Documentation Index
Fetch the complete documentation index at: https://docs.coreweave.com/llms.txt
Use this file to discover all available pages before exploring further.
About legacy permissions
CoreWeave previously used a group-based permissions model with five predefined groups. This model is still functional but has been superseded by IAM Access Policies, which offer more flexible, role-based access control. This page serves as a reference for organizations still using the legacy groups.Legacy user groups and permissions
CoreWeave provides the following legacy user groups for organization users:adminreadmetricswritebilling_viewer
Mapping legacy groups to IAM roles
The following table shows the CoreWeave legacy permissions mapped to their corresponding new roles:| CoreWeave Legacy Group | Corresponding IAM Roles |
|---|---|
admin | IAM Admin, CKS Admin, Object Storage Admin, Access Token Admin, Access Request Approver |
write | CKS Admin, Object Storage Admin, Access Token Admin |
read | IAM Viewer, CKS Viewer, Access Token Viewer |
metrics | Observability Viewer |
billing_viewer | Billing Viewer |
Group permissions in detail
Managed Auth leverages KubernetesRoleBindings and ClusterRoleBindings to define user permissions within CKS organizations. Organizations are allocated a single namespace in which organization members can create clusters. Users may then be granted specific permissions to perform actions within a given cluster. The CKS-related legacy permission groups map directly to standard Kubernetes user-facing groups, where the CKS permission groups map accordingly to standard groups:
| CoreWeave Legacy Group | Kubernetes Role Mapping | CoreWeave IAM Role Name |
|---|---|---|
admin | cluster-admin | CKS Admin |
write | edit | CKS Admin |
read | view | CKS Viewer |
metrics- Observability Viewerbilling_viewer- Billing Viewer
admin group permissions
In the IAM Access Policies model, the
admin group equivalent IAM roles are: IAM Admin, CKS Admin, Object Storage Admin, Access Token Admin, Access Request Approver.admin group. Every organization must have at least one admin.
Admins can assign users to groups using the command write_groups_user_assignments and can edit initial user access permissions until the user accepts the invitation.
Admins can perform the following actions for cluster and user management:
Manage Clusters
- Create new CKS clusters in your CoreWeave organization
- View existing cluster configurations
- Create and view cluster API Access Tokens
- Create and view SAML configurations
- Open support tickets through Freshdesk
- View metrics and logs for all clusters
Manage users
- Invite new users to the organization
- Assign users to specific groups, including the admin group, both before and after sending an invitation
- Deactivate other user accounts, including admin user accounts
- Remove users from groups
- View user groups and their members
Admin users may add and remove others from clusters at any time. They may also assign
admin privileges to other users. Admins can also deactivate or reactivate any user in their organization via the write_org_users cluster action.write group permissions
In the IAM Access Policies model, the
write group equivalent IAM roles are: CKS Admin, Object Storage Admin, Access Token Admin.write group may perform the following actions for cluster and user management:
- Create new CKS clusters in your CoreWeave organization
- View existing cluster configurations
- Create and view cluster API Access Tokens
- Open support tickets through Freshdesk
- View metrics and logs for all clusters
- View user groups and their members
metrics group permissions
In the IAM Access Policies model, the
metrics group equivalent IAM role is: Observability Viewer.metrics group may perform the following actions:
- Access CoreWeave Grafana to view dashboards and explore metrics and logs for all clusters
- Access the CoreWeave Logs and Metrics APIs to query metrics and logs for all clusters
read group permissions
In the IAM Access Policies model, the
read group equivalent IAM roles are: IAM Viewer, CKS Viewer, Access Token Viewer.read group may perform the following actions:
- View existing cluster configurations
- Open support tickets through Freshdesk
read group cannot view metrics and logs for all clusters.
billing_viewer group permissions
In the IAM Access Policies model, the
billing_viewer group equivalent IAM role is: Billing Viewer.billing_viewer group may perform the following actions:
- View billing data, including the billing dashboard, current balance, and listing or downloading invoices