On This Page

Home / Edge/ Access Management/Members

Members

Control access to Cribl products by inviting and managing Members.


Members work together with Teams and Permissions to enable fine-grained access control and authorization.

Members page in Cribl.Cloud
Members page in Cribl.Cloud
Members page in an on-prem deployment
Members page in an on-prem deployment

Availability

Member- and Permission-based access control is available on:

On on-prem Single-instance deployments, or Distributed deployments with other licenses, all users will have full Admin-level privileges.

Initial Permissions

When you first deploy Cribl Edge with the above prerequisites, you will be granted the Organization-level Admin Permission. Using this Permission, you can then assign additional Permissions to yourself and other Members.

Cross-Compatibility

Members and Permissions are available as the successors to Cribl’s original role-based access control (RBAC) model of Local Users and Roles/Policies. The earlier model is still supported across most of the Cribl product suite.

However, Cribl.Cloud invitations and Stream Projects have fully transitioned to the new model. For detailed differences between the two access control systems, see Which Access Method Should I Use?.

Known Issue

Existing Local Users display in Settings > Global > Members and Teams with the No Access Permission even if they’ve been assigned a higher Role. This is a display-only bug: These users’ original Roles still function as configured. For details and fix progress, please see Known Issues.

Organizations

The Members and Permissions model uses the concept of Organization as a container for the deployment of a whole suite of Cribl products (Stream, Edge, and Cloud-only Search and Lake).

In Cribl.Cloud, each account has one Organization. Use Workspaces for multi-tenancy within your Organization. Contact Cribl Support if you have a use case that requires more than one Organization.

To access the Organization-level Members as an Admin:

Cribl.CloudOn-Prem Deployment

Invite Members

To invite new Members to your Organization:

Cribl.CloudOn-Prem Deployment

Responding to Invites

When you send an invite from a Cribl.Cloud deployment, the new Member receives an email with an Accept Invitation link to either sign into their existing Cribl.Cloud account, or sign up to create an account and its credentials.

After a Member signs in, they’ll have access to your Organization and Cribl Edge instance at the Permission level you’ve specified.

Manage Cribl.Cloud Invites

While an invite is pending, the Members & Teams page offers you these options in the Action column to deal with commonly encountered issues:

  • Resend Invite: If your invited Member didn’t receive your invitation email, you can select this button to resend it.
  • Copy Invite Link: If emails aren’t getting through at all, select this button to copy and share a URL that will take the invitee directly to the signup page. This target page encapsulates the same identity, Organization, and Permission you specified in the original email invite.
  • Revoke Invite: This is for scenarios where you need to revoke a pending invite. (You sent someone a duplicate invite, your invitee is spending too much time in space to be a productive collaborator, etc.) After selecting this button, you’ll see a confirmation dialog.

An invite expires after seven days if it has been neither accepted nor revoked. It must then be resent.

Managing Invites
Managing Invites

Remove Members

To remove a Member from your Organization:

Cribl.CloudOn-Prem Deployment

Removing SSO Members

If your Cribl.Cloud Organization is using SSO integration, the IDP (identity provider) admin manages Members in the IDP system. When you remove such a Member from the IDP, they will still be left in the Members list in the UI.

After removing the Member from the IDP, you also need to manually delete them from the Members list in the Cribl.Cloud Portal to completely remove them from the UI.

Members and Local Users

In on-prem deployments, Members and Local Users are interchangeable: Members can be reconfigured using legacy Roles instead of Permissions, and anyone you add to Local Users will also show in Members.