{"id":325,"date":"2023-01-12T16:01:13","date_gmt":"2023-01-12T16:01:13","guid":{"rendered":"https:\/\/blog.spike.sh\/2023\/01\/12\/fine-grained-access-control-and-roles\/"},"modified":"2025-06-06T12:35:03","modified_gmt":"2025-06-06T07:05:03","slug":"fine-grained-access-control-and-roles","status":"publish","type":"post","link":"https:\/\/blog.spike.sh\/fine-grained-access-control-and-roles\/","title":{"rendered":"Easy to Manage Fine-Grained Access Control and Roles"},"content":{"rendered":"\n<nav aria-label=\"Table of Contents\" class=\"wp-block-table-of-contents\"><ol><li><a class=\"wp-block-table-of-contents__entry\" href=\"https:\/\/blog.spike.sh\/fine-grained-access-control-and-roles\/#visualise-before-changing-permissions\">Visualise before changing permissions<\/a><\/li><li><a class=\"wp-block-table-of-contents__entry\" href=\"https:\/\/blog.spike.sh\/fine-grained-access-control-and-roles\/#create-your-own-roles\">Create your own roles<\/a><\/li><\/ol><\/nav>\n\n\n\n<p class=\"wp-block-paragraph\">A neatly setup access control telling which user can do exactly what on an incident management platform can save a <em>lot<\/em> of time and hassle in the future. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In the past, Spike.sh had only 2 roles &#8211; Admin and Member. The only difference in these roles were that only Admins can remove members. It was fairly simple and most users liked it. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">However, with larger teams coming onboard, it gets a little difficult to control for admins. So, we have empowered the existing system by adding two more roles. Here are all the roles you can choose from &#8211;<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Admin<\/li>\n\n\n\n<li>Manager<\/li>\n\n\n\n<li>Member<\/li>\n\n\n\n<li>Viewer<\/li>\n\n\n\n<li>&lt;<em>you can create your own role<\/em>><\/li>\n<\/ol>\n\n\n\n<p class=\"wp-block-paragraph\">Check out this table to understand the difference in permissions for each role.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><!--kg-card-begin: markdown--><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Permission<\/th><th>Admin<\/th><th>Manager<\/th><th>Responder<\/th><th>Viewer<\/th><\/tr><\/thead><tbody><tr><td>Customsise roles<\/td><td>\u2705<\/td><td>\u2705<\/td><td>&#8211;<\/td><td>&#8211;<\/td><\/tr><tr><td>Create custom roles<\/td><td>\u2705<\/td><td>\u2705<\/td><td>&#8211;<\/td><td>&#8211;<\/td><\/tr><tr><td>Change user roles<\/td><td>\u2705<\/td><td>\u2705<\/td><td>&#8211;<\/td><td>&#8211;<\/td><\/tr><tr><td>Remove users<\/td><td>\u2705<\/td><td>&#8211;<\/td><td>&#8211;<\/td><td>&#8211;<\/td><\/tr><tr><td>Take actions on incidents<\/td><td>\u2705<\/td><td>\u2705<\/td><td>&#8211;<\/td><td>&#8211;<\/td><\/tr><tr><td>Manage teams<\/td><td>\u2705<\/td><td>\u2705<\/td><td>&#8211;<\/td><td>&#8211;<\/td><\/tr><tr><td><strong>permissions against all entities<\/strong>*<\/td><td><\/td><td><\/td><td><\/td><td><\/td><\/tr><tr><td>Read<\/td><td>\u2705<\/td><td>\u2705<\/td><td>\u2705<\/td><td>\u2705<\/td><\/tr><tr><td>Create<\/td><td>\u2705<\/td><td>\u2705<\/td><td>\u2705<\/td><td>&#8211;<\/td><\/tr><tr><td>Update<\/td><td>\u2705<\/td><td>\u2705<\/td><td>\u2705<\/td><td>&#8211;<\/td><\/tr><tr><td>Archive\/Delete<\/td><td>\u2705<\/td><td>\u2705<\/td><td>&#8211;<\/td><td>&#8211;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><!--kg-card-end: markdown--><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><em>*entities include incidents, integrations, services, on-call schedules, escalations, uptime, and automations<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"visualise-before-changing-permissions\">Visualise before changing permissions<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The UI is incredibly simple for admins and managers to visualise the changes before they change permissions.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large kg-card kg-image-card kg-card-hascaption\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"726\" data-attachment-id=\"754\" data-permalink=\"https:\/\/blog.spike.sh\/fine-grained-access-control-and-roles\/acl-demo\/\" data-orig-file=\"https:\/\/blog.spike.sh\/wp-content\/uploads\/2023\/01\/ACL-demo.gif\" data-orig-size=\"2180,1546\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"ACL-demo\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.spike.sh\/wp-content\/uploads\/2023\/01\/ACL-demo-1024x726.gif\" src=\"https:\/\/blog.spike.sh\/wp-content\/uploads\/2023\/01\/ACL-demo-1024x726.gif\" alt=\"\" class=\"wp-image-754\" srcset=\"https:\/\/blog.spike.sh\/wp-content\/uploads\/2023\/01\/ACL-demo-1024x726.gif 1024w, https:\/\/blog.spike.sh\/wp-content\/uploads\/2023\/01\/ACL-demo-300x213.gif 300w, https:\/\/blog.spike.sh\/wp-content\/uploads\/2023\/01\/ACL-demo-768x545.gif 768w, https:\/\/blog.spike.sh\/wp-content\/uploads\/2023\/01\/ACL-demo-1536x1089.gif 1536w, https:\/\/blog.spike.sh\/wp-content\/uploads\/2023\/01\/ACL-demo-2048x1452.gif 2048w, https:\/\/blog.spike.sh\/wp-content\/uploads\/2023\/01\/ACL-demo-1200x851.gif 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">visualise access control changes before changing permissions<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Responders, viewers, and any custom roles can also check permissions for other members but cannot change the roles though.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"create-your-own-roles\">Create your own roles<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">For more customisations, you can create say, a <strong>Support member role<\/strong>, who can take actions against an incident and create more escalation policies but nothing else. This free form will allow you to add support roles, sales teams, security teams, among others. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large kg-card kg-image-card kg-card-hascaption\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"698\" data-attachment-id=\"756\" data-permalink=\"https:\/\/blog.spike.sh\/fine-grained-access-control-and-roles\/screenshot-2023-01-12-at-9-25-56-pm\/\" data-orig-file=\"https:\/\/blog.spike.sh\/wp-content\/uploads\/2023\/01\/Screenshot-2023-01-12-at-9.25.56-PM.png\" data-orig-size=\"2144,1462\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screenshot-2023-01-12-at-9.25.56-PM\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.spike.sh\/wp-content\/uploads\/2023\/01\/Screenshot-2023-01-12-at-9.25.56-PM-1024x698.png\" src=\"https:\/\/blog.spike.sh\/wp-content\/uploads\/2023\/01\/Screenshot-2023-01-12-at-9.25.56-PM-1024x698.png\" alt=\"\" class=\"wp-image-756\" srcset=\"https:\/\/blog.spike.sh\/wp-content\/uploads\/2023\/01\/Screenshot-2023-01-12-at-9.25.56-PM-1024x698.png 1024w, https:\/\/blog.spike.sh\/wp-content\/uploads\/2023\/01\/Screenshot-2023-01-12-at-9.25.56-PM-300x205.png 300w, https:\/\/blog.spike.sh\/wp-content\/uploads\/2023\/01\/Screenshot-2023-01-12-at-9.25.56-PM-768x524.png 768w, https:\/\/blog.spike.sh\/wp-content\/uploads\/2023\/01\/Screenshot-2023-01-12-at-9.25.56-PM-1536x1047.png 1536w, https:\/\/blog.spike.sh\/wp-content\/uploads\/2023\/01\/Screenshot-2023-01-12-at-9.25.56-PM-2048x1397.png 2048w, https:\/\/blog.spike.sh\/wp-content\/uploads\/2023\/01\/Screenshot-2023-01-12-at-9.25.56-PM-1200x818.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">a custom support role with limited permissions<\/figcaption><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"wp-block-paragraph\">Visit your Organisation settings &gt; Team to access and try the new access control. Let us know what you think on <a href=\"mailto:kaushik@spike.sh\">kaushik@spike.sh<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Special thanks to Petro Mamrai for requesting this feature.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The new access control and custom roels allow admins and managers alike to fine-tune controls for their teams. Enable larger teams to manage their incidents with ease.<\/p>\n","protected":false},"author":191914268,"featured_media":752,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","_import_markdown_pro_load_document_selector":0,"_import_markdown_pro_submit_text_textarea":"","_lmt_disableupdate":"","_lmt_disable":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_wpas_customize_per_network":false},"categories":[1442],"tags":[1379,1364,1376],"class_list":["post-325","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcement","tag-announcements","tag-getting-started","tag-productivity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Easy to Manage Fine-Grained Access Control and Roles<\/title>\n<meta name=\"description\" content=\"Learn about fine-grained access control on Spike. Assign custom roles and permissions in a secure, efficient way for your team.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.spike.sh\/fine-grained-access-control-and-roles\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Easy to Manage Fine-Grained Access Control and Roles\" \/>\n<meta property=\"og:description\" content=\"Learn about fine-grained access control on Spike. Assign custom roles and permissions in a secure, efficient way for your team.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.spike.sh\/fine-grained-access-control-and-roles\/\" \/>\n<meta property=\"og:site_name\" content=\"Spike&#039;s blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-12T16:01:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-06T07:05:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.spike.sh\/wp-content\/uploads\/2023\/01\/ACL-for-Blog-3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1231\" \/>\n\t<meta property=\"og:image:height\" content=\"567\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kaushik\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kaushik\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.spike.sh\\\/fine-grained-access-control-and-roles\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.spike.sh\\\/fine-grained-access-control-and-roles\\\/\"},\"author\":{\"name\":\"Kaushik\",\"@id\":\"https:\\\/\\\/blog.spike.sh\\\/#\\\/schema\\\/person\\\/b137e57ace218547f02b86fdcb2d0e64\"},\"headline\":\"Easy to Manage Fine-Grained Access Control and Roles\",\"datePublished\":\"2023-01-12T16:01:13+00:00\",\"dateModified\":\"2025-06-06T07:05:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.spike.sh\\\/fine-grained-access-control-and-roles\\\/\"},\"wordCount\":330,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/blog.spike.sh\\\/fine-grained-access-control-and-roles\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.spike.sh\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/ACL-for-Blog-3.png\",\"keywords\":[\"announcements\",\"Getting Started\",\"productivity\"],\"articleSection\":[\"Announcement\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/blog.spike.sh\\\/fine-grained-access-control-and-roles\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.spike.sh\\\/fine-grained-access-control-and-roles\\\/\",\"url\":\"https:\\\/\\\/blog.spike.sh\\\/fine-grained-access-control-and-roles\\\/\",\"name\":\"Easy to Manage Fine-Grained Access Control and Roles\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.spike.sh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.spike.sh\\\/fine-grained-access-control-and-roles\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.spike.sh\\\/fine-grained-access-control-and-roles\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.spike.sh\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/ACL-for-Blog-3.png\",\"datePublished\":\"2023-01-12T16:01:13+00:00\",\"dateModified\":\"2025-06-06T07:05:03+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.spike.sh\\\/#\\\/schema\\\/person\\\/b137e57ace218547f02b86fdcb2d0e64\"},\"description\":\"Learn about fine-grained access control on Spike. Assign custom roles and permissions in a secure, efficient way for your team.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.spike.sh\\\/fine-grained-access-control-and-roles\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.spike.sh\\\/fine-grained-access-control-and-roles\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/blog.spike.sh\\\/fine-grained-access-control-and-roles\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.spike.sh\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/ACL-for-Blog-3.png\",\"contentUrl\":\"https:\\\/\\\/blog.spike.sh\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/ACL-for-Blog-3.png\",\"width\":1231,\"height\":567},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.spike.sh\\\/fine-grained-access-control-and-roles\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.spike.sh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Easy to Manage Fine-Grained Access Control and Roles\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.spike.sh\\\/#website\",\"url\":\"https:\\\/\\\/blog.spike.sh\\\/\",\"name\":\"Spike&#039;s blog\",\"description\":\"Learnings and opinions in a changing world\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.spike.sh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.spike.sh\\\/#\\\/schema\\\/person\\\/b137e57ace218547f02b86fdcb2d0e64\",\"name\":\"Kaushik\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c7ec6b633161978fc09ed325cefde9061797a65a730e4b98c0eb26bc6925bc81?s=96&d=robohash&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c7ec6b633161978fc09ed325cefde9061797a65a730e4b98c0eb26bc6925bc81?s=96&d=robohash&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c7ec6b633161978fc09ed325cefde9061797a65a730e4b98c0eb26bc6925bc81?s=96&d=robohash&r=g\",\"caption\":\"Kaushik\"},\"description\":\"Founder of Spike. I like sharing how we are building Spike and the intricacies of building a startup by waking people up for critical incidents.\",\"url\":\"https:\\\/\\\/blog.spike.sh\\\/author\\\/spikehq\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Easy to Manage Fine-Grained Access Control and Roles","description":"Learn about fine-grained access control on Spike. Assign custom roles and permissions in a secure, efficient way for your team.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.spike.sh\/fine-grained-access-control-and-roles\/","og_locale":"en_GB","og_type":"article","og_title":"Easy to Manage Fine-Grained Access Control and Roles","og_description":"Learn about fine-grained access control on Spike. Assign custom roles and permissions in a secure, efficient way for your team.","og_url":"https:\/\/blog.spike.sh\/fine-grained-access-control-and-roles\/","og_site_name":"Spike&#039;s blog","article_published_time":"2023-01-12T16:01:13+00:00","article_modified_time":"2025-06-06T07:05:03+00:00","og_image":[{"width":1231,"height":567,"url":"https:\/\/blog.spike.sh\/wp-content\/uploads\/2023\/01\/ACL-for-Blog-3.png","type":"image\/png"}],"author":"Kaushik","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kaushik","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.spike.sh\/fine-grained-access-control-and-roles\/#article","isPartOf":{"@id":"https:\/\/blog.spike.sh\/fine-grained-access-control-and-roles\/"},"author":{"name":"Kaushik","@id":"https:\/\/blog.spike.sh\/#\/schema\/person\/b137e57ace218547f02b86fdcb2d0e64"},"headline":"Easy to Manage Fine-Grained Access Control and Roles","datePublished":"2023-01-12T16:01:13+00:00","dateModified":"2025-06-06T07:05:03+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.spike.sh\/fine-grained-access-control-and-roles\/"},"wordCount":330,"commentCount":0,"image":{"@id":"https:\/\/blog.spike.sh\/fine-grained-access-control-and-roles\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.spike.sh\/wp-content\/uploads\/2023\/01\/ACL-for-Blog-3.png","keywords":["announcements","Getting Started","productivity"],"articleSection":["Announcement"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.spike.sh\/fine-grained-access-control-and-roles\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.spike.sh\/fine-grained-access-control-and-roles\/","url":"https:\/\/blog.spike.sh\/fine-grained-access-control-and-roles\/","name":"Easy to Manage Fine-Grained Access Control and Roles","isPartOf":{"@id":"https:\/\/blog.spike.sh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.spike.sh\/fine-grained-access-control-and-roles\/#primaryimage"},"image":{"@id":"https:\/\/blog.spike.sh\/fine-grained-access-control-and-roles\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.spike.sh\/wp-content\/uploads\/2023\/01\/ACL-for-Blog-3.png","datePublished":"2023-01-12T16:01:13+00:00","dateModified":"2025-06-06T07:05:03+00:00","author":{"@id":"https:\/\/blog.spike.sh\/#\/schema\/person\/b137e57ace218547f02b86fdcb2d0e64"},"description":"Learn about fine-grained access control on Spike. Assign custom roles and permissions in a secure, efficient way for your team.","breadcrumb":{"@id":"https:\/\/blog.spike.sh\/fine-grained-access-control-and-roles\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.spike.sh\/fine-grained-access-control-and-roles\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/blog.spike.sh\/fine-grained-access-control-and-roles\/#primaryimage","url":"https:\/\/blog.spike.sh\/wp-content\/uploads\/2023\/01\/ACL-for-Blog-3.png","contentUrl":"https:\/\/blog.spike.sh\/wp-content\/uploads\/2023\/01\/ACL-for-Blog-3.png","width":1231,"height":567},{"@type":"BreadcrumbList","@id":"https:\/\/blog.spike.sh\/fine-grained-access-control-and-roles\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.spike.sh\/"},{"@type":"ListItem","position":2,"name":"Easy to Manage Fine-Grained Access Control and Roles"}]},{"@type":"WebSite","@id":"https:\/\/blog.spike.sh\/#website","url":"https:\/\/blog.spike.sh\/","name":"Spike&#039;s blog","description":"Learnings and opinions in a changing world","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.spike.sh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/blog.spike.sh\/#\/schema\/person\/b137e57ace218547f02b86fdcb2d0e64","name":"Kaushik","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/c7ec6b633161978fc09ed325cefde9061797a65a730e4b98c0eb26bc6925bc81?s=96&d=robohash&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c7ec6b633161978fc09ed325cefde9061797a65a730e4b98c0eb26bc6925bc81?s=96&d=robohash&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c7ec6b633161978fc09ed325cefde9061797a65a730e4b98c0eb26bc6925bc81?s=96&d=robohash&r=g","caption":"Kaushik"},"description":"Founder of Spike. I like sharing how we are building Spike and the intricacies of building a startup by waking people up for critical incidents.","url":"https:\/\/blog.spike.sh\/author\/spikehq\/"}]}},"modified_by":"Sreekar","jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.spike.sh\/wp-content\/uploads\/2023\/01\/ACL-for-Blog-3.png","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pfMe4Q-5f","jetpack-related-posts":[{"id":375,"url":"https:\/\/blog.spike.sh\/pagerduty-setup-from-beginner-to-pro-in-10-steps\/","url_meta":{"origin":325,"position":0},"title":"PagerDuty Setup: From Beginner to Pro in 10 Steps","author":"Sreekar","date":"18th March, 2025","format":false,"excerpt":"Struggling with PagerDuty setup? This comprehensive guide breaks down the process into 10 actionable steps. Whether you're configuring your first service for a small team or implementing advanced automation for enterprise-scale operations, we've got you covered.","rel":"","context":"In &quot;PagerDuty&quot;","block_context":{"text":"PagerDuty","link":"https:\/\/blog.spike.sh\/category\/comparison\/pagerduty\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2025\/03\/background-18-1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2025\/03\/background-18-1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2025\/03\/background-18-1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2025\/03\/background-18-1.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":326,"url":"https:\/\/blog.spike.sh\/status-page-revamp-1\/","url_meta":{"origin":325,"position":1},"title":"Easier, Leaner, and a More Reliable Status Page","author":"Kaushik","date":"20th April, 2023","format":false,"excerpt":"Our new status page dashboard has been built from the ground up. This release lays the foundation for the larger plan we are working on. Read more about new updates on managing your status page.","rel":"","context":"In &quot;Status Page&quot;","block_context":{"text":"Status Page","link":"https:\/\/blog.spike.sh\/category\/incident-management\/status-page\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2023\/04\/Status-page-SEO-image-3-.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2023\/04\/Status-page-SEO-image-3-.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2023\/04\/Status-page-SEO-image-3-.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2023\/04\/Status-page-SEO-image-3-.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2023\/04\/Status-page-SEO-image-3-.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2023\/04\/Status-page-SEO-image-3-.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":4367,"url":"https:\/\/blog.spike.sh\/incident-commander\/","url_meta":{"origin":325,"position":2},"title":"Incident Commander: Roles, Responsibilities, and Key Skills","author":"Randhir Kumar","date":"20th November, 2025","format":false,"excerpt":"An incident commander is the single person in charge during a crisis. They drive the entire response effort. We explore their core roles, essential skills, and why every IT team needs a strong IC to manage complex incidents effectively.","rel":"","context":"In &quot;Incident Management&quot;","block_context":{"text":"Incident Management","link":"https:\/\/blog.spike.sh\/category\/incident-management\/"},"img":{"alt_text":"Blog cover titled \"Incident Commander: Roles, Responsibilities, and Key Skills\"","src":"https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2025\/11\/Basics-of-Incident-Management-7.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2025\/11\/Basics-of-Incident-Management-7.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2025\/11\/Basics-of-Incident-Management-7.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2025\/11\/Basics-of-Incident-Management-7.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":3396,"url":"https:\/\/blog.spike.sh\/zenduty-vs-spike-detailed-comparison-2026\/","url_meta":{"origin":325,"position":3},"title":"Zenduty vs. Spike: A Detailed Comparison (2026)","author":"Sreekar","date":"1st October, 2025","format":false,"excerpt":"This in-depth\u00a0Zenduty vs. Spike\u00a0comparison helps you choose the right incident management tool. I tested both platforms on alerting, on-call management, incident response, and pricing to see how they stack up. Find out which one is the best fit for your team's needs in 2026.","rel":"","context":"In &quot;Zenduty&quot;","block_context":{"text":"Zenduty","link":"https:\/\/blog.spike.sh\/category\/comparison\/zenduty\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2025\/10\/Basics-of-Incident-Management-14.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2025\/10\/Basics-of-Incident-Management-14.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2025\/10\/Basics-of-Incident-Management-14.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2025\/10\/Basics-of-Incident-Management-14.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":371,"url":"https:\/\/blog.spike.sh\/pagerduty-alternatives\/","url_meta":{"origin":325,"position":4},"title":"6 Better PagerDuty Alternatives (2026)","author":"Sreekar","date":"30th January, 2025","format":false,"excerpt":"Looking to switch from PagerDuty? In this blog post, we explore six powerful PagerDuty alternatives, comparing their key features, pricing, and target audiences. Whether you need a simpler setup, better integrations, or more cost-effective pricing, you'll find the right incident management solution for your team.","rel":"","context":"In &quot;PagerDuty&quot;","block_context":{"text":"PagerDuty","link":"https:\/\/blog.spike.sh\/category\/comparison\/pagerduty\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2025\/01\/pagerduty-vs-opsgenie.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2025\/01\/pagerduty-vs-opsgenie.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2025\/01\/pagerduty-vs-opsgenie.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2025\/01\/pagerduty-vs-opsgenie.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":2582,"url":"https:\/\/blog.spike.sh\/pagerduty-review-for-alerting-2026\/","url_meta":{"origin":325,"position":5},"title":"PagerDuty Review for Alerting (2026)","author":"Sreekar","date":"6th August, 2025","format":false,"excerpt":"If you\u2019re not sure about choosing PagerDuty for alerting, this review will help you decide. I signed up for PagerDuty and put it through real-world testing. I created a service \"Cron Job\", integrated it with Healthchecks.io, designed an escalation policy, and triggered test alerts. Then, I reviewed PagerDuty\u2019s alerting capabilities\u2026","rel":"","context":"In &quot;PagerDuty&quot;","block_context":{"text":"PagerDuty","link":"https:\/\/blog.spike.sh\/category\/comparison\/pagerduty\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2025\/08\/Basics-of-Incident-Management-10.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2025\/08\/Basics-of-Incident-Management-10.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2025\/08\/Basics-of-Incident-Management-10.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2025\/08\/Basics-of-Incident-Management-10.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2025\/08\/Basics-of-Incident-Management-10.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blog.spike.sh\/wp-content\/uploads\/2025\/08\/Basics-of-Incident-Management-10.png?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/blog.spike.sh\/wp-json\/wp\/v2\/posts\/325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.spike.sh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.spike.sh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.spike.sh\/wp-json\/wp\/v2\/users\/191914268"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.spike.sh\/wp-json\/wp\/v2\/comments?post=325"}],"version-history":[{"count":3,"href":"https:\/\/blog.spike.sh\/wp-json\/wp\/v2\/posts\/325\/revisions"}],"predecessor-version":[{"id":1775,"href":"https:\/\/blog.spike.sh\/wp-json\/wp\/v2\/posts\/325\/revisions\/1775"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.spike.sh\/wp-json\/wp\/v2\/media\/752"}],"wp:attachment":[{"href":"https:\/\/blog.spike.sh\/wp-json\/wp\/v2\/media?parent=325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.spike.sh\/wp-json\/wp\/v2\/categories?post=325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.spike.sh\/wp-json\/wp\/v2\/tags?post=325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}