JetBrains Space Help

Roles and Permissions

User permissions in Space fall into the following categories:

  • Global permissions

  • Team-specific permissions

  • Project-specific permissions

  • Basic permissions

Users cannot be issued individual permissions — instead a user can be assigned a Role which has a pre-defined set of permissions.

Space comes with a number of Default Roles (described in the table below). The System Admin role includes global (organization-wide) permissions and cannot be modified — i.e. you can't add or remove permissions from it. However, if you need a custom set of permissions, you can create an additional Role.


Default Role



Global permissions

(Valid throughout the entire organization)

System Admin

Granted to the users in charge of administering the Space installation and/or organization and personnel management (e.g HR). Includes all available rights in all areas except for Projects.

This default global Role cannot be edited. Instead, the system administrator can create a new Role with a custom set of permissions.

Team-specific permissions

(Valid within a particular team)

Team Admin

Intended for a team supervisor. Includes the rights to add/remove team members, approve membership requests, create and edit sub-teams.

Team Admin and Team Lead roles are granted on a per-team basis, hence the permissions they contain are only valid within a particular team.

Similarily, the Manager role only gives authority over the subordinate members.

System Admin can modify these Roles by adding or removing permissions.

Team Lead

Intended for the team lead authorized to approve absences of the team members. Includes the right to see the team members' reasons for absence (hidden to others). The Team Lead and Team Admin Roles are typically assigned to the same person.


Intended for a person who is explicitly assigned to another person as their supervisor. Includes the rights to view and approve absences of subordinates and to see their reasons for absence (hidden to others).

Project-specific permissions

(Valid within a particular project)

Project Admin

Initially granted to the user that creates the project.

Intended for project participants that should be allowed to manage access and configure project modules as well as contribute to the project.

Space Projects are self-serviced — any user can create and administer a project.

System Admin has no specific rights over projects created by other users.

System Admin can modify the default templates for these Roles or create a new template with a different variety of project access permissions. The role templates can be then used by Project Admins to create Roles for their projects and assign those Roles to their project participants.

Project Member

Granted by the Project Admin to project participants that are expected to contribute to the project on regular basis. Project members form the Project Team and have access to internal project tools and resources.

Project Collaborator

Intended for project participants that occasionally contribute to the project but are not considered part of the team. Collaborators have the same default permissions as project members but are not included in the Project Team.

Organization Member

Granted by default to all organization users. Includes viewing rights for some project resources.

Automation Service

Granted to Automation scripts. Includes the rights to:

  • view the source code in the project repositories (Repository read access)

  • view and publish artifacts to Packages repositories

  • view project parameters

  • view and use secrets

Basic permissions

(Issued by default to all users)


This role defines the base level of permissions that are available to every member of the organization. Specific permissions that are not enabled for this role can be granted separately at the team or project level.

These Roles are permanently assigned to all users - they cannot be revoked.

System Admin can modify the Member role by adding or removing some of the permissions.

The Self role cannot be modified.


This role defines which permissions are available to members for the purpose of editing their own records.

Last modified: 28 September 2022