Invitations and RBAC

Managing Members, Invites, and Access Control in doable.sh

In doable.sh, managing members and controlling access is crucial for maintaining a secure and organized workspace. Here’s a breakdown of how to manage members, send invites, and control access roles effectively.

Managing Organization Members

To view and manage your organization members:

  1. Go to the Members section from the sidebar.
  2. You will see a list of existing members, along with their Name, Email, Role, and the Date Created.
  3. Use the Search Email field to find specific members quickly.
  4. Use the Role filter to view members with a specific role.

Editing Member Roles

You can change a member’s role by clicking the Actions menu next to their name:

  • Click Edit Role and select one of the following:
    • Viewer: Can view sessions and logs but cannot make changes.
    • Developer: Can configure operators and access API settings.
    • Billing: Can manage subscriptions and billing settings.
    • Admin: Has full access to manage members, operators, and settings.

Removing Members

To remove a member:

  1. Click the Actions menu.
  2. Select Remove to permanently revoke access.

Inviting New Members

To invite new members to your organization:

  1. Go to the Members section.
  2. Click Invite Members.
  3. You can either:
    • Share the Invite Link: Copy the link to invite multiple users.
    • Send Invite Link via Email: Enter the email address and click Send Invite.

⚠️ Important: The invite link will only work for users who are already logged into doable.sh. If the invitee does not have an account, they will not be able to use the invite link. Make sure to inform your invitees to create an account first, and then click the invite link to join your organization.

Managing Invitations

  • You can track pending invitations and manage access requests from the Invite Members page.
  • You can regenerate the invite link if needed by clicking the refresh icon next to the link.

Access Control Best Practices

Role Assignment

Assign roles based on the principle of least privilege:

  • Viewer: For stakeholders who only need to monitor activities.
  • Developer: For team members working on AI operator configurations.
  • Billing: For finance or account managers.
  • Admin: Reserved for organization leaders or IT administrators.

Monitoring Member Activity

Regularly review the Activity Log to monitor member actions and detect any unusual activity.

Managing Permissions

Update or remove permissions as team roles change to ensure that only authorized users can make critical changes.


Why Access Control Matters

Maintaining a structured access control system ensures:

  • Security: Only authorized users can change configurations or access sensitive data.
  • Efficiency: Members have the appropriate permissions to perform their tasks.
  • Accountability: Activity logs track changes made by each user, helping trace any issues to specific actions.

By implementing these best practices and utilizing doable.sh’s member management features, you can efficiently control who has access to your AI operators and ensure the security of your organization.