Custom project roles#
Feature availability
Custom roles are available on Self-hosted Enterprise and Cloud Enterprise plans. Refer to n8n's pricing page for plan details.
Available from: n8n version 1.122.0 (released November 24, 2025)
Secret vault scopes are available from n8n version 2.13.0.
Instance roles vs project roles
n8n has two types of roles: * Instance roles (account types): Owner, Admin, and Member roles that span the entire n8n instance and all projects * Project roles: Roles that apply within a specific project (Admin, Editor, Viewer, and custom roles)
Custom roles are project-level roles. They define permissions within individual projects, not across the entire instance.
Custom project roles allow you to create roles with specific permissions tailored to your team's needs. Unlike the built-in project roles (Admin, Editor, Viewer), custom roles let you define granular access to workflows, credentials, and other project resources.
Create a custom role#
Instance owners and instance admins can create custom roles.
To create a custom role:
- Go to Settings > Project roles.
- Select Create role.
- Enter a role name and optional description.
- Select the permissions (scopes) for this role:
- Workflow permissions: View, execute, edit, create, publish, transfer, delete, or manage data redaction for workflows
- Credential permissions: View, edit, create, share, unshare, transfer, or delete credentials
- Project permissions: View, edit, or delete projects
- Folder permissions: View, edit, create, transfer, or delete folders
- Execution permission: Reveal redacted execution data
- Secret vault permissions: View, create, edit, delete, or sync secret vaults of a project
- Secrets permission: Use secrets in credentials
- Data table permissions: View tables, view rows, edit tables, edit rows, create, or delete tables
- Project variable permissions: View, edit, create, or delete project variables
- Source control: Push to source control
- Select Create role.
Assign a custom role to users#
Project admins can assign custom roles to project members. Custom roles apply only within the specific project where they're assigned. A user can have different roles in different projects.
To assign a custom role:
- Select the project.
- Select Project settings.
- Under Project members, browse or search for users.
- Select the user and choose the custom role from the dropdown.
- Select Save.
Project-level permissions
Custom role permissions only apply within the project where the role is assigned. To grant the same permissions across multiple projects, assign the custom role in each project individually.
Edit a custom role#
To modify an existing custom role:
- Go to Settings > Project roles.
- Find the custom role you want to edit.
- Select the three-dot menu > Edit.
- Update the role name, description, or permissions.
- Select Save changes.
Editing affects all assigned users
Changes to a custom role immediately affect all users assigned to that role in any project. If the role is used across multiple projects, the permission changes apply everywhere the role is assigned.
Duplicate a custom role#
To create a new role based on an existing one:
- Go to Settings > Project roles.
- Find the role you want to duplicate.
- Select the three-dot menu > Duplicate.
- Modify the role name and permissions as needed.
- Select Create role.
Delete a custom role#
To delete a custom role:
- Go to Settings > Project roles.
- Find the role you want to delete.
- Select the three-dot menu > Delete.
- Confirm the deletion.
Reassign users before deletion
If users are assigned to this role, you must first reassign them to a different role before deleting it.
Permission scopes reference#
Custom roles use permission scopes to define what users can do within a project. Each scope below matches a checkbox in the Project roles editor. The section headings match the editor's section names; the scope codes are what you'll see in API responses and audit logs.
Automatically granted scopes
n8n pairs some scopes together, so they don't appear as separate checkboxes:
- Granting
<resource>:readalso grants the matching list scope for that resource (for example,workflow:readgrantsworkflow:list). - Granting
workflow:publishalso grantsworkflow:unpublish.
Workflow scopes#
workflow:create- Create new workflowsworkflow:read- View workflow detailsworkflow:update- Edit workflowsworkflow:execute- Execute workflowsworkflow:publish- Publish workflows (also grantsworkflow:unpublish)workflow:delete- Delete workflowsworkflow:move- Transfer workflows between projectsworkflow:updateRedactionSetting- Manage data redaction for workflows (refer to Execution data redaction)
Credential scopes#
credential:create- Create new credentialscredential:read- View credential detailscredential:update- Edit credentialscredential:delete- Delete credentialscredential:move- Transfer credentials between projectscredential:share- Share credentials with other userscredential:unshare- Remove credential sharing
Project scopes#
project:read- View project detailsproject:update- Edit project settingsproject:delete- Delete projects
Folder scopes#
folder:create- Create new foldersfolder:read- View folder contentsfolder:update- Rename foldersfolder:delete- Delete foldersfolder:move- Transfer folders
Execution scopes#
execution:reveal- Reveal redacted execution data (refer to Execution data redaction)
Secret vault scopes#
The scope codes use the externalSecretsProvider prefix. The role editor lists this section as Secrets vaults.
externalSecretsProvider:create- Create new secret vaults in a projectexternalSecretsProvider:read- View secret vaults in a projectexternalSecretsProvider:update- Edit secret vault configurationexternalSecretsProvider:delete- Delete secret vaults from a projectexternalSecretsProvider:sync- Reload a vault's secrets
Secrets scope#
The scope code uses the externalSecret prefix. The role editor lists this section as Secrets.
externalSecret:list- Use secrets in credentials
Data table scopes#
dataTable:create- Create new data tablesdataTable:read- View data table schemadataTable:update- Edit data table schemadataTable:delete- Delete data tablesdataTable:readRow- Read rows from data tablesdataTable:writeRow- Insert or update rows in data tables
Project variable scopes#
projectVariable:create- Create new variablesprojectVariable:read- View variable valuesprojectVariable:update- Edit variable valuesprojectVariable:delete- Delete variables
Source control scopes#
sourceControl:push- Push changes to source control
Common custom role examples#
These are example custom project roles you can create for common use cases. Remember that these roles apply within individual projects, not across your entire n8n instance.
Workflow developer#
A role for users who work only with workflows:
* workflow:create, workflow:read, workflow:update, workflow:execute, workflow:delete
* credential:read (view credentials but not edit them)
* project:read
Credential manager#
A role for users who manage credentials:
* credential:create, credential:read, credential:update, credential:delete, credential:share
* workflow:read (view workflows to understand credential usage)
* project:read
Secrets user#
A role for users who use external secrets in credentials but don't manage vaults:
* externalSecret:list (use secrets in credential expressions)
* credential:create, credential:read, credential:update (manage credentials with secrets)
* workflow:read
* project:read
Workflow publisher#
A role for users who can publish workflows without full edit access:
* workflow:read, workflow:publish
* credential:read
* project:read
Combining scopes
You can combine any scopes to create roles that match your specific needs. Consider the principle of least privilege: grant only the permissions users need to perform their tasks.