Access Model

Who can view, create, edit, and delete each element in Polaris

Roles

Polaris has three access levels:

  • Unauthenticated — Can browse read-only data: systems, components, technologies, teams, licenses, version constraints, violations, and approvals.
  • Authenticated (User) — Can create and manage systems, technologies, version constraints, and submit SBOMs. Can view audit logs and their own profile.
  • Superuser — Full administrative access. Can manage teams, users, API tokens, license allow/deny lists, impersonation, and GitHub imports.

Access by Element

The table below shows which operations are available at each access level. A dash (—) means the operation does not apply to that element.

ElementViewCreateEditDeleteNotes
SystemsPublicAuthenticatedOwner team*Owner team** Superusers or members of the system's owner team
RepositoriesPublicAuthenticatedAdded to systems; viewed as part of system detail
ComponentsPublicCreated only via SBOM ingestion, never directly
TechnologiesPublicAuthenticatedOwner team** Superusers or members of the technology's steward team
TeamsPublicSuperuserSuperuserSuperuserFull team management is superuser-only
UsersSuperuserSuperuserSuperuserTechnical users only; OAuth users are created on sign-in
API TokensSuperuserSuperuserSuperuserManaged per technical user; token value shown once
Version ConstraintsPublicAuthenticatedCreator*Creator** Superusers or the user who created the version constraint
LicensesPublicDiscovered via SBOM ingestion; not directly managed
License Allow/DenyAuthenticatedSuperuserSuperuserSuperuserSuperusers manage the organization license whitelist
ViolationsAuthenticatedCompliance and version constraint violations; read-only for authenticated users
ApprovalsPublicAuthenticatedTeam members approve technologies for their team
SBOMsAuthenticatedSubmitted via API; creates/updates components and licenses
Audit LogsAuthenticatedAutomatically generated; read-only
GitHub ImportSuperuserCreates a system from a GitHub repo without cloning
ImpersonationSuperuserSuperuserSuperuserStart/stop impersonation of other users

How Elements Are Created

Not all elements are created directly through the UI. The table below clarifies the creation path for each element.

ElementCreation Method
SystemsCreated via the UI form or GitHub import
RepositoriesAdded when creating or editing a system, or via GitHub import
ComponentsDiscovered automatically when an SBOM is submitted — never created directly
TechnologiesCreated via the UI form by authenticated users
TeamsCreated via the UI by superusers
Users (OAuth)Created automatically on first sign-in via GitHub OAuth
Users (Technical)Created via the UI by superusers for API access
API TokensGenerated via the UI by superusers for technical users
Version ConstraintsCreated via the UI by authenticated users
LicensesDiscovered automatically from SBOM component metadata
ApprovalsCreated when a team member approves a technology for their team
Audit LogsGenerated automatically on every create, update, and delete operation

Superuser-Only Pages

The following pages and actions are only visible in the navigation and UI when the current user (or impersonated user) has the superuser role:

  • Users — User list and user detail pages, including technical user creation and API token management.
  • Impersonate User — View the application as another user to verify access controls.
  • License Allow/Deny — Manage the organization license whitelist and deny list.
  • Import from GitHub — Import a system from a GitHub repository on the Systems page.
  • Team management — Create, edit, and delete teams on the Teams page.

Impersonation

Superusers can impersonate other users to verify what they see. While impersonating, the UI respects the impersonated user's role — superuser-only actions and navigation items are hidden if the impersonated user is not a superuser.

Audit Trail

All create, update, and delete operations are recorded in the audit log with the user ID, operation type, affected entity, changed fields, and timestamp. The audit log is viewable by authenticated users at /audit.