---
title: Permissions and Feature Access
description: >-
  Define what users are allowed to do in your Datadog organization using roles
  and permissions.
breadcrumbs: >-
  Docs > Getting Started > Access for Enterprises > Permissions and Feature
  Access
---

# Permissions and Feature Access

## Overview{% #overview %}

After you've decided on your org structure, the next step is defining what users are allowed to do. Datadog's [permission model](https://docs.datadoghq.com/account_management/rbac/permissions.md) controls access to features, data types, and administrative actions through Roles. This section covers how the permission system works, when and how to create custom roles, and how to keep them current as Datadog evolves.

## Managed roles{% #managed-roles %}

Datadog provides three [managed roles](https://docs.datadoghq.com/account_management/rbac/permissions.md#roles):

- **Datadog Admin Role**: full read and write access, including user management, org settings, and billing.
- **Datadog Standard Role**: read and write access to most features, without administrative capabilities.
- **Datadog Read Only Role**: read access only, no ability to edit resources or change configurations.

Managed roles are maintained by Datadog. Their permissions are automatically updated as new features are released, so users on managed roles always have access to the latest capabilities. You cannot modify managed roles directly, but you can clone them as a starting point for custom roles.

## Custom roles{% #custom-roles %}

[Custom roles](https://docs.datadoghq.com/account_management/rbac/permissions.md#custom-roles) let you define access tiers that reflect how your organization actually works. The three managed roles are a starting point, not the final answer.

### When to create custom roles{% #when-to-create-custom-roles %}

Use custom roles to **control which features are available** to your SREs and developers, including which newly-released Datadog features are available to which users. Beyond feature access, use custom roles to create distinct tiers for user populations. Other common triggers:

- **Compliance or audit users** need read access across products but should never edit anything.
- **Platform administrators** need elevated permissions for infrastructure management, without overly-broad admin privileges.
- **Third-party contractors or vendors** need access to specific products but should be excluded from sensitive data, billing, or user management.
Start with the minimum permissions a user needs, and add from there.
### Keeping custom roles current with new permissions{% #keeping-custom-roles-current-with-new-permissions %}

Unlike managed roles, custom roles do not automatically receive new permissions when Datadog releases new features unless you configure them to. This means new product capabilities may be invisible to users on custom roles until an administrator explicitly grants the permission. There are three strategies to stay current:

1. **Monitor the Permissions Release Notes.** When Datadog adds new permissions, they are announced in [permissions release notes](https://app.datadoghq.com/organization-settings/roles#release-notes). Review these periodically and decide which roles should receive the new permission.

1. **Use Bulk Assign.** When you decide to distribute a new permission, you can add it to multiple roles at once. For more information, see [Roles](https://docs.datadoghq.com/account_management/rbac/permissions.md#roles).

1. **Configure Automatic Updates.** Each custom role can be set to follow a managed role template (Read Only, Standard, or Admin). When a new permission is released to that template, your custom role receives it automatically, but you can still add or remove any permissions from the role after automatic updates occur. Use this feature for trusted users who should get new features by default. To configure, see [Custom Roles](https://docs.datadoghq.com/account_management/rbac/permissions.md#custom-roles).

### Role hygiene at scale{% #role-hygiene-at-scale %}

As your organization grows, the number of roles can increase rapidly. Organizations with thousands of users can end up with hundreds or even thousands of roles if creation is not governed. To manage this:

- **Audit roles regularly.** Identify roles with no users or teams assigned and consolidate or delete them.
- **Name roles descriptively.** Use a naming convention that indicates the role's purpose and scope (for example, `team-payments-lead` or `contractor-readonly`).
- **Limit role creation.** Only users with the `user_access_manage` permission should be able to create new roles. Review new role requests to avoid duplication.

{% alert level="danger" %}
The `user_access_manage` permission is one of the most sensitive in the platform. It allows a user to manage other users' roles and permissions, including granting themselves additional permissions. Guard this permission carefully and limit it to trusted administrators.
{% /alert %}

## Recommended starter roles{% #recommended-starter-roles %}

Start with a set of 4-6 custom roles. Here is a recommended starting point:

| Role                   | Based on               | Key modifications                                                                                                                                                     |
| ---------------------- | ---------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| **Read Only**          | Datadog Read Only Role | No modifications needed for most cases. Use for stakeholders, executives, or audit users who need visibility without edit access.                                     |
| **Standard User**      | Datadog Standard Role  | Remove sensitive permissions your users don't need (for example, `user_access_manage` or `org_billing`). This becomes your default role for most SREs and developers. |
| **Platform Admin**     | Datadog Admin Role     | Remove billing and org management permissions if those are handled by a separate team. Add any infrastructure-specific permissions.                                   |
| **Organization Admin** | Datadog Admin Role     | Full administrative access including billing and org management permissions. Reserve for a small group of trusted administrators.                                     |
| **Restricted User**    | Datadog Read Only Role | Further restrict to specific products. Use for contractors or external users who should only access a narrow set of features.                                         |

Expand only when a meaningful group of users needs a distinct permission set that can't be served by one of these.

## Admin override groups{% #admin-override-groups %}

When you begin restricting resources to specific teams (covered in [Protecting Assets](https://docs.datadoghq.com/getting_started/access_for_enterprises/protecting_assets.md)), be aware that those restrictions apply to everyone, including administrators. If an admin is not a member of the owning team, they can be locked out of resources they need to manage.

To avoid this, establish a break-glass **admin override team** (such as "Platform Admins" or "Datadog Governance") and include it in the access list for all critical resources. This helps ensure that your administrative staff always retains access for troubleshooting and governance, even as you tighten team-based restrictions.

**Note:** Users with the `user_access_manage` permission can grant themselves elevated access as a failsafe.

## Recommendations{% #recommendations %}

- **Use roles to reflect permissions, not ownership.** Teams better reflect ownership and accountability.
- **Create custom roles to maintain granular control of feature access**, including new features and permissions.
- **Start by cloning a managed role** and removing permissions, rather than building from scratch.
- **Keep custom roles up to date as new features are released.** Either monitor new permission releases or configure automatic updates.
- **Audit roles quarterly.** Look for roles with no users, duplicate roles, and users with more permissions than they need.
- **Use a consistent naming convention for roles** that indicates purpose and scope.

## Further reading{% #further-reading %}

- [Datadog Role Permissions](https://docs.datadoghq.com/account_management/rbac/permissions.md)
- [Access Control (RBAC)](https://docs.datadoghq.com/account_management/rbac.md)
