LogoLogo
DocsSupportDashboard
  • Introduction
    • Data Types
    • Target Filtering
    • Scan Selection
    • Pagination & Sorting
    • Permissions
    • Appendix
  • Authentication
  • Webhooks
  • Events
  • Appendix
    • Targets Filter
    • Date Match
    • IP Range
  • Endpoints
    • Discovery
    • Target
    • Scan
    • Issue
    • Tag
    • Port
    • DNS
    • HTTP
    • Whois
    • Technology
    • Website
    • Acknowledged
    • Event
    • Dark Web
    • Integration
    • PCI
    • Report
    • User
    • Account
    • Security
    • File
    • Work
Powered by GitBook

© 2024 Halo Security

On this page

Was this helpful?

  1. Introduction

Permissions

PreviousPagination & SortingNextAppendix

Last updated 3 years ago

Was this helpful?

Methods that perform privileged actions require the user to possess permissions. These permissions are associated with the user role.

Permission Mapping

For more information about roles, see

Permission
Role(s)

account_user_get

Administrator (if not performed on current user)

account_user_invite

Administrator

account_user_list

Administrator

account_user_update

Administrator (if not performed on current user)

security_acknowledge_add

Administrator, Power User

security_acknowledge_delete

Administrator, Power User

security_scan_cancel

Administrator, Power User, User

security_scan_start

Administrator, Power User, User

security_target_update

Administrator, Power User

https://www.halosecurity.com/user/support/roles