Managing Users
RunOS allows you to collaborate with team members by inviting them to your account. All invited users can access the clusters and resources within the account.
Understanding User Permissions
Current Permission Model
Important: All users currently have admin-level access to the account.
What this means:
- All invited users can perform any action within the account
- Users have full access to all clusters in the account
- Users can deploy, modify, and delete services and applications
- Users can invite or remove other users
- Users can modify account settings
Granular permissions coming soon:
- Role-based access control (RBAC)
- Per-cluster permissions
- Read-only users
- Custom permission sets
Account vs Personal Access
Account scope:
- When you invite a user to your account, they get access to everything in that account
- All clusters, services, applications, and settings
Personal accounts:
- Each user also has their own personal account
- Personal accounts are separate from shared accounts
- To access different accounts, users must sign out and sign in with the corresponding email address
Inviting Users
How to Invite
- Sign in to RunOS Console
- Click your user avatar (circle with your initials) in the top right corner
- Select Account from the dropdown menu
- Click the Users tab
- Click Invite User
- Enter the user's email address in the modal
- Click Submit
What Happens Next
- Magic link appears - A unique invitation link is displayed on your screen after submission
- Copy the link - Copy the complete magic link shown
- Share securely - You must manually share this link with the invitee through a secure channel:
- Encrypted messaging (Signal, WhatsApp, etc.)
- Secure email
- In-person or over a secure call
- User registration - The invitee must use both:
- The magic link you shared
- Their unique invitation code (included in the link)
- Email verification - The invitation is locked to the specific email address you entered
- Access granted - Once they complete registration, they immediately get admin access to your account
Important security notes:
- No automatic emails - Currently, RunOS does not send invitation emails automatically
- Manual sharing required - You are responsible for securely sharing the magic link with the invitee
- Email locked - The invitation only works with the exact email address you entered
- Keep link secure - Treat the invitation link like a password - anyone with the link and the matching email can join your account
Invitation Expiration
- Invitations expire after 24 hours
- Expired invitations cannot be resent
- To invite again after expiration, delete the old invitation and create a new one
Managing Existing Users
Viewing Team Members
- Go to Account Settings
- Click Team tab
- View list of all users with access
Information displayed:
- User name
- Email address
- Join date
- Last activity (coming soon)
- Current status (Active/Invited)
Removing Users
To remove a user from your account:
- Go to Account Settings
- Click Team tab
- Find the user in the list
- Click the ⋯ (more options) menu
- Select Remove User
- Confirm the removal
What happens:
- User loses access immediately
- User is notified via email
- User retains their personal account
- Actions they performed remain in audit logs
Pending Invitations
View and manage pending invitations:
- Click your user avatar in the top right corner
- Select Account from the dropdown
- Click Users tab
- View the list of invited users (pending invitations appear with an "Invited" status)
Managing pending invitations:
- Delete invitation - Remove the invited user from the list to revoke the invitation
- Once deleted, the magic link becomes invalid immediately
- The same email address can be invited again after deletion
- Invitations automatically expire after 24 hours
Team Collaboration
Best Practices
-
Invite only trusted team members
- All users have admin access currently
- Can make significant changes to infrastructure
-
Use work email addresses
- Easier to manage when people leave
- Corporate email for audit trails
-
Communicate changes
- Let team know about significant infrastructure changes
- Use external tools for collaboration (Slack, Teams, etc.)
-
Review team regularly
- Remove users who no longer need access
- Check for inactive accounts
Multiple Accounts
Users can be members of multiple accounts, but switching between them requires signing out and back in.
Currently:
- Multi-account switching is not natively supported
- Each account is associated with a specific email address
- To access a different account, you must sign out and sign in with the corresponding email address
To switch accounts:
- Click your user avatar in the top right corner
- Select Sign Out
- Sign in again using the email address associated with the other account
- Console will load that account's resources
Coming soon:
- Native multi-account switching without signing out
- Quick account switcher in the navigation
- Single sign-in with access to all your accounts
Security Considerations
Current Admin Model
Since all users have admin access:
Risks:
- Any user can delete critical infrastructure
- Any user can invite or remove other users
- Any user can view all secrets and configurations
Mitigations:
- Only invite trusted team members
- Use audit logs to track actions
- Implement external approval processes for critical changes
- Consider separate accounts for different environments (production vs development)
Future RBAC
Role-based access control is coming soon and will allow:
Read-only users:
- View infrastructure and logs
- Cannot make changes
Per-cluster permissions:
- Access to specific clusters only
- Isolation between environments
Custom roles:
- Define specific permission sets
- Assign to users based on responsibilities