Permissions in Console
What you can do and access in Console depends on the permissions you have. Users with the User Management permissions can create users and assign them permissions based on the tasks they want to perform in Console.
To view your permissions, from the navigation menu, select Account → User Management. Click on the three dots corresponding to your account and select "My Permissions".
To view other user's permissions, on the User Management screen, click on the three dots corresponding to their account and select "Overview". You can quickly adjust their permissions by clicking the pencil icon on each permission.
To learn more about managing users in Console, see "Add User Accounts".
There are 3 different groups of permissions in Console:
General permissions
Product-specific permissions
ATS resource permission
General permissions
General permissions grant users the ability to manage products and user access in your Console account. General permissions consist of the following:
Subscription Management: Allows a user to add products from the marketplace and edit company information.
User Management: Allows the inviting of new users to the account. Each user can only grant permissions to the level of his/her own permissions.
Product-Specific Permissions
Product-specific permissions define the access a user has to products in Console. For each product in your subscription, you can grant users the following permissions:
Read: Allows a user to see the configuration of a given product.
Edit: Allows a user to see, edit and save the configuration of a given product.
Publish: Allows a user to publish configurations of a given product (applies to ATS JS, Privacy Manager, Registration Manager, and LaunchPad).
Add: Allows a user to add new configurations to a given product (applies to ATS, Privacy Manager, Registration Manager, and LaunchPad).
Delete: Allows a user to delete configurations of a given product.
ATS Resource Permissions
ATS resource permissions allow a more granular control over which ATS placements (and their linked configurations) a user can access and the tasks they can perform. If a user does not have permissions to a given placement or configuration, it will not be visible to them.
For each ATS placement, you can grant users the following permissions:
Note
ATS resource permissions are granted to all users with similar access to ATS by default. For example, if a user only has read permission for ATS, they will automatically be granted read permission for all ATS placements and configurations.
Read: Allows a user to see the placement or configuration setting.
Edit: Allows a user to see, edit, and save the placement or configuration.
Publish: Allows a user to publish the placement or configuration.
Delete: Allows a user to delete the placement or configuration.