Requires: Team or Enterprise license + PostgreSQL database configured in team mode. RBAC is not available in single-user SQLite mode.

Role Definitions

super_admin

Permissions : Full access to everything ✓ User management (create, edit, delete, assign roles) ✓ License management ✓ All projects — read + write + delete ✓ All scans — create, run, stop, delete ✓ All reports — generate, download, delete ✓ System settings — database, AI keys, integrations ✓ Audit log — full read access Typical users: CISO, Security Team Lead, Platform Admin

pentest_lead

Permissions: ✓ Create and manage projects (assigned to them) ✓ Assign testers to projects ✓ View all scans in their org ✓ Run scans on assigned projects ✓ Generate and download reports ✓ Manage findings (create, edit, delete, assign status) ✗ User management ✗ License management ✗ System settings Typical users: Senior Pentesters, Engagement Managers

tester

Permissions: ✓ Run scans on assigned projects only ✓ Create and edit findings (their own projects) ✓ Upload evidence ✓ View reports for assigned projects ✗ Generate final reports (requires pentest_lead approval) ✗ Delete findings or scans ✗ View other testers' projects Typical users: Junior/Mid-level Pentesters

reviewer

Permissions: ✓ Read-only access to assigned projects ✓ Add comments to findings ✓ Approve or reject findings (QA workflow) ✓ View and download reports ✗ Run scans ✗ Create or edit findings ✗ Delete anything Typical users: QA Reviewers, Compliance Officers, Technical Advisors

client

Permissions: ✓ View reports for their project ONLY (read-only portal) ✓ Download reports for their project ✓ View finding summaries (no raw tool output or PoC details by default) ✗ Everything else — complete isolation from other projects Typical users: Client security contacts, client management Note: PoC detail visibility is configurable per project — some clients want full technical details, others only summaries

Common Issues

Verify the tester is only assigned to the intended projects. Go to Settings → Users → [user] → Projects — this shows all project assignments. Remove any unintended project assignments. Check that no catch-all project assignments exist at the organization level.

The user's email from the SSO provider must match their PhantomYerra account email exactly. Check case sensitivity. If using just-in-time provisioning (auto-create on first SSO login), ensure it's enabled in Settings → SSO → Just-in-Time Provisioning. Newly provisioned users are assigned the "tester" role by default — promote as needed.

This should never happen — client isolation is enforced at the database query level. If you observe this, immediately report it as a security issue. Workaround: temporarily revoke client portal access for the affected client until the issue is investigated. Check the audit log for any anomalous data access patterns.