0xe3df1322630e4a45a86f65433b1acd3b | Manage users | create , createTeamOnly , retrieve , retrieveOrg , retrieveTeamOnly , update , updateOrg , updateTeamOnly , delete , deleteTeamOnly | X | X |
manageVendorContact | 0xe4bc952ddcd8435e94cdc1296e0ea1ca | Manage vendor contact requests | X | ||
navExternalAdmin | 0x3a75bc4a351547c0b8a8be374a19f41d | Navigation for external Administrator | X | ||
navExternalELearn | 0xeee90451836d422aab8036344bec11e2 | Navigation for external eLearning | X | ||
navExternalExecutive | 0x88e4425e74f240ccab58995c68430ab8 | Navigation for external Executive | X | ||
navSecurityInsightOnly | 0xab017d4a3a2140aa96466e84758bed3b | Navigation for Security Insight only | X | ||
optIntoVendorDirectory | 0x438ac44affc54fb5a0d99fafa14063b3 | Share your results in vendor directory | X | ||
policyManagement | 0xd956b69a8d2848319c17c3a9b0210f8a | Manage policies | X | X | |
portableScopeResultsAggregation | 0x7aa00f641c654ea19f3fb4707ec3495e | Retrieve cross-profile flaw identifiers in XML reports | X | X | |
promoteScans | 0x770b9a6b3b4544cc9e89b9a92227079e | Promote scan to policy sandbox | X | X | |
publishMitigatedRatings | 0x96af5c976e2b40dc81f780519d24df2d | Publish applications with mitigations | X | ||
publishResultsEnterprise | 0xcb20a688cc80416e847100ae9dbc75e7 | Publish results to enterprise | X | ||
readCollection | 0x8b09b959b25d411298a377a6edb5d806 | Read collections | X | X | |
reportingApi | 0xf01549ec6a0b4b3a81b9a77bb858a201 | Enable the Reporting API | X | X | |
requestDynamicAnalysis | 0x9cbd76badf5b43e9a15568f0a846fcc3 | Request a Dynamic Analysis | X | X | |
resultsApi | 0x71e0aca2a8e64f41bce2ede5566cd300 | Access Results API | X | ||
retrieveApiCredentialsForTeam | 0x2ba320ca8e164c0b8d9226f81a70cc61 | View another user's API ID and status if on a managed team | X | ||
retrieveTeamAsTeamAdmin | 0xf89dc1035afe4b9facc72cb8bca159fb | Retrieve a team as Team Admin | X | ||
retrieveUserForTeam | 0x81d4af60b38648b8b9d0af29b846d4dc | Retrieve a user for team | X | ||
scanWithGreenlight | 0xf13504c1a6e44bd28377130e0180b942 | Scan with Greenlight | X | X | |
securityLabs | 0xe384c5f0dcba4cdcbd70d626ac7d903d | Access Security Labs | X | ||
setAllowDepAsTopLevelModules | 0xcd701fb2ddc040e78af7f188d496b8cf | Set allow dependencies as top-level modules | X | ||
srcclrAccessAllWorkspaces | 0xfe22227694274b9eb5505f841776b405 | Navigate to all workspaces in SCA agent-based scanning | X | ||
srcclrCreateWorkspace | 0x48798a44f4dc477b82b7aa9728ef71cb | Create workspace in SCA agent-based scanning | X | ||
srcclrListPortfolioPage | 0xa06acaa1583840908a3246b653a88231 | View portfolio list page in SCA agent-based scanning | X | ||
srcclrManageAgents | 0xfc4323c12f774c08af600da555274d8d | Manage agents in SCA agent-based scanning workspace | X | ||
srcclrManageOrg | 0x29bd39f7bd504a0db4e22048f133f58c | Manage integration, agents, usage, and library catalog in SCA agent-based scanning | X | ||
srcclrManageWorkspaces | 0x1d1858e0dbb842a19a172a61c14c6e19 | Manage SCA agent-based scanning workspaces | X | ||
srcclrWorkspaceCommentIssues | 0xf41c4ef3618a43d597baec52e7a47b27 | Comment on issues in SCA agent-based scanning workspace | X | ||
srcclrWorkspaceCreateThirdPartyIssue | 0x859715e5994d4211b018f8b545398148 | Create third-party issues in SCA agent-based scanning workspace | X | ||
srcclrWorkspaceIssuesVisibility | 0xf72e007514984362beeb66d592567815 | Ignore and unignore issues in SCA agent-based scanning workspace | X | ||
srcclrWorkspaceManageProjectSettings | 0x62e6ce1f344c4585bbc4e907b9d508a4 | Manage project settings in SCA agent-based scanning workspace | X | ||
srcclrWorkspaceManageRules | 0x6b33f46119554c79a82d453a4142596d | Manage rules in SCA agent-based scanning workspace | X | ||
srcclrWorkspaceManageWebhooks | 0xd94a86c8bc46428198b94f97460523ed | Manage workspace settings in SCA agent-based scanning | X | ||
srcclrWorkspaceViewProjects | 0x3fbdeb7179964a57876ce549a55346e2 | View projects in SCA agent-based scanning workspace | X | ||
srcclrWorkspaceViewReports | 0x517ddfaeabb74784ab442f04ea0e71b0 | View issues, vulnerabilities, libraries, and licenses in SCA agent-based scanning workspace | X | ||
srcclrWorkspaceViewTeams | 0x8de23e3246a2456380b15d5090fa9684 | View teams in SCA agent-based scanning workspace | X | ||
submitDiscoveryScan | 0x390508fc396f43c7a70c727d4b47a114 | Submit a Discovery scan | X | ||
submitPolicyManualScan | 0xf1d3578e3a4b488d8193105de20779dc | Submit a manual policy scan | X | X | |
submitPolicyStaticScan | 0x32bb220559784e7086bcf347cf230035 | Submit a static policy scan | X | X | |
submitSandboxManualScan | 0x1f29f4aeaeb44257aeb7a3f4bf845da9 | Submit a manual sandbox scan | X | X | |
submitSandboxStaticScan | 0xdec25b0b03b948568194d9c7233aed9d | Submit a static sandbox scan | X | X | |
updateResults | 0xb194dc63bcde4de7882effd0109433ab | Update results | X | X | |
updateTeamAsTeamAdmin | 0x1ce1f3755e2a4d15bfc9d468ea25f2d1 | Update team as Team Admin | X | ||
updateUserForTeam | 0x85aa34fee0034c3a8810df305dc9a3aa | Update user for team | X | ||
viewAccountDetails | 0x83d87ab0299a49698e30501dc2b3595c | View details for an account | X | ||
viewAssetInventoryResults | 0x5249fed587174b1393d01d025e073cc2 | View asset inventory results | X | ||
viewCustomSeverity | 0x036550d49fe0488f94130eb5123c2bb4 | View policy custom severity setting | X | ||
viewDiscoveryResults | 0x74cafae845ef4b8f82ef0e87fcd7161f | View Discovery results | X | ||
viewDynamicAnalysisAutoLinkAppOptions | 0x45a1602fbd314773983ee3c077edd1fc | View application-related options for Dynamic Analysis auto-linking | X | ||
viewDynamicAnalysisResult | 0x72453f61cb2c4027bcc6f3f955a8656e | View Dynamic Analysis results | X | ||
viewDynamicAnalysisStatus | 0xf78bde9814764f399eb105e97030a7e6 | View Dynamic Analysis status | X | ||
viewDynamicAnalysisURLConfiguration | 0x032cfebaac3740aca5b12ad71b35e6fa | View Dynamic Analysis URL configuration | X | ||
viewMVSAGateway | 0x067e4299215c4dee9ef85f8f62e07bd5 | View ISM gateway | X | ||
viewOpenSource | 0x6dbe37724d274c94876e42c99b359eee | View open source | X | ||
viewReports | 0xe6d6d7b51f86432fa7c64a22600de548 | View reports | X | X | |
viewResults | 0x2b50a7a8401140ff8bceb64261cc96ae | View results | X | X | |
viewSandbox | 0xcee5a3a8eec247278db616a2e8ffe5a0 | View the list of sandboxes in an application | X | X | |
viewScaPortfolio | 0x7f74c6e861bf44688e716194542b724d | View portfolio for third-party components | X | ||
viewSourceClearSca | 0x442d21883cc8493db9c0c062129a303d | Enable SCA agent-based scanning | X | ||
viewTeamForDiscoveryScan | 0x4404ff6975674cd8863d67f04934925b | View team for Discovery scan | X | ||
viewThirdPartyDetails | 0x07454dd867e74ae4b06a344dafb3abc6 | View details for Third-Party tab | X | ||
viewVendorList | 0x6bcf3a08c20b4f1297c3467a651a4490 | View vendor list | X |
Footnotes
-
Permission types allow you to perform specific tasks as part of certain permissions. For custom roles, you must specify the types when assigning those permissions to a role. ↩