Esta página aún no está disponible en español. Estamos trabajando en su traducción.
Si tienes alguna pregunta o comentario sobre nuestro actual proyecto de traducción, no dudes en ponerte en contacto con nosotros.

Datadog Admin Role overview

The Datadog Admin Role is the highest-privileged managed role within a Datadog organization. It is designed for a limited number of trusted users with the following responsibilities:

  • Organization-wide configuration
  • Access control and identity management
  • Security posture management
  • Billing and usage oversight
  • Governance and compliance configuration

The Admin Role is a managed role, which means it has the following properties:

  • It is provided out-of-the-box in every Datadog organization.
  • It automatically receives new permissions when new Datadog features are released.
  • It inherits all permissions from lower-privilege managed roles (Standard and Read-Only).
  • It cannot be deleted or decommissioned, but all users can be removed from the role.

Because of its breadth of access, Datadog Admin Role access should be tightly controlled and regularly reviewed.

Datadog Admin Role capabilities

At a high level, Datadog Admin Role has the following capabilities:

  • Manage users, roles, and authentication
  • Configure organization-level settings
  • Create, rotate, and delete API and application keys
  • Control access to sensitive telemetry
  • Configure billing, usage attribution, and notifications
  • Enable and configure governance tooling
  • Delete or retain logs and RUM data
  • Configure APM ingestion and retention controls
  • Manage fleet-wide agent upgrades and policies
  • Configure Synthetic private locations
  • Manage security pipelines and sensitive data scanning

Security considerations

The Datadog Admin role can perform the following sensitive actions:

  • Delete telemetry and monitoring data
  • Modify ingestion and retention policies
  • Control billing and subscription settings
  • Change authentication and SSO configuration
  • Create and rotate API keys
  • Unmask sensitive data

Therefore, Datadog strongly recommends that customers take the following precautions:

  • Limit Datadog Admin Role access to a small number of trusted users
  • Use custom roles for day-to-day operational access
  • Enable Audit Trail to monitor Datadog Admin Role activity
  • Regularly review user access, including the Datadog Admin Role
  • Separate duties wherever possible, assigning the least amount of privilege possible for associated job functions

Datadog Admin Role permissions

The following permissions are assigned to the Datadog Admin Role by default. The Datadog Admin Role also inherits all Standard and Read-Only permissions.

Access and organization management

PermissionDescription
user_access_manageManage users, disable users. Manage roles, SAML mappings, and sensitive datasets
service_account_writeCreate and disable service accounts
org_managementEdit organization configuration and security settings
org_connections_writeManage organization connections
governance_console_writeEnforce governance policies through the Governance Console

API and application keys

PermissionDescription
org_app_keys_writeManage application keys for all users
api_keys_writeCreate and rename API keys
api_keys_deleteDelete API keys

Billing and usage

PermissionDescription
billing_readView billing details
billing_editManage subscription and payment methods
usage_readView usage and attribution
usage_editManage usage attribution configuration
usage_notifications_readView usage notification settings
usage_notifications_writeConfigure usage notifications
cloud_cost_report_schedules_manageManage cloud cost report schedules

Audit and compliance

PermissionDescription
audit_logs_readView Audit Trail
audit_logs_writeConfigure Audit Trail
data_scanner_readView Sensitive Data Scanner results
data_scanner_writeConfigure Sensitive Data Scanner
data_scanner_unmaskUnmask sensitive data
disaster_recovery_status_writeUpdate disaster recovery status

Log Management

PermissionDescription
logs_write_archivesCreate and manage log archives
logs_delete_dataDelete log data or indexes
logs_write_forwarding_rulesConfigure log forwarding rules
flex_logs_config_writeManage Flex Logs configuration

APM controls

PermissionDescription
apm_retention_filter_writeManage trace retention filters
apm_service_ingest_writeConfigure APM ingestion settings
apm_apdex_manage_writeManage Apdex thresholds
apm_tag_management_writeConfigure APM tag management
apm_primary_operation_writeModify primary operations
apm_service_renaming_writeManage service renaming
debugger_capture_variablesConfigure dynamic instrumentation
error_tracking_settings_writeConfigure Error Tracking
error_tracking_exclusion_filters_writeConfigure error exclusion filters

Security Monitoring

PermissionDescription
security_pipelines_writeManage Security Pipelines
security_monitoring_cws_agent_rules_actionsManage Cloud Workload Security rules
bits_security_analyst_writeRun Bits AI security investigations (Preview)
bits_security_analyst_config_writeConfigure Bits AI settings (Preview)
monitor_config_policy_writeManage monitor configuration policies

Observability Pipelines and Fleet Automation

PermissionDescription
observability_pipelines_deleteDelete observability pipelines
observability_pipelines_deployDeploy observability pipelines
agent_upgrade_writeUpgrade agents using Fleet Automation
fleet_policies_writeCreate and deploy agent policies

Synthetic Monitoring and RUM

PermissionDescription
synthetics_private_location_writeManage Synthetic private locations
rum_delete_dataDelete RUM data
rum_extend_retentionExtend RUM session replay retention
rum_settings_writeConfigure RUM settings

Software Delivery

PermissionDescription
ci_provider_settings_writeConfigure CI provider settings
ci_ingestion_control_writeConfigure CI ingestion filters
quality_gate_rules_writeManage PR gate rules
static_analysis_settings_writeConfigure static analysis settings

Network Monitoring and Infrastructure Monitoring

PermissionDescription
ndm_device_profiles_editEdit network device profiles
ndm_geomap_locations_writeManage NDM geomap locations
ndm_device_config_readRead device configurations

On-call and Status Pages

PermissionDescription
on_call_adminManage advanced On-Call configuration
status_pages_settings_writeConfigure Status Pages
status_pages_incident_writePublish status page notices

API access to the Datadog Admin Role

Datadog provides a public REST API that allows organizations to programmatically view and adjust many security-related configurations associated with the Datadog Admin Role. The calling API key must have sufficient RBAC permissions (typically administrator-level access).

API access enables customers to implement automation, governance workflows, and policy-as-code controls.

API authentication

All API requests require the following:

  • API key: Identifies the organization
  • Application key: Scoped to a user and governed by RBAC permissions

The API follows Datadog RBAC exactly as the UI does. If a key does not have admin permissions, it cannot modify admin-level settings.

Manage the Datadog Admin Role through the API

View roles and permissions

You can list all roles in the organization (including the Datadog Admin Role):

curl -X GET "https://api.datadoghq.com/api/v2/roles" \
 -H "DD-API-KEY: <api_key>" \
 -H "DD-APPLICATION-KEY: <app_key>"

This endpoint allows organizations to:

  • Audit the Datadog Admin Role
  • Inspect assigned permissions
  • Validate governance posture

Add or remove users from the Datadog Admin Role

User role assignments (including admin membership) can be managed through the API:

curl -X PATCH "https://api.datadoghq.com/api/v2/users/<user_id>" \
 -H "DD-API-KEY: <api_key>" \
 -H "DD-APPLICATION-KEY: <app_key>" \
 -H "Content-Type: application/json" \
 -d '{
   "data": {
     "type": "users",
     "id": "<user_id>",
     "attributes": {
       "role_ids": ["<admin_role_id>"]
     }
   }
 }'

This endpoint enables:

  • Automated access reviews
  • Just-in-time elevation workflows
  • Removal of administrator access during offboarding

Manage API and application keys

Datadog administrators can create, rotate, or delete API and application keys through the API.

Create an application key
curl -X POST "https://api.datadoghq.com/api/v1/application_key" \
 -H "DD-API-KEY: <api_key>" \
 -H "DD-APPLICATION-KEY: <app_key>" \
 -H "Content-Type: application/json" \
 -d '{
   "name": "Example Key"
 }'
Delete an application key
curl -X DELETE "https://api.datadoghq.com/api/v1/application_key/<app_key_id>" \
 -H "DD-API-KEY: <api_key>" \
 -H "DD-APPLICATION-KEY: <app_key>"

These capabilities support:

  • Automated key rotation
  • Compliance-driven access controls
  • Programmatic security hardening

Audit admin activity through the API

Audit Trail events can be searched programmatically:

curl -X POST "https://api.datadoghq.com/api/v2/audit/events/search" \
 -H "DD-API-KEY: <api_key>" \
 -H "DD-APPLICATION-KEY: <app_key>" \
 -H "Content-Type: application/json" \
 -d '{
   "filter": {
     "query": "usr.role:admin"
   }
 }'

This endpoint enables:

  • Automated administrator activity review
  • SIEM export workflows
  • Governance reporting

UI and IdP-managed security settings

Several authentication and identity settings must be managed through the Datadog UI or Identity Provider (IdP). You cannot manage the following settings through the API:

  • SSO configuration
  • MFA enforcement policy
  • Password complexity policy
  • SAML configuration

Typically, administrators manage these controls within the Datadog organization settings in the UI or through their identity provider (for example, Okta or Azure AD).

Further reading

Más enlaces, artículos y documentación útiles: