RBAC And Audit
Use this guide to define role boundaries and audit expectations for Management MCP.
Role model
| Role | Typical MCP scope | Recommended usage |
|---|---|---|
viewer | tools/list, read-only tool calls | dashboards, inventory sync, read bots |
modifier | safe create/update operations | CI automation with approval gates |
auditor | read-only + audit inspection | compliance and change review |
admin | destructive/high-impact tools | isolated identities only |
Separation of duties checklist
- Keep read automation and write automation on separate identities.
- Keep
admintools off default automation identities. - Use explicit change windows for mutation tools.
- Require audit review for destructive operations.
Audit evidence to capture
- Actor identity (subject + role)
- JSON-RPC method/tool name
- Target object (collection/proxy/workflow)
- Result status (allowed/denied/succeeded/failed)
- Timestamp and request/session correlation
Validation tests
vieweridentity attempts mutation -> expect403.modifierperforms approved update -> expect success + audit entry.- Missing auth -> expect
401. - Out-of-scope admin action by non-admin identity -> expect
403.