Permission
A permission is the smallest authorization unit in the RBAC model. Each permission grants access to a specific resource identified by its URL path. Permissions can be defined for either an organization owner or a workspace member. Organization owners implicitly possess all permissions granted to workspace members by default.Roles:
Organization Owners: A set of permissions specific to the owner of the organization. Organization owners implicitly possess all permissions granted to workspace members by default. Workspace Members: A limited set of permissions defined for workspace members of the organization. Organization Owners can define, assign, and manage the permissions available to Workspace Members.Workspace Member Permission Management API
Enables organization owners to manage custom workspace roles, assign permissions, and control workspace member access.Endpoints
Permissions
List Available Permissions of Organization owner
name (partial match), service (exact), or audience ORGANIZATION_USER, WORKSPACE_USER). Max limit: 100.
Get Workspace User Permissions
Add Permissions to Role
affectedCoun/affectedPermissionIds and skippedCountskippedPermissionIds.
Revoke Permissions from Role
Roles
List Roles
isSystemGenerated (boolean), scope ORGANIZATIONWORKSPACE), or status ACTIVEINACTIVE). Max limit: 50.
Create Workspace Role — 201 Created
name and description are required. permissions is optional and must be WORKSPACE_USER audience only. Role names cannot use reserved prefixes ORGANIZATION_OWNER, WORKSPACE_MEMBER).
Get Role Details
Update Workspace Role
permissions list replaces the entire permission set** — omitted permissions are removed. System-generated roles cannot be modified.
Delete Workspace Role — 204 No Content
Workspace Member Role Assignment
Change Workspace Member Role
Onboarding Users with proper role-permission
These endpoints are called by the Identity Service during user and workspace onboarding flows.Onboard Organization Owner — 201 Created
ORGANIZATION_OWNER role for the organization and assigns it to the user with all default permissions. This is a one-time setup per organization — subsequent calls for the same organization will fail.
Onboard Workspace Member — 201 Created
- If
role_idis omitted, the workspace’s default role is used (or an org-level default is created automatically) - If
role_idis provided, that custom role is assigned instead - Set
save_as_default: truewith arole_idto make it the default role for future members of this workspace
Authorization Check
These endpoints are used by the API Gateway to verify whether a user has permission to access a specific resource.Check Permission by Verbex ID
workspace_id is optional — omit it for organization-level resource checks.
Check Permission by User ID
Errors
| Status | When |
|---|---|
| 400 | Invalid input or reserved role name |
| 403 | Modifying/deleting a system-generated role, or user lacks permission for the requested resource |
| 404 | Role, permission, or workspace not found |
| 409 | Duplicate role name in the organization |

