Skip to main content

About user roles and permissions

This section provides details about the permissions available to each role on the Veracode Platform. To see which roles are often relevant to different users in your organization, see Common roles for user accounts.

To grant access to the Veracode APIs, administrators assign the necessary API roles to users with an API service account. To see the roles assigned to your account, you can click Your Account from the top navigation menu in the Veracode Platform.

Important

Do not share your account credentials for the Veracode Platform with other users.

Administrator

Can manage users, teams, and SAML settings. Administrator access can be granted either by Veracode Technical Support or, if your organization uses SSO with IdP data preferred, through a SAML assertion. A user with the Administrator and eLearning roles is considered an eLearning administrator and can manage Veracode eLearning administration tasks.

Analytics Creator

Can access Veracode Analytics, where the user can view scan metrics of applications in the user's team portfolio, and create or edit custom reports.

Creator

Can create, edit, and delete application profiles, as well as request and delete scans for applications that belong to the user's teams. Can only create application profiles for teams in which the user with the Creator role is a member. Can assign applications to teams. Can allow next-day consultations for an application. Can schedule consultation calls for scan configurations. Can view the list of applications to which you have access. Can also promote a sandbox scan to a policy scan and delete sandbox scans. You can assign the Creator role for specific scan types or for all scan types. In addition, if your user account is restricted to specific scan types, you can only request scans of that type.

Delete Scans

Can delete scans.

eLearning

Can access Veracode eLearning courses, assessments, and/or the Knowledge Base.

note

Assigning a role to an eLearning user (learner) consumes one of your purchased Veracode eLearning seats when the learner launches a course. If a learner does not launch a course, you can assign the role to another user. You can only assign as many roles as you have purchased seats.

Executive

Can view Veracode Analytics and reports for all applications. Users with the Executive role must also have the eLearning role to access the Veracode eLearning summary reports. Can view all the applications. Can schedule consultation calls for policy scan results.

Free Trial Admin

Can edit users and teams in their organization. Can create up to nine additional users and four additional teams in the free trial organization. Can submit a support request. Can access DAST Essentials in the Veracode Platform. There can only be one free trial administrator in each free trial organization.

Free Trial User

Can edit their user account. Cannot add, edit, or delete users or teams in their organization. Can submit a support request. Can access DAST Essentials in the Veracode Platform.

Greenlight IDE User

Can access the Veracode Greenlight plugin in your IDE, perform Greenlight scans, and review Greenlight scan results. This role is only available to organizations that have active Veracode Greenlight subscriptions.

Mitigation Approver

Can approve mitigations for flaws. Can view the list of applications to which you have access.

Policy Administrator

Can access the Policies page, enabling the ability to create and edit policies, set default policies and notification rules, and assign different policies to applications. When assigned in combination with the Creator or Security Lead role, you can change policy assignments for individual applications using the application profile.

Reviewer

Can access reports and flaw details for applications that belong to the user teams, and propose mitigations, but cannot access the review modules page. Can review scan results and scan reports for sandboxes. Can view the list of applications to which you have access. Can schedule consultation calls for policy scan results.

Sandbox Administrator

Can create development sandboxes for scanning code in development for applications associated with the user account. For applications which the Sandbox Administrator can access, can edit or delete development sandboxes and propose mitigation comments.

note

You use the Sandbox Administrator role in addition to another role (Creator, Submitter, Reviewer, or Security Lead).

Sandbox User

Can create and edit development sandboxes that enable scanning code in development for applications that belong to the user teams. Can scan code within a development sandbox, delete their scan, review results of a sandbox scan, add comments, and propose mitigations. Can schedule consultation calls for sandbox scan results. You can promote the sandbox scan to a policy scan, which counts toward your policy compliance score, if you:

  • Have the Sandbox User role with the Creator or Submitter role
  • Have All Scan Types or Static Scan selected

Security Insights

Can access Veracode Analytics, where the user can view scan metrics of applications in the user's team portfolio and custom reports. To create or edit dashboards, you must have the Analytics Creator role.

Security Labs User

Can access the Veracode Security Labs interactive training labs.

note

Assigning this role to a Veracode Security Labs user consumes one of your purchased Security Labs seats. To see the number of remaining seats, select the Security Labs User help icon when assigning roles on the Admin page.

Security Lead

Can create, edit, and delete application profiles. Can view Veracode Analytics, reports, and flaw details for all applications. Can submit applications and approve scan requests made by Creators and Submitters. Can assign applications to teams. Can review all applications and scans, including receiving all notifications for these applications and scans, without any restrictions or team assignment limitations. Can allow next-day consultations for an application. Can schedule consultation calls. Can promote a sandbox scan to a policy scan.

note

You can assign the Security Lead role for all scan types or only for specific scan types. A scan type restricted assignment limits the type of scans you can create.

Submitter

Can request scans for applications that belong to the user's teams, has access to the review modules page, and can upload binaries. Can view the list of applications to which you have access. Cannot create, edit, or delete applications, or delete scans. If you are a vendor receiving a third-party scan request to submit a scan, you need to accept the third-party scan request first. Can promote a sandbox scan to become a policy scan. Can create, rename, and delete agents and regenerate agent tokens in Veracode Software Composition Analysis (SCA). Can schedule consultation calls for scan configurations.

note

You can assign the Submitter role for all scan types, or only for specific scan types. A scan type restricted assignment limits the type of scans you can submit.

Team Admin

Can manage users, including creating new users, resetting passwords, and updating roles. Can only view or manage users who are in the teams that the team admin manages and do not belong to any team that the team admin does not manage. Can add or remove team memberships from a user who is in one of the teams managed by the team admin. Cannot add users to teams that the team admin does not manage. Team admins cannot edit the roles for users who have the Administrator, Executive, Policy Administrator, Security Lead, Team Admin, or Workspace Administrator roles. Cannot create teams or business units, both of which require the Administrator role. When the administrator creates a user with the Team Admin role, the administrator assigns team membership to that user.

Vendor Manager

Can view the list of all third-party vendors for the organization. This role may not be available for your account.

Workspace Administrator

Can edit and delete workspaces in Veracode Software Composition Analysis. Can create, edit, and delete agents in a workspace. Can add teams to a workspace and remove them. Can manage rules in a workspace and view workspace reports. Can create and comment on issues. Can manage project settings.

Workspace Editor

Can create, edit, and delete agents in a workspace in Veracode Software Composition Analysis. Can manage rules in a workspace and view workspace reports. Can create and comment on issues. Can manage project settings.

Actions by role

The following tables show the actions that each role allows you to perform.

ActionAdministratorCreatorDelete ScansSecurity LeadSubmitter
Create Application Profile X X 
Bulk Add Applications   X 
Assign Application to Team X   
Request Manual, Static, or Pipeline Scan X XX
Request Discovery ScanXX XX
Delete Scans XXX 

ActionAdministratorCreatorExecutiveReviewerSecurity Lead
Comment on Static Results    X
View or Delete File Exchange FilesX   X
Download Discovery ResultsX XXX
Download XML Results  XXX
Download Discovery Site ListsXX  X

ActionExecutiveMitigation ApproverPolicy AdministratorReviewerSecurity LeadVendor ManagerSecurity InsightsSecurity Labs UserAnalytics Creator
View AnalyticsX   X X X
Edit AnalyticsX
View ReportsX  XX   
Access eLearningX       
Access Security Labs       X
Propose Mitigations   XX   
Approve Mitigations X      
Create Policies  X     
View Vendors Page     X  
Publish Results    X   
Important

To be able to access eLearning summary reports, users with the Executive role must also have the eLearning role. Users who are members of the team associated with the application can accept third-party terms or scan requests. Users with both the Reviewer and Security Insights role can view analytics only for the teams for which they have access.

Dynamic Analysis roles

The following tables summarize the Dynamic Analysis permissions available to certain roles on the Veracode Platform.

ActionAdministratorCreatorSubmitterReviewerSecurity Lead
Request/Create/ Submit AnalysisXXX X
Upload or Enter URLsXXX X
Import URLs From ApplicationsXXX X
Turn on Application Auto-LinkingX   X
Manually Link Results to ApplicationXXX X
Assign TeamsXXX X

ActionCreatorSubmitterReviewerSecurity Lead
Edit Analysis and ScheduleXX X
Edit Scan ConfigurationXX X
Add or Delete Scan from Existing AnalysisXX X
View Results  XX
View StatusXXXX
View Analysis ConfigurationXX X
Delete AnalysisXX X
View Vulnerability SummaryXXXX

Sandbox capabilities

The following table summarizes the Sandbox permissions available to each role on the Veracode Platform.

Developers can create sandboxes within existing application profiles, and use them to submit the application code for analysis while still in development. Sandbox scans do not affect the developer's ability to run a formal policy scan of the application, and the results of the sandbox scans do not degrade the policy status or flaw metrics of the production version of the application.

ActionCreatorSubmitterReviewerSandbox AdministratorSandbox UserSecurity Lead
Create Sandbox ProfileX  XXX
Delete SandboxX  X X
Create Policy ScanXX   X
Submit Policy ScanXX   X
Create Sandbox ScanXX  XX
Submit Sandbox ScanXX  XX
Review Scan Results  X XX
Review Scan Reports  X XX

Veracode Software Composition Analysis roles

ActionMitigation ApproverSecurity LeadExecutiveCreatorReviewerSubmitterWorkspace AdministratorWorkspace Editor
View the SCA Portfolio Page XXXXXXX
Create and Delete Applications X X    
Edit Applications X X    
Add Teams to Applications X X    
View All Applications XX     
View Specific Applications XXXX   
Request SCA (Static) Scans X X    
Propose Mitigations X  X   
Approve MitigationsX       
View the Workspace Portfolio Page XXXX XX
Create Workspaces X X    
Delete Workspaces X X  X 
Edit Workspaces X X  X 
Add Teams to Workspaces X X  X 
View All Workspaces XX     
View Specific Workspaces XX X XX
Manage Projects X    XX
Link Projects to Applications X    XX
Manage Agent-Based Scan Rules X    XX
Manage Integrations X      
Manage Agents X   XXX
Ignore and Unignore IssuesX       

Custom roles

You can create custom roles that are specific to your organization. Custom roles define specific permissions you grant to users. For example, if you only want certain users to manage application profiles, submit scans, and manage teams, you can assign those specific permissions to a custom role and assign it to their accounts.

If you have the Administrator role, you create custom roles with the Identity REST API. After you create a custom role, you assign it to users in the same way you assign standard Veracode roles.

Use APIs with a user account

The Upload Using the Veracode Plugins permission is available to the Submitter role on the Veracode Platform.

The Create Application Using the Veracode Plugins permission is available to the Creator role on the Veracode Platform.

Permissions

Roles are comprised of different permissions that allow users to perform specific Veracode tasks. To view the permissions associated with specific roles, use the Identity REST API.

The following table lists the Veracode permissions, their types, if applicable, and whether they apply to user accounts or API service accounts. Some roles have permission types. In some cases there are seemingly similar permissions types: retrieve, retrieveTeamOnly, and retrieveOg, for example. Individuals would have retrieve, a Team Admin would have retrieveTeamOnly, and an Administrator would have retrieveOrg.

Permission namePermission IDDescriptionPermission type 1User accountsAPI service accounts
adminApi0x014e6adb7efc421c9cb1823799e9efc0Access Admin APIX
appPortfolio0x05570a3e9c2e4c46a441829c81c3d462Application portfolioXX
approveDynamicScans0xbc79c56687034b41b6dfe10fe4398bebApprove Dynamic scansX
approveDynamicScansforVsa0x782ef05256344e51b6ccbd587aa9e2ccApprove Dynamic scans for ISMX
approveMitigations0xdf6b8e1f1d484fa6a361745f38858745Approve or reject proposed mitigationsXX
archerReports0xa8bedc08bdb441bbb7fcf00979413ca6Run Archer reportsXX
assignAppToAnyTeam0xe12feb4a5ceb400ebcd73283b653a5d4Assign application to any teamXX
assignAppToTeam0x39428ad134c64ede944929e7503a980bAssign application to teamXX
changeAppAssuranceLevel0xac1ec9a6fb7a45b1956611c46cf27170Change application assurance levelXX
changeArcherName0x745b956f0af949a7919fe2c5f27c5dd8Change the Archer name of an applicationXX
createApplicationProfile0x14c846c13a3e4c7889b691c83b28410cCreate a new applicationXX
createCollection0xb6a26a817dde4545b5767c90ed3d505eCreate a collectionXX
createCurriculum0xc8f6e9b48605484298502304b6d12440Create an eLearning curriculumXX
createLoginAccount0x433f78748c2f45fabc62ac4929d4343dCreate a login accountXX
createPolicyScan0xc0d9a8fa2ef241928ea0b1ea15eca846Create a policy scan for an applicationXX
createSandbox0x3bb562948f6c48c98706dba408131105Create a sandbox in an applicationXX
createSandboxScan0x83ac81e991f549cb84dc1918def976f1Create a sandbox scan for an applicationXX
createTeam0x4607ca84b1204f0cba25c1f7ad2c23b1Create a teamXX
createUserForTeam0x4e38d0e516d54619a3a053579e6b72f9Create user for teamX
customReport0x27f060f4419f46eab0ca5369bcb33722Custom reportX
dashboard0x41759f0acc984fbfa041f69f53addb08DashboardX
deleteApplicationProfile0x6a32ef82a5c94f03992cfb3add2962f8Delete an applicationXX
deleteCollection0x0c3241989c13484f94d38ab864609574Delete collectionXX
deleteDiscoveryScan0xfb7b506d81cf40d9ae08a0aa925e28ceDelete Discovery scanX
deleteDynamicAnalysis0x117f645522084a3c989f3a67eb3ede32Delete a Dynamic AnalysisX
deleteLoginAccount0xe014fb2eaebb450f9656e7bd4ac8556eDelete login accountXX
deleteModuleScan0x2f0dbe5deb774bc2b828f2af72f1eb64Delete module scan resultsX
deletePolicyScan0xaa3164f8f50949dabe771b713627a184Delete a policy scanXX
deleteSandbox0x580782bbe6124bd7800ca40ea8f73abbDelete a sandbox in an applicationXX
deleteSandboxScan0x9d15b54e9a404ff6819f06dabe003934Delete a sandbox scanXX
deleteTeam0x310a1f9f1ba34593ac85d2076667dfe3Delete a teamXX
deleteUserForTeam0xca8b638578f24d4caecedd4a037d4c17Delete a user for teamX
downloadDiscoverySiteList0xd8571d042d9147ff99ad757e7a92bf52Download Discovery site listX
downloadScanReport0x87d41465dbd3433d8081beb14e71d52cDownload scan reportsX
downloadScanReportXML0x325eb8cee6e54e24bbb511a91bbbe41bDownload scan report as XMLX
downloadScript0xa051ffcb3b0e40aaa016f8ab437c0b34Download crawl and login scriptX
downloadSiteList0xf3c2dcda0b5146bb8482030fbc68602eDownload the site list for the scanX
dynamicAnalysisResultImport0x0199820209da49d8b19ff6313a4a8ef0Dynamic Analysis result importXX
editDynamicAnalysisAutoLinkAppOptions0x62876d2ba4ef4ea0a443a3a1828a34dcChange application-related options for Dynamic Analysis auto-linkingX
editLoginAccount0x6b2d4c7b1b2d479f90570422dccfa2a1Edit login accountXX
editMVSAGateway0xd81d94e66d8448a996ac8040862e0680Edit ISM gatewayX
editsamlsettings0x33107bd802da4ce387f09d971f2bcec2Edit account SAML settingsX
editTeam0xe4f5ac1b39cb40cbbdbbf1e0fa111b56Edit teamXX
eLearningMentor0xd9d4c7ff5c304bb7a4f8ee132aad2df4Access eLearning mentor contentX
eLearningProfessor0x67161f66bfa640d68837bbb1cdce7a37Access eLearning professor contentX
enableNextDayConsultation0xb4d240aebe774189ab9de232339d9cb6Enable applications for next-day consultations for creation and updateXX
enableRemediationConsultation0x26c8bc11fdab4318a0c32aa535d92106Allow user to schedule remediation consultationsX
enableUploadConsultation0x42eccdd89a5b4da3be0ccbe229c46206Allow user to schedule upload consultationsX
expireApiCredentials0xbfc0cd11fdba4e119bc69e3e3edc304fExpire another user's API credentialsX
expireApiCredentialsForTeam0xd8348b80bded4cc399702925df0b356fExpire another user's API credentials if on a managed teamX
exportCustomData0x9619f30a27b2442e9234f17f53190801Export custom dataXX
fileExchange0x2a1330f088eb42ffaf5d53af32888182Access file exchangeX
generateWafRules0x1a3495d757854b7cb0094f82b78b66c8Generate WAF rulesX
importApplicationProfiles0x2fca338e725d400db60c59b31026cb5fImport application profilesX
linkApp0x256e3e779407437488ecd77d8d1c32c4Link to applicationX
lookerAnalyticsCreator0x4e6e2e118963441ca30d9c5d000af00aAnalytics creatorX
lookerAnalyticsViewer0x85b2a15b7ac742aa9c10d78486e12ef7Analytics viewerX
maintainDynamicApplication0x9a2d6afd9ce545448a0caca7ff689643Maintain Dynamic applicationX
ManageApiCredentials0x5c7c544ba1f141ffa5472a855f9cfcb8Manage API credentialsgenerate, retrieve, retrieveOrg, retrieveTeamOnly, revoke, revokeOrg, revokeTeamOnlyXX
ManageBusinessUnit0x0964d8d2f21b4c4e87d1b669941c7c27Manage business unitscreate, retrieve, update, deleteXX
manageCustomCleanserManagement0x872f894c19064e759e0d3d42577afea0Change mitigation behavior for flaws mitigated by custom cleanserX
manageElearning0x91d55287841a4782879cf3ceae3ba351Manage account-level eLearningXX
ManageOrganization0x4ea02dea2313421caab07c4bf73f6978Manage organizationsretrieve, updateXX
manageScaBlacklist0x6fb96418e98e482699290337f8cb0a89Manage SCA component blacklist for policyX
ManageTeam0x5404cb69b2d440f994d353f20ee27209Manage teamscreate, retrieve, retrieveTeamOnly, update, updateTeamOnly, deleteXX
ManageUser0xe3df1322630e4a45a86f65433b1acd3bManage userscreate, createTeamOnly, retrieve, retrieveOrg, retrieveTeamOnly, update, updateOrg, updateTeamOnly, delete, deleteTeamOnlyXX
manageVendorContact0xe4bc952ddcd8435e94cdc1296e0ea1caManage vendor contact requestsX
navExternalAdmin0x3a75bc4a351547c0b8a8be374a19f41dNavigation for external AdministratorX
navExternalELearn0xeee90451836d422aab8036344bec11e2Navigation for external eLearningX
navExternalExecutive0x88e4425e74f240ccab58995c68430ab8Navigation for external ExecutiveX
navSecurityInsightOnly0xab017d4a3a2140aa96466e84758bed3bNavigation for Security Insight onlyX
optIntoVendorDirectory0x438ac44affc54fb5a0d99fafa14063b3Share your results in vendor directoryX
policyManagement0xd956b69a8d2848319c17c3a9b0210f8aManage policiesXX
portableScopeResultsAggregation0x7aa00f641c654ea19f3fb4707ec3495eRetrieve cross-profile flaw identifiers in XML reportsXX
promoteScans0x770b9a6b3b4544cc9e89b9a92227079ePromote scan to policy sandboxXX
publishMitigatedRatings0x96af5c976e2b40dc81f780519d24df2dPublish applications with mitigationsX
publishResultsEnterprise0xcb20a688cc80416e847100ae9dbc75e7Publish results to enterpriseX
readCollection0x8b09b959b25d411298a377a6edb5d806Read collectionsXX
reportingApi0xf01549ec6a0b4b3a81b9a77bb858a201Enable the Reporting APIXX
requestDynamicAnalysis0x9cbd76badf5b43e9a15568f0a846fcc3Request a Dynamic AnalysisXX
resultsApi0x71e0aca2a8e64f41bce2ede5566cd300Access Results APIX
retrieveApiCredentialsForTeam0x2ba320ca8e164c0b8d9226f81a70cc61View another user's API ID and status if on a managed teamX
retrieveTeamAsTeamAdmin0xf89dc1035afe4b9facc72cb8bca159fbRetrieve a team as Team AdminX
retrieveUserForTeam0x81d4af60b38648b8b9d0af29b846d4dcRetrieve a user for teamX
scanWithGreenlight0xf13504c1a6e44bd28377130e0180b942Scan with GreenlightXX
securityLabs0xe384c5f0dcba4cdcbd70d626ac7d903dAccess Security LabsX
setAllowDepAsTopLevelModules0xcd701fb2ddc040e78af7f188d496b8cfSet allow dependencies as top-level modulesX
srcclrAccessAllWorkspaces0xfe22227694274b9eb5505f841776b405Navigate to all workspaces in SCA agent-based scanningX
srcclrCreateWorkspace0x48798a44f4dc477b82b7aa9728ef71cbCreate workspace in SCA agent-based scanningX
srcclrListPortfolioPage0xa06acaa1583840908a3246b653a88231View portfolio list page in SCA agent-based scanningX
srcclrManageAgents0xfc4323c12f774c08af600da555274d8dManage agents in SCA agent-based scanning workspaceX
srcclrManageOrg0x29bd39f7bd504a0db4e22048f133f58cManage integration, agents, usage, and library catalog in SCA agent-based scanningX
srcclrManageWorkspaces0x1d1858e0dbb842a19a172a61c14c6e19Manage SCA agent-based scanning workspacesX
srcclrWorkspaceCommentIssues0xf41c4ef3618a43d597baec52e7a47b27Comment on issues in SCA agent-based scanning workspaceX
srcclrWorkspaceCreateThirdPartyIssue0x859715e5994d4211b018f8b545398148Create third-party issues in SCA agent-based scanning workspaceX
srcclrWorkspaceIssuesVisibility0xf72e007514984362beeb66d592567815Ignore and unignore issues in SCA agent-based scanning workspaceX
srcclrWorkspaceManageProjectSettings0x62e6ce1f344c4585bbc4e907b9d508a4Manage project settings in SCA agent-based scanning workspaceX
srcclrWorkspaceManageRules0x6b33f46119554c79a82d453a4142596dManage rules in SCA agent-based scanning workspaceX
srcclrWorkspaceManageWebhooks0xd94a86c8bc46428198b94f97460523edManage workspace settings in SCA agent-based scanningX
srcclrWorkspaceViewProjects0x3fbdeb7179964a57876ce549a55346e2View projects in SCA agent-based scanning workspaceX
srcclrWorkspaceViewReports0x517ddfaeabb74784ab442f04ea0e71b0View issues, vulnerabilities, libraries, and licenses in SCA agent-based scanning workspaceX
srcclrWorkspaceViewTeams0x8de23e3246a2456380b15d5090fa9684View teams in SCA agent-based scanning workspaceX
submitDiscoveryScan0x390508fc396f43c7a70c727d4b47a114Submit a Discovery scanX
submitPolicyManualScan0xf1d3578e3a4b488d8193105de20779dcSubmit a manual policy scanXX
submitPolicyStaticScan0x32bb220559784e7086bcf347cf230035Submit a static policy scanXX
submitSandboxManualScan0x1f29f4aeaeb44257aeb7a3f4bf845da9Submit a manual sandbox scanXX
submitSandboxStaticScan0xdec25b0b03b948568194d9c7233aed9dSubmit a static sandbox scanXX
updateResults0xb194dc63bcde4de7882effd0109433abUpdate resultsXX
updateTeamAsTeamAdmin0x1ce1f3755e2a4d15bfc9d468ea25f2d1Update team as Team AdminX
updateUserForTeam0x85aa34fee0034c3a8810df305dc9a3aaUpdate user for teamX
viewAccountDetails0x83d87ab0299a49698e30501dc2b3595cView details for an accountX
viewAssetInventoryResults0x5249fed587174b1393d01d025e073cc2View asset inventory resultsX
viewCustomSeverity0x036550d49fe0488f94130eb5123c2bb4View policy custom severity settingX
viewDiscoveryResults0x74cafae845ef4b8f82ef0e87fcd7161fView Discovery resultsX
viewDynamicAnalysisAutoLinkAppOptions0x45a1602fbd314773983ee3c077edd1fcView application-related options for Dynamic Analysis auto-linkingX
viewDynamicAnalysisResult0x72453f61cb2c4027bcc6f3f955a8656eView Dynamic Analysis resultsX
viewDynamicAnalysisStatus0xf78bde9814764f399eb105e97030a7e6View Dynamic Analysis statusX
viewDynamicAnalysisURLConfiguration0x032cfebaac3740aca5b12ad71b35e6faView Dynamic Analysis URL configurationX
viewMVSAGateway0x067e4299215c4dee9ef85f8f62e07bd5View ISM gatewayX
viewOpenSource0x6dbe37724d274c94876e42c99b359eeeView open sourceX
viewReports0xe6d6d7b51f86432fa7c64a22600de548View reportsXX
viewResults0x2b50a7a8401140ff8bceb64261cc96aeView resultsXX
viewSandbox0xcee5a3a8eec247278db616a2e8ffe5a0View the list of sandboxes in an applicationXX
viewScaPortfolio0x7f74c6e861bf44688e716194542b724dView portfolio for third-party componentsX
viewSourceClearSca0x442d21883cc8493db9c0c062129a303dEnable SCA agent-based scanningX
viewTeamForDiscoveryScan0x4404ff6975674cd8863d67f04934925bView team for Discovery scanX
viewThirdPartyDetails0x07454dd867e74ae4b06a344dafb3abc6View details for Third-Party tabX
viewVendorList0x6bcf3a08c20b4f1297c3467a651a4490View vendor listX

Footnotes

  1. Permission types allow you to perform specific tasks as part of certain permissions. For custom roles, you must specify the types when assigning those permissions to a role.