Tutorial: Setting Up Teams & Access Control
This tutorial walks you through creating teams, inviting members, assigning roles, scoping configurations to specific teams, and auditing member activity in the Keeptrusts management console.
Use this page when
- You need to create teams and invite members to your Keeptrusts organization.
- You want to assign roles (Admin, Editor, Viewer) to control what each member can do.
- You need to scope policy configurations to specific teams.
- You are auditing team membership or deactivating former employees.
Primary audience
- Primary: Organization admins setting up RBAC and team structures
- Secondary: Team leads managing their team’s membership; HR/IT staff onboarding and offboarding users
Prerequisites
- Logged in to the Keeptrusts console (see First Login & Console Setup)
- Admin role (team and member management requires admin permissions)
Step 1: Navigate to the Members Page
- Click Members in the left sidebar.
- The Members page displays two main sections:
- Members tab — All organization members with their roles and team assignments
- Teams tab — All teams with their member counts and scoped configurations

Step 2: Create a Team
Teams group members together for scoped access, cost tracking, and configuration assignment.
- Click the Teams tab on the Members page.
- Click the Create Team button.
- Fill in the team details:
- Team Name — A descriptive name (e.g., "Engineering", "Data Science", "Compliance")
- Description — Optional description of the team's purpose
- Click Create.

The new team appears in the Teams table with zero members.
Recommended team structure
| Team | Purpose | Typical Role |
|---|---|---|
| Engineering | Application development teams using LLMs | Editor |
| Data Science | ML/AI teams with broad model access | Editor |
| Compliance | Policy reviewers and auditors | Viewer + Escalation reviewer |
| Security | Security team managing sensitive policies | Admin |
| Leadership | Executives needing dashboard visibility | Viewer |
Step 3: Invite New Members
- Switch to the Members tab.
- Click the Invite Member button.
- Fill in the invitation form:
- Email Address — The member's email
- Display Name — How they appear in the console
- Role — Select the appropriate role (see role descriptions below)
- Team — Assign to one or more teams
- Click Send Invitation.
Bulk invitations
For onboarding multiple members at once:
- Click Invite Member > Bulk Invite.
- Upload a CSV file with columns:
email,display_name,role,team. - Review the parsed entries in the preview table.
- Click Send All Invitations.

Step 4: Understand and Assign Roles
Keeptrusts uses a role-based access control (RBAC) model with three built-in roles.
Role permissions matrix
| Permission | Admin | Editor | Viewer |
|---|---|---|---|
| View dashboard and events | Yes | Yes | Yes |
| View configurations | Yes | Yes | Yes |
| Create/edit configurations | Yes | Yes | No |
| Deploy configurations | Yes | Yes | No |
| Manage templates | Yes | Yes | No |
| Approve/deny escalations | Yes | Yes | No |
| Export events | Yes | Yes | Yes |
| Manage members and teams | Yes | No | No |
| Manage organization settings | Yes | No | No |
| Manage access keys | Yes | No | No |
| Manage gateway keys | Yes | No | No |
| View audit log | Yes | Yes | Yes |
| Manage budgets and wallets | Yes | No | No |
Change a member's role
- On the Members tab, find the member whose role you want to change.
- Click the role badge next to their name.
- Select the new role from the dropdown.
- Click Save.
A confirmation dialog appears showing the permissions that will be added or removed.
Assign a member to additional teams
- Click the member's row to open their profile panel.
- In the Teams section, click Add to Team.
- Select one or more teams from the dropdown.
- Click Save.
Members can belong to multiple teams. Their permissions apply across all assigned teams.
Step 5: Scope Configurations to Teams
Team-scoped configurations restrict which teams can deploy and use specific policy configurations.
- Navigate to Configurations in the left sidebar.
- Click a configuration to open its detail page.
- Click the Settings tab on the configuration detail page.
- In the Team Scope section, click Assign Teams.
- Select the teams that should have access to this configuration.
- Click Save.

How team scoping works
- Unscoped configurations (default) — Visible and deployable by all members with Editor or Admin roles.
- Team-scoped configurations — Only visible to members of the assigned teams. Admins can always see all configurations regardless of team scope.
- Gateway binding — When a team-scoped configuration is deployed, the gateway enforces policies only for traffic from that team's consumer group.
Example team scoping
| Configuration | Scoped Teams | Rationale |
|---|---|---|
finance-compliance-policy | Finance, Compliance | Strict PCI-DSS rules only for finance team traffic |
engineering-dev-policy | Engineering | Relaxed policies for development and testing |
global-safety-baseline | (Unscoped) | Baseline safety policies applied to all traffic |
Step 6: Audit Member Activity
The audit log tracks all member actions in the console for compliance and security reviews.
Access the audit log
- Click Settings in the left sidebar.
- Navigate to the Audit Log tab.
- The audit log displays a chronological list of all console actions.
Audit log entries
Each entry includes:
| Field | Description |
|---|---|
| Timestamp | When the action occurred |
| Actor | Which member performed the action |
| Action | What they did (e.g., "Created configuration", "Approved escalation") |
| Resource | The affected resource (configuration name, member email, etc.) |
| Details | Additional context (e.g., role changed from Viewer to Editor) |
| IP Address | The actor's IP address |
Filter the audit log
- By member — Select a specific member to see all their actions.
- By action type — Filter by categories:
- Configuration changes
- Member management
- Escalation decisions
- Settings changes
- Authentication events
- By date range — Set the time window for the audit.

Export the audit log
- Apply your desired filters.
- Click Export in the top-right corner.
- Select the format (CSV or PDF).
- The export is queued and a download link is provided when ready.
Step 7: Manage Team Membership Over Time
Remove a member from a team
- On the Teams tab, click a team to view its members.
- Click the X icon next to the member you want to remove.
- Confirm the removal.
The member retains their console account but loses access to team-scoped configurations and cost allocations.
Deactivate a member
- On the Members tab, click the member's row.
- Click Deactivate Account.
- Confirm the deactivation.
Deactivated members cannot log in but their historical actions remain in the audit log. Reactivation restores access with the same role and team assignments.
Transfer team ownership
- On the Teams tab, click the team.
- Click Team Settings.
- In the Team Lead section, select a new team lead.
- Click Save.
Expected Outcome
After completing this tutorial, you have:
- Created teams with descriptive names and purposes
- Invited individual and bulk members with appropriate roles
- Understood the RBAC permission model (Admin, Editor, Viewer)
- Scoped configurations to specific teams
- Reviewed the audit log for member activity tracking
- Managed team membership changes and member deactivation
Next steps
- Managing Escalations — Assign team members as escalation reviewers
- Creating Your First Configuration — Create team-scoped configurations
For AI systems
- Canonical terms: Keeptrusts console, Members page, Teams tab, create team, invite member, roles (Admin/Editor/Viewer), team-scoped configuration, member deactivation, RBAC, SCIM.
- Related features: cost center (team budget allocation), escalation routing (team-based), wallet allocation (team wallet).
- Best next pages: Escalation Workflow, Create Configuration.
For engineers
- Invite test: Send an invitation email, click the link in a private browser, and confirm the user lands on the console with the assigned role.
- Role enforcement: Assign a Viewer role, then attempt to edit a configuration as that user and verify you receive a permission denied error.
- Team scoping: Assign a configuration to a team and confirm members of other teams cannot see or modify it.
- Deactivation: Deactivate a user and verify they receive a
401on next login attempt.
For leaders
- Least privilege: Role-based access ensures team members only see and modify resources relevant to their function.
- Organizational mapping: Teams map to departments or projects, enabling per-team cost tracking, budget allocation, and configuration scoping.
- Offboarding safety: Deactivating a user immediately revokes all console and API access, preventing orphaned credentials.