Skip to content

Users and Roles

vBox uses a workspace-based RBAC (Role-Based Access Control) system where permissions are determined dynamically per workspace or customer organization. This means a user’s effective role can vary depending on which resource they are accessing.

vBox defines three primary roles. Roles are derived from permission strings assigned at the workspace or customer level:

RoleInternal PermissionDescription
Organization Reader(default — no elevated permission)Read-only access to assigned organization dashboards and recommendations
Organization Contributor (MSP)Temp.OrganizationContributorFull operational access — assessments, customer management, workspace navigation
Organization Owner (Account Manager)Temp.OrganizationOwnerCustomer relationship management — organization settings, user management, reports

Organization Readers have the most restricted access level, designed for end customers who need to view their organization’s data.

Capabilities:

  • View dashboards for assigned organizations
  • Access recommendations (Security, Operations, Cost)
  • View cost details and historical data
  • Create and manage tasks
  • View reports and summaries

Restrictions:

  • Cannot access workspace management
  • Cannot modify organization settings
  • Cannot manage users
  • Cannot create or manage assessments
  • Can only access organizations they are explicitly assigned to

Organization Contributors are MSP (Managed Service Provider) users with comprehensive access to manage multiple customer organizations.

Capabilities:

  • All Organization Reader capabilities
  • Create and manage assessments (Cost, Security, Operations)
  • View and navigate workspaces
  • Create and manage customer organizations
  • Configure organization settings through the customer wizard
  • Access all customer dashboards and reports
  • Manage organization users (Readers, Contributors, Owners)
  • Configure feature toggles and subscription plans
  • Set up notifications and ITSM integration
  • Import recommendations and questionnaires
  • Edit recommendation properties
  • Access Advanced optimizations tab

Organization Owners focus on customer relationship management and have elevated access to customer-facing features.

Capabilities:

  • View customer organizations and profiles
  • Manage customer information and settings
  • View customer dashboards and reports
  • Manage users within customer organizations
  • Access customer summaries and recommendations
  • Access Advanced optimizations tab

Restrictions:

  • Cannot access workspace management
  • Cannot create or manage assessments
  • Cannot modify technical settings (subscriptions, scheduling)

In addition to role-based access, vBox has granular inventory view permissions that control access to resource-level data:

PermissionConstantControls
Cost Inventory ViewOptimizationInventory.ViewAccess to cost recommendation resource inventory and export
Security Inventory ViewSecurityInventory.ViewAccess to security recommendation resource tabs and export
Operations Inventory ViewOperationsInventory.ViewAccess to operations recommendation resource inventory and export

vBox implements route guards that enforce access control throughout the application. Guards wait for permissions to load before evaluating access, ensuring accurate authorization.

Route GuardProtected RoutesRequired Role
canActivateMspMSP-specific features (assessments, imports, workspace creation/editing)Organization Contributor
canActivateCustomerRouteCustomer organization routesContributor or Owner (plus assignment check)
canActivateWorkspaceRouteWorkspace management routesUser must have access to the specific workspace
canActivateChildFeatureFlagFeature-specific routesUser with access + feature flag enabled for the organization

canActivateMsp

  • Allows: Organization Contributors
  • Blocks: Organization Readers, Organization Owners (unless the route also permits Owners)
  • On denial: Redirects to home with snackbar message

canActivateCustomerRoute

  • Allows: Contributors, Owners
  • Also checks: User assignment to the specific organization
  • For Contributors: Checks all accessible customers
  • For Readers: Only checks their explicitly assigned clientsIds
  • On denial: Redirects to home with snackbar message

canActivateWorkspaceRoute

  • Validates: The workspaceId exists in the user’s accessible workspaces
  • On denial: Redirects to home with snackbar message

canActivateChildFeatureFlag

  • Checks: Feature flag is enabled for the route’s organization
  • On denial: Redirects to home

If you navigate to a resource you do not have permission to access, vBox displays a dedicated Unauthorized (403) page with:

  • A clear error message explaining the access denial
  • A link to contact support at help@vboxcloud.com (pre-filled with your error details)
  • A Log out button to switch accounts if needed

vBox uses Microsoft Entra ID On-Behalf-Of (OBO) authentication for actions that require direct access to your Azure resources.

The OBO authorization modal appears automatically before:

  • Running a manual assessment
  • Deploying an assessment environment
  • Starting an assessment
  1. A modal appears titled “vBox Authorization” explaining that Microsoft Entra ID consent is required
  2. Click the Authorize button to open a Microsoft authentication popup
  3. Sign in and grant consent in the popup window
  4. The popup closes and you are returned to vBox with authorization complete

If authorization fails, a snackbar notification will display an error message. Common causes:

  • The Microsoft popup was blocked by your browser — allow popups for the vBox domain
  • Your Azure AD account does not have sufficient permissions
  • Network connectivity issues during the authentication flow

You can check your OBO authorization status in the Global Settings dialog (accessible from the application header for Contributors). The Azure Authorization section shows:

  • A checkmark icon if vBox is authorized to access Azure resources on your behalf
  • A warning icon if authorization is needed or has expired

Within each customer organization, users are assigned to specific roles through the Customer Configuration Wizard (Step 3):

RoleAssignmentDescription
Organization ReadersAdd/remove with Email, First Name, Last NameUsers with read-only access to organization data
Organization ContributorsAdd/remove with Email, First Name, Last NameMSP users assigned to manage this organization
Organization OwnerSelect from Organization ContributorsPrimary account manager for the customer
Scheduled Data Collection UserSelect from Organization ContributorsUser account used for scheduled data collection runs
  1. Principle of Least Privilege — Assign users only the minimum access level required
  2. Regular Audits — Periodically review user assignments to ensure they are still appropriate
  3. Clear Responsibilities — Document which Contributors are responsible for which organizations
  4. Owner Assignment — Ensure each customer has a designated Organization Owner
  5. Data Collection User — Verify the Scheduled Data Collection User has appropriate Azure permissions

Feature visibility depends on three factors: user role, feature flags, and organization assignment.

FeatureOrganization ReaderOrganization OwnerOrganization Contributor
DashboardsAssigned orgs onlyAssigned orgs onlyAll orgs
RecommendationsAssigned orgs onlyAssigned orgs onlyAll orgs
TasksAssigned orgs onlyAssigned orgs onlyAll orgs
Customer ManagementNoYesYes
AssessmentsNoNoYes
Workspace ManagementNoNoYes
Global SettingsNoNoYes

Features enabled for the customer organization control access to specific areas:

Feature FlagRoutes AffectedDescription
Security/organization/:customerId/securitySecurity features and Secure Score
Operations/organization/:customerId/operationsOperations features and Observability Score
Cost Details/organization/:customerId/costDetailed cost analysis
BI AnalyticsSummary pagesEmbedded Metabase dashboards
Tasks/organization/:customerId/tasksTask management features

Organization Readers can only access organizations to which they are explicitly assigned. Organization Contributors have access to all organizations within their accessible workspaces.

Organization Contributors can access the Global Settings dialog from the application header. It includes:

  • Displays the current OBO authorization status (authorized or needs authorization)
  • See OBO Authentication above for details
  • Tree-based selector for choosing which workspaces and organizations appear in your navigation
  • Search field with clear button to filter the tree
  • Toggle Collapse button to expand/collapse all nodes
  • Select All option at the top of the tree
  • At least one workspace or organization must be selected
  1. Role Assignment — Regularly audit user role assignments to ensure they match current responsibilities
  2. Organization Access — Verify that users only have access to organizations they should manage
  3. Feature Flags — Ensure feature flags match subscription plans to prevent unauthorized access
  4. Scheduled Data Collection User — Ensure the data collection user has appropriate Azure permissions and is kept up to date
  5. OBO Authorization — Review OBO authorization status periodically in Global Settings

If you are experiencing access issues:

  1. Verify Role — Confirm your user role has the required permissions for the resource you are trying to access
  2. Check Assignment — Ensure you are assigned to the organization (for Organization Readers)
  3. Feature Flags — Verify the feature is enabled for the organization
  4. OBO Authorization — If running assessments, check that OBO authorization is complete in Global Settings
  5. Unauthorized Page — If you see the 403 page, use the support email link to request access
  6. Contact Administrator — Reach out to your vBox administrator if issues persist