Role-Based Access Control

Early access only. Contact your Zep account team to enable RBAC for your workspace.

Available to Enterprise Plan customers only.

Overview

Role-based access control (RBAC) lets you grant the right level of access to each teammate while keeping sensitive account actions limited to trusted users. RBAC grants permissions through roles, and every member can hold multiple assignments across the account and individual projects.

Scopes and authorizations

RBAC permissions are evaluated at two scopes:

  • Account scope: Covers organization-wide settings such as member management, billing, and account-level API keys, along with full access to every project.
  • Project scope: Grants permissions for a single project, including its data plane, collaborators, and project-specific API keys, without exposing other projects or global settings.

Authorizations are grouped into the following capability areas. These appear in the dashboard when you review role details.

  • account.view.readonly — View account-level configuration, billing status, and usage.
  • rbac.account.manage — Create, update, or delete account-scoped role assignments, including promoting additional Account Owners.
  • rbac.project.manage — Manage project-scoped assignments and project-level resources (API keys, data ingestion, deletion) for the projects a member administers.

Roles

The early access catalog includes account-wide roles and project-scoped roles. Assignments can be combined so that, for example, a teammate can be an Account Admin and a Project Viewer on a sensitive project.

Non-Enterprise plans can assign Account Owner and Account Admin roles. Upgrade to Enterprise to unlock project-level roles and granular account roles (Billing Admin, Account Viewer, Project Creator).

Account-level roles

RoleScopeIntended forKey authorizations
Account OwnerAccountFounders, security administratorsaccount.view.readonly, rbac.account.manage, rbac.project.manage
Manage billing and plan settings.
Create, update, and archive projects.
Rotate account and project API keys.
Assign or revoke any role, including other Account Owners.
Account AdminAccountDay-to-day operators who run projectsaccount.view.readonly, rbac.project.manage
Create and manage projects and API keys.
Ingest or delete memory, documents, and graph data.
Assign and revoke project-scoped roles for any project.
Cannot remove the last Account Owner or change billing ownership.
Billing AdminAccountFinance or procurement partnersbilling.manage
View invoices and update payment details.
No access to project data or member management.
Account ViewerAccountCompliance and audit reviewersaccount.view.readonly, project.data.read, apikey.view
Read account details, project metadata, and API keys.
Cannot make configuration changes.
Project CreatorAccountBuilders who bootstrap new projectsproject.create
Create new projects from the dashboard.
No access to existing projects unless separately assigned.

Project-level roles

RoleScopeIntended forKey authorizations
Project AdminProjectTeam leads who manage a single projectrbac.project.manage for the assigned project only.
Invite or remove project collaborators.
Create and rotate project API keys.
Ingest and delete project data.
Project EditorProjectData engineers or agents that need write accessRead and write all project data, including memory, documents, and graph content.
Use project API keys to ingest or delete data.
Cannot assign roles or manage API keys.
Project ViewerProjectAnalysts, auditors, or embedded stakeholdersView project configuration, usage, threads, documents, and graph content.
Run read-only queries and exports.
Cannot ingest, delete, or manage API keys.

Managing role assignments

  • Use the Settings ▸ Access Control page in the Zep Dashboard to add or remove roles. Search for an existing member or invite a new teammate, then assign any combination of account and project roles.
  • Filter by project to focus on project-scoped roles, or view the full access matrix to understand overlapping assignments.
  • Every member must have at least one Account Owner assigned. Attempts to delete the final Account Owner are rejected.
  • The dashboard prevents duplicate assignments for the same member, scope, and project.
  • Removing a role hides it from the active list but keeps the history available; you can restore access later by adding the role again.