Available to organizations on Enterprise+ (or Enterprise with the Permissions Management Add-on).
Role-based access control (RBAC) with custom roles allows organizations to create and manage organization-level custom user roles, providing centralized control over what users can do in Asana. Super admins can define roles with specific permission sets and assign these roles to users—helping organizations meet security and compliance requirements and standardize how users work in Asana.
With RBAC, permissions are associated with roles rather than individual users, making it easier to manage access across your organization.
Control what actions users can perform across Asana, including creation, deletion, account permissions and more. Visit our permissions overview article for more information.
Follow the steps below to set up roles and permissions for your organization.
You can view and configure all user roles in one place from the Manage roles page in the admin console.
Custom roles should be created when more precise controls over the permissions a user or group of users should have in Asana are needed.
Roles should be modified as your organization needs change.
Assigning users to user roles gives control over the permissions a user or groups of users has in Asana.
Tip
You can bulk assign roles through CSV user import. Learn more.
Role defaults set the role new users receive when joining Asana
Tip: Role defaults apply when people sign up to join your organization, are invited by other users and in less common scenarios where automatic role assignment occurs. Select default roles with permissions you are comfortable with any user receiving by default. Users’ roles may always be adjusted from the Members tab in the Admin Console.
Who can create, manage and assign roles?
By default, only super admins can create and manage roles. The standard admin role (and custom roles based on admin) can assign users to an existing user role, but cannot create new custom roles or modify role permissions. Super admins can manage admin user management permissions to either grant the ability to manage roles or restrict the ability to assign roles.
Can the permissions of standard roles be modified?
Yes, super admins can modify the configurable permissions associated with standard roles to better fit their organization's needs.
If I create a custom role based on "Member" and updates are later made to the "Member" standard role, will my custom role also change?
No, the configurable permissions for custom roles are independent after creation. Changes to the configurable permissions of a standard role will not automatically apply to existing custom roles based on it. New custom roles created after changes are made to standard roles will use the current permissions of the standard role as the starting default.
Can I rename the standard roles to better fit my organization's terminology?
No, standard roles may not be renamed.
Can I customize the standard "Super Admin" role?
No, the permissions for the Super Admin role are fixed and cannot be modified.
Can division admins manage roles within their specific division?
No, currently RBAC is available to organizations only, and role permissions apply to users at the organization level.
Can I change the default role assigned to new internal or external users?
Yes, this can be done using the ‘Default role’ setting in the security tab of the admin console. Additionally, there are role-level defaults that set the role for new users invited by users with that role. We recommend using these defaults thoughtfully to avoid permission escalation.
Can multiple roles be assigned to a single user?
No, each user can only have one role assigned at a time.
What user role does a user get assigned to?
Everyone in Asana has a user role. Here are the different ways role assignment can happen:
What role will a user receive if they are invited by multiple users before accepting their invite?
If a user is invited by multiple users before accepting their invite, they will receive the role from the first invite. If the user is invited by an admin from the admin console, this role assigned by the admin will take precedence over any other invite role. Super admins or admins with the role assignment permission can view pending invites and change users’ role in the admin console.
If a user's role is changed, are they automatically notified?
No, users are not automatically informed about role or permissions changes.
Are users able to see their role or request role changes from the Asana app?
No, users are not able to see their user role and there is currently no way to request upgraded permissions through Asana. The user experience differs based on the permission; in some cases, features are completely hidden whereas for others, users see the feature in a disabled state.
How do organization default settings interact with user roles?
Organization default settings are in place for some of the permissions that may also be customized at the role level via RBAC. These settings can be accessed in the admin console in the Security and App settings tabs. They include:
If a permission is disabled or modified at the organization level using the organization default setting, this will override role permissions and it will not be configurable at the role level. In order to configure the setting at the role level, the org default setting must be turned on.
I have previously used organization settings to change permissions in my domain. Will these defaults remain in place when I start using RBAC?
Yes, when you begin using RBAC, the permissions settings that have been configured already for your domain will remain in place and be reflected in the permissions for RBAC roles. This means your starting defaults for standard roles may be different from what the Asana default for each role looks like.
How do user roles interact with permissions on projects or other work objects in Asana?
The RBAC user role and permissions determine a user's capabilities across an entire Asana instance, whereas object access level permissions determine a user's capabilities specific to a particular Asana object. The Asana permissions system works together to address a range of access control use cases.
The following table compares RBAC user roles with object access levels
|
Comparison |
RBAC User Role |
Object Access Level |
|
Who assigns the role? |
Org super admin |
Object admin |
|
Where is the role managed? |
Org admin console |
Object share modal or settings |
|
What is the scope of the role permissions? |
Applies org wide, across all objects |
Applies to a single object |
|
Example permissions |
|
|
How does a user’s license interact with their role?
License and role are independent of each other but both affect what a user can ultimately do in Asana.
In order to take an action in Asana, a user needs both a sufficient license and role.
As an example, two users may be assigned the project manager custom user role in Acme org. This role has ‘Create company goal’ permissions on.
Users can't perform actions despite having the appropriate role
Asana's AI Permissions within RBAC allow admins to manage deployment of AI features on a role-by-role basis.
Admins can currently control four AI-related permissions within RBAC:
Asana AI: Disabling the top-level Asana AI permission disables the sub-permissions (e.g., Core AI, Proactive AI, etc.) for members of a particular role.
Organization-wide AI settings enable and disable Asana AI for all users within an organization, while RBAC AI Permissions enable similar choices solely for members of a particular role. Organization-wide AI settings can be found in the "Asana AI" section of the admin console. Organization-wide AI settings take priority over AI permissions within RBAC. This means that, for any user to access AI features, those features must first be enabled for the entire organization. If you have disabled Asana AI overall, no one can use it within your domain, regardless of their role-specific permissions.
By default all AI permissions are enabled for all standard and custom roles. You must edit a role to disable these permissions and restrict access. If a user has AI permissions but the organization has turned off AI, the user will not be able to use AI features.
If a user's role does not include an AI permission, they will either not see the entry point for that feature, or the feature will appear as disabled. This indicates that their access has been restricted by an admin.
No — these controls are not intended to entirely shield users from AI. For example, users without AI RBAC permissions may be able to trigger AI Studio rules created and owned by others. If you wish to disable AI for your organization, use the organization-wide setting.