Skip to main content

Harness RBAC for Feature Management & Experimentation (FME)

Harness Role-Based Access Control (RBAC) enables administrators to control access for Feature Management & Experimentation (FME) resources within each project.

Scopes in Harness RBAC

The Harness platform follows a three-level hierarchical structure. Each level (or scope) defines how permissions and resources are inherited and applied:

  • Account Scope: Includes all organizations and projects within your Harness account. Resources created at the account level are available to all organizations and projects under that account.
  • Organization Scope: Groups related projects, resources, and users. Resources created at the organization level are available to all projects within that organization but are not visible outside it.
  • Project Scope: Contains resources specific to a project, such as FME feature flags, segments, metrics, environments, and traffic types. Project-level resources are not shared with other projects or organizations.

RBAC policies assigned to FME resources do not inherit across organizations or accounts. Before configuring RBAC resource groups and roles, ensure FME is enabled on your account. For more information about Harness RBAC, see the Harness Platform documentation.

Resources and Scopes

All FME resources are created and governed at the project scope.

ResourceScopeNotes
Feature FlagsProjectIncludes all flag definitions in the project.
SegmentsProjectIncludes all standard and dynamic segments in the project.
Large SegmentsProjectIncludes all large segments and environment-specific definitions.
MetricsProjectIncludes metric definitions and alerts.
EnvironmentsProjectControls access to environment-scoped operations.
Traffic TypesProjectAll traffic types configured in the project.
ExperimentsProjectAll experiments defined in the project.

Out-of-the-box roles

Harness provides two default FME roles with pre-configured permissions:

  • FME Manager Role: Grants permissions similar to the legacy “Editor” role in Split, enabling users to edit most FME resources.
  • FME Administrator Role: Grants permissions similar to the legacy “Administrator” role in Split for FME resources.

If you are a Harness FME administrator, you can use Resource Groups to control access to FME resources by specific environment and create custom roles to support granular permissions.

Resource groups

Resource Groups define which FME resources users can access within a project. Each resource type supports two access controls:

Access TypeDescription
AllGrants access to all environments for that resource type.
SpecifiedGrants access only in selected environments by name.

This allows organizations to grant edit permissions only in intended environments, ensuring tighter control over sensitive environments, such as production.

Create a resource group for environment-level access

To define environment-level permissions in Harness FME:

  1. Navigate to Project Settings > Resource Groups.
  2. Click + Add Resource Group to create a new Resource Group.
  3. Enter a name such as Documentation Resources and optionally, description and tags, then click Save.
  4. Select resources in the Feature Management & Experimentation section.
  5. Choose either All or Specified access for each resource:
    • All: Grants access to all environments of that resource type.
    • Specified: Click + Add to add individual environments by name.

Assign a resource group to users

To enforce access defined in a Resource Group:

  1. Navigate to Project Settings > Roles.
  2. Edit an existing role or create a new role.
  3. Add the Resource Group to the role.
  4. Apply the role to users or user groups.

With roles and resource groups combined, you can ensure only authorized users can view or edit target environments.