Skip to content

Scopes

Every API token has a set of scopes that control what it can access. Scopes follow a hierarchy — higher scopes automatically include lower ones.

ScopeDescriptionIncludes
user:readView jobs, workflows, profile, model status
user:writeCreate jobs, execute workflows, submit requestsuser:read
admin:readView org members, invites, tokens, billinguser:read
admin:writeManage org members, invites, tokens, instances, policiesadmin:read, user:write, user:read
worker:readGPU worker read access
worker:writeGPU worker operations (heartbeats, blob upload)worker:read
system:readInfrastructure monitoring (instances, heartbeats, system status)admin:read, user:read
system:writeFull system administrationsystem:read, admin:write, admin:read, user:write, user:read
system:write
├── system:read
│ └── admin:read
│ └── user:read
├── admin:write
│ ├── admin:read
│ │ └── user:read
│ └── user:write
│ └── user:read
└── user:write
└── user:read
worker:write (independent — not included in system:*)
└── worker:read

Worker scopes are independent from the user/admin/system hierarchy. A system:write token cannot access worker endpoints, and a worker:write token cannot access user endpoints.

Use presets when creating tokens to quickly assign common scope combinations.

Available to all users in the dashboard:

PresetLabelScopes
userReadOnlyUser (Read-only)user:read
userFullUser (Full)user:read, user:write
adminReadOnlyAdmin (Read-only)admin:read
adminFullAdmin (Full)admin:write

Available to system org admins only (Admin UI):

PresetLabelScopes
workerWorker Service Accountworker:write
systemReadOnlySystem (Read-only)system:read
systemFullSystem (Full)system:write

A user’s org role limits the maximum scopes they can assign to tokens:

RoleMaximum ScopesCan Create Service Accounts
Owneradmin:write (+ system:* if system org)Yes
Adminadmin:write (+ system:* if system org)Yes
Memberuser:writeNo
DisabledNoneNo

When a token is used, its effective scopes are the intersection of the token’s scopes and the user’s role scopes. If a user is downgraded from Admin to Member, their existing admin-scoped tokens lose access to admin endpoints.

Use CaseRecommended Scopes
CI/CD pipeline (submit jobs, read results)user:read, user:write
Read-only dashboard / monitoringuser:read
Org management automationadmin:write
Monitoring-only admin accessadmin:read
GPU worker service accountworker:write

For CI/CD and automation, prefer the User (Full) preset — it grants access to all data plane operations without org management privileges.

TypeCreated ByVisible ToUse Case
Regular API tokenAny userToken owner (members), all tokens (admins)API access, integrations
Service accountAdmins onlyAdmins onlyAutomation, CI/CD with elevated privileges
Session tokenOAuth login (automatic)Hidden in dashboardBrowser sessions

See the API Tokens guide for how to create and manage tokens.