Users & Roles
Accounts created in the Dome9 portal and in the Infinity Portal handle users and roles slightly differently. Dome9 users are created in the Dome9 portal. In the Infinity Portal, users are created for the entire portal and then imported to the CloudGuard CNAPP Cloud-Native Application Protection Platform - a cloud-native security model that encompasses Cloud Security Posture Management (CSPM), Cloud Service Network Security (CSNS), and Cloud Workload Protection Platform (CWPP) in a single holistic platform. integrated into it.
Users
Users interact with CloudGuard with:
-
Web interface (through the portal)
Infinity Portal
If you do not see the Users page in the Settings menu, the users on your CloudGuard account are fully managed by the Infinity Portal. For more information, see Infinity Portal Administration Guide.
If you see the Users page in the Settings menu, then it is necessary to import users created in the Infinity Portal to CloudGuard. For more information, see Adding a New User in the Infinity Portal.
Dome9 Portal
The Users page of the Settings menu shows the users of the current CloudGuard account.
The user that creates the account is the Account Owner. This user manages CloudGuard Account-related issues, such as billing and subscription plan and has the privileges of a Super User. Only one Account Owner exists for each account. An Account Owner can assign a different user as the Account Owner. In this case, the previous Account Owner receives the role of Super User.
CloudGuard identifies its users with an email address. You cannot create more than one user for each email. If you need a user which is not bound to an email address, create a Service Account.
|
Caution - Make sure to delete unnecessary SSO |
Service Accounts
You can create a Service Account to work with CloudGuard through the API. A service account interaction with CloudGuard using the web interface is not possible. You identify the service account with an API Key ID and API Key Secret. Unlike a regular user, this account is not bound to a specific email address. You can use the service account for administration, maintenance, and all other automation tasks, regardless of the person who does these tasks.
You can assign service accounts the same Roles as regular users. To create a service account, see Adding a New Service Account.
Roles
You can configure roles and assign them to users and service accounts. Then you assign permissions to a role. When you assign a role to a user, the permissions of the role are granted to the user, so it is not necessary to assign these permissions to the user explicitly.
In the Infinity Portal only, these e roles are synchronized with Specific Service Roles in your Infinity Portal account. You can assign the roles to users in the Infinity Portal. For more information, see Additing and Editing User Accounts.
You can configure any number of roles to include all the different types of users necessary for your CloudGuard account, each with the permissions applicable to it.
The preconfigured CloudGuard roles include:
-
Primary Admin / Admin / Super User - Can access and manage all system resources, add new users, and change their privileges. There can be multiple Super Users in the system.
-
User Admin / Read-Only / Auditor - Can see all system resources, but cannot create, change, or delete them.
-
Kubernetes Agent - Internal role used by Kubernetes
Kubernetes, often abbreviated as “K8s”, orchestrates containerized applications to run on a cluster of hosts. agents.
You cannot change or delete the preconfigured roles. You cannot delete a role that contains members.
Switch User Roles
In the Dome9 portal, use the menu on the top bar next to your User name to select a different role in your CloudGuard account. The role must be configured and assigned to you.
Permissions
You can grant permissions that appear in the table below to users or roles to do actions in CloudGuard. The Global Roles assigned in the Infinity Portal account affect user permissions. Some permissions can be set separately or as part of other permissions. Some other permissions inherently have View permissions for dependent resources (for example, the permission for managing Policies also grants permissions to view Rulesets and Notifications).
Permission |
Description |
Applicable Resources |
---|---|---|
Dynamic Access |
Use Dynamic Access Leases for secure access to your Security Groups (see Dynamic Access Leasing) |
Dynamic Access Leases (AWS
|
Create Security Groups |
Create Security Groups in your environments |
Security Groups in your environments |
Manage Resources |
Create and manage access for all or specific assets, CloudGuard resources, and system configurations. Select one or more groups of resources. |
|
View Resources |
See all or part of CloudGuard system resources without changing them. Select one or more groups of resources. |
|
Cross Account Access |
Get access to all environments or selected environments, with all roles or selected roles |
All CloudGuard system resources |
Rulesets & Rules |
Create and manage Rules and Rulesets |
Rulesets, rules |
Alerts Notifications |
Create, edit, and delete Notifications for CloudGuard policies and Integrations (Integration Hub). |
Notifications, integrations |
Policies |
Create and manage CloudGuard policies:
|
CloudGuard policies, rulesets, rules, notifications |
Manage Alerts |
Acknowledge, assign, comment, or delete findings. Create, edit, and delete exclusions and remediations. Includes the View permission for Rulesets & Rules. |
CloudGuard Events, Exclusions, Remediations, Rules, Rulesets |
Onboarding |
Onboard and delete environments in your CloudGuard account. |
CloudGuard Environments |
All System Resources
The All System Resources permission affects permissions to all resources in the system.
All resources |
Resource Name |
Includes |
Impact |
---|---|---|---|
All System Resources |
System configurations - Set only as part of the All System Resources |
|
|
CloudGuard resources - Can be set separately from the All System Resources |
|
Affects permissions to all of these resources:
|
|
Code Security resources |
Select the permission level to which assign a Code Security role (Admin Access, Member Access, or Read-Only Access). If two permissions are assigned, the higher permission is granted. |
|
|
All or specific assets - Can be set separately from the All System Resources. |
|
Affect the specified assets |
Actions
You can manage users, service accounts, and roles in the Users & Roles menu. In the users or roles table, click the menu in the first column to see and select available actions.

Super Users (Admins) and Account Owner (Primary Admin) can add new CloudGuard users to the account:
-
Step 1 - Invite users to the Infinity Portal. To invite users to the Infinity Portal, refer to the instructions in the Infinity Portal Admin Guide and see Configuring Users > To add Users to the Infinity Portal account.
-
Step 2 - Import the users to CloudGuard. This step is only applicable if you have imported users in the existing account before. In this case, you have the Users page in the Settings menu.
If you create a new CloudGuard account, this step is not applicable.
-
Step 3 - Assign roles or permissions to the users. For more, see Adding a Role.
To import users to CloudGuard:
-
Select the Users page in the Settings > Roles menu.
-
Click Import User.
The new window opens.
-
Select the user from the list. You can select only a user who accepted your invitation to the Infinity Portal and authenticated with the email address and password.
-
Select a Role for the user. The permissions corresponding to the role are automatically granted to the user.
-
Click Add.
The user appears in the users list with the assigned role.

Super Users and Account Owners can add new CloudGuard users to the account.
-
Open the Users page in the Settings > Users & Roles menu.
-
Click Add User.
-
Enter details for the user. The user is identified by the email address. If the user signs in with Single Sign-On, see Single Sign-On.
-
Select Roles or Permissions for the user. The user receives the permissions corresponding with the role automatically, so no need to assign these explicitly in the Permissions section. If you do not assign a role, you must explicitly assign permissions to the user in this section. Users with direct permissions have the Direct tag in their Roles list.
-
Click Close. An email is sent to the new user, based on the email address entered for the user.

Super Users (Admins) and Account Owner (Primary Administrator) can add new CloudGuard Service Accounts.
-
From the Settings menu, select the Users & Roles > Service Accounts page.
-
Click Add Account.
-
In the Add Service Account dialog box, enter the account name.
-
Select a Role for the service account. You can select more than one role when you click each Role one by one.
-
Click Add. The New Service Account Details dialog box displays the API Key ID and API Key Secret values.
-
Click the Copy icon to copy the details of each value and save them for future use.
-
Click Close.

You can configure roles with specific permissions and assign them to users and service accounts. The roles you configure are specific to your CloudGuard account. In the Infinity Portal, the roles are synchronized with Specific Service Roles in your Infinity Portal account. You can assign roles to the users in the Infinity Portal.
-
Open the Roles page in the Settings > Users & Roles menu.
-
Click Add Role.
-
Enter a name for the role and select permissions for it.
-
Optionally, select users and service accounts for the role. These users and accounts receive the permissions corresponding with the role.

You can change details for a user or a service account, including their permissions.
-
Select the user or service account from the list.
-
On the menu bar, click Edit to make changes to the role(s) or permissions related to the user.
-
Click Close.

A Super User can configure a user to use Single Sign-On (SSO). To do this, first enable Single Sign-On for the account.
-
With a Super User account, log in to the CloudGuard portal and navigate to the Users page in the Settings > Users & Roles menu.
-
Select the user that is necessary to connect to SSO and click Connect to SSO on the menu bar.

-
With Super User credentials, log in to the CloudGuard portal and navigate to the Users page in the Settings > Users & Roles menu.
-
Select the user that is necessary to disconnect from SSO and click Disconnect from SSO on the menu bar.

As a best practice, delete all unnecessary SSO and non-SSO users from the user list.
-
With a Super User account, log in to the CloudGuard portal and navigate to the Users page in the Settings > Users & Roles menu.
-
Select a user to delete and click Delete on the menu bar.

A Super User can disable MFA for other users.
To disable MFA for a different user:
-
In CloudGuard, navigate to Settings > Users & Roles > Users to see the list of all users in the CloudGuard account.
-
Select the user with enabled MFA.
-
On the menu bar, click Disable MFA.
A confirmation window opens.
-
Click OK.

The Account Owner (Primary Administrator) can assign a different user to be the Account Owner. Then, the former Account Owner is automatically assigned the Super User role.
-
With the Account Owner credentials, log in to the CloudGuard portal and navigate to the Users page in the Settings > Users & Roles menu.
-
Select the user that is necessary to set as the Account Owner and click Set as account owner on the menu bar.

Users who enter an incorrect password more than a set number of times when logging in are locked out of their account. Their account can be unlocked by a Super User, on the Users page.
-
To unlock the user, select the user and click Reset password on the menu bar.