imper.ai uses a global role-based access control (RBAC) model to manage who can configure, operate, and review the platform.
This article focuses on system-enforced permissions and access boundaries, not on organizational ownership or operational responsibilities.
In this article
Global role model
imper.ai permissions are defined globally and apply consistently across features. Roles determine access to configuration, monitoring, and remediation capabilities.
Administrators
Administrators are responsible for platform configuration and policy control.
Manage integrations and system connections
Define risk thresholds and remediation policies
Manage protected users and organizational settings
Operators
Operators interact with imper.ai during live workflows. This includes helpdesk agents and security analysts.
View verification outcomes and risk indicators
Perform manual remediation actions when permitted
Investigate incidents using provided context
Viewers and auditors
Viewer and auditor roles provide read-only access for compliance and oversight.
View Audit Log entries
Review incidents and verification outcomes
No ability to modify configuration or policies
Note: Helpdesk agents are typically assigned operator-level access, allowing them to act on verification outcomes without administrative privileges.