Dashboard Guide

RBAC Dashboard UI Guide

Complete step-by-step walkthrough of the RBAC dashboard (/dashboard/rbac). Learn how to navigate tabs, configure roles, manage permissions, and use all available tools.

Dashboard Overview

The RBAC dashboard is the central control center for all permission management. It's organized into 8 tabs for different functions:

Setup: Initialize policies, choose templates, configure global settings

Roles: View synced Discord roles, manage role priorities, view grants

Permissions: Create and manage capability grants for roles

Overrides: Manage user-specific permission exceptions

Audit: View and search permission decision logs

Simulator: Test permission decisions safely

Modules: View available modules and their capabilities

Catalog: Browse full capability catalog with filters

Setup Tab - Policy Initialization

The Setup tab is where you configure your policy foundation:

Policy Status Section

Shows current policy state:

  • Current policy version
  • Last modified timestamp
  • Total roles synced
  • Total grants defined

Template Selection (Initial Setup)

If RBAC not initialized, shows template grid:

PermissiveTrust roles broadly
BalancedRecommended default
StrictWhitelist-only
LockdownEmergency mode

Click any template card to select it and initialize RBAC.

Global Settings

Configuration toggles and inputs:

Admin Bypass Enabled

Toggle: Allow admins to skip RBAC checks

Break Glass Enabled

Toggle: Allow owner emergency override

Require Discord Gate

Toggle: Check Discord permissions first

Default Public

Toggle: Allow by default or deny by default

Audit Retention Days

Number input: How long to keep logs

Actions

Management buttons:

  • Save Changes: Green button to save any setting modifications
  • Reinitialize: Switch templates (destructive)
  • Export Policy: Download as JSON
  • Import Policy: Upload JSON

Roles Tab - Discord Role Management

View and manage Discord roles and their grants:

Sync Roles Button

Green button to manually refresh role list from Discord. Click after creating new roles in Discord server settings.

Roles List

Sortable table of all synced roles with columns:

  • Role Name: With Discord role color indicator
  • Priority: Evaluation order (editable)
  • Members: Count of users with role
  • Grants: Number of grants for this role
  • Actions: Expand/Edit buttons

Expand Role to View Grants

Click role row to expand. Shows all grants for that role:

  • Capability name
  • Effect (ALLOW/DENY badge, color-coded)
  • Scope (GUILD, CATEGORY, CHANNEL)
  • Delete button (red X) to remove grant

Edit Priority

Click priority number to edit. Can drag roles to reorder, or type priority number directly. Changes apply immediately.

Add Grant Button

Green button in expanded role section. Opens form to add new grant to that role.

Permissions Tab - Grant Management

Add and manage capability grants across all roles:

Filter & Search

Tools to find grants:

  • Role Filter: Dropdown to show grants only for selected role
  • Capability Search: Text field to find capabilities by name
  • Risk Level Filter: Checkboxes for LOW, MED, HIGH, CRITICAL

Grants Overview

Shows all grants matching your filters in a searchable list view.

Create Grant Workflow

1. Click "Add Grant" (green button at top)

2. Modal form opens:

  • Dropdown to select Role (SearchableSelect)
  • Dropdown to select Capability (SearchableSelect, shows risk tier)
  • Radio buttons: ALLOW or DENY
  • Optional scope selector (GUILD, CATEGORY, CHANNEL)

3. Click "Create Grant" (green button) to save

Edit/Delete Grants

In the grants list, each entry has Edit (pencil) and Delete (trash) buttons. Edit opens same form to modify grant. Delete removes it permanently.

Overrides Tab - User Exceptions

Manage user-specific permission overrides:

Create Override

Green "Create Override" button opens form to add user exception.

Override List

Table showing all active and expired overrides:

  • User name and ID
  • Capability overridden
  • Effect (ALLOW/DENY badge)
  • Expiry status (badge: Green/Yellow/Red/Gray)
  • Reason (if provided)

Filter & Search

Search by user name or capability. Filter by status (active, expired).

Edit/Remove

Click override row to expand and edit. Edit button (pencil) opens form. Remove button (trash) deletes it.

Audit Tab - Decision Logs

View and search permission decision logs:

Filter Controls

Top section with multiple filter options:

  • User filter (SearchableSelect)
  • Capability filter (SearchableSelect)
  • Decision checkboxes (ALLOW, DENY)
  • Reason code multi-select
  • Date range picker

Audit Log List

Chronological list of permission checks (newest first):

  • User who made request
  • Capability requested
  • Decision (ALLOW/DENY badge, color-coded)
  • Reason code
  • Timestamp

Expand for Details

Click any log entry to expand. Shows full details: user ID, all roles, scope, source, decision path with all evaluated grants.

Export

Green button to export visible logs to CSV or JSON for external analysis.

Simulator Tab - Permission Testing

Test permission decisions safely:

Simulation Form

Input fields for test case:

  • User ID input (username or ID)
  • Capability selector (SearchableSelect)
  • Scope selector (optional)
  • Green "Simulate" button

Simulation Results

After clicking Simulate:

  • Large ALLOW/DENY badge showing decision
  • Reason code
  • Actor details (roles, admin status, overrides)
  • Decision path showing grant evaluation order

Modules & Catalog Tabs

Reference tabs for exploring capabilities:

Modules Tab

Shows available modules and their capability groups:

  • Moderation: Member management, channel moderation
  • Economy: Currency, balance management
  • RBAC: Permission policy management
  • Security: Anti-nuke, anti-raid, threats

Catalog Tab

Browse all capabilities with filters:

  • Group filter dropdown
  • Risk tier checkboxes
  • Search text field
  • Click capability to view full details

UI Component Standards

All dashboard components follow consistent styling:

Buttons

Green buttons with black text: Primary actions (Save, Create, Simulate, Sync). Disabled if validation fails.

Red buttons: Destructive actions (Delete, Remove, Reset).

Gray buttons: Secondary actions (Cancel, Export).

Dropdowns

All dropdowns requiring user selection use SearchableSelect component: typeable for quick search, shows icons, filterable results.

Color-Coded Badges

Visual indicators for status:

  • Green: ALLOW, active, success
  • Red: DENY, error, critical
  • Yellow: Warning, medium risk, caution
  • Blue: Info, LOW risk
  • Gray: Disabled, archived, inactive

Info Boxes

Contextual information boxes with colored left border: Blue for info, Yellow for warnings, Green for tips.

Common Dashboard Workflows

Step-by-step guides for typical tasks:

Add a Grant to a Role

  1. 1. Roles tab → Find role and expand
  2. 2. Click "Add Grant" (green button)
  3. 3. Select capability from dropdown
  4. 4. Choose ALLOW or DENY effect
  5. 5. Optionally set scope (GUILD, CATEGORY, CHANNEL)
  6. 6. Click "Create Grant" (green button)

Create Temporary User Override

  1. 1. Overrides tab → Click "Create Override"
  2. 2. Search for user in dropdown
  3. 3. Select capability to override
  4. 4. Choose ALLOW or DENY effect
  5. 5. Set expiry date/time (e.g., tomorrow at 3 PM)
  6. 6. Add reason (e.g., "Emergency access for incident response")
  7. 7. Click "Create Override" (green button)

Debug: Why Can't User X Do Action Y?

  1. 1. Simulator tab → Enter user ID and capability
  2. 2. Click "Simulate" (green button)
  3. 3. See ALLOW/DENY result and reason code
  4. 4. Review decision path to understand why
  5. 5. If result is wrong, go to Roles tab and add missing grant
  6. 6. Re-simulate to confirm fix

Review Permission Decisions

  1. 1. Audit tab → Set filters (user, capability, decision)
  2. 2. Review log entries for patterns
  3. 3. Click entry to expand and see full details
  4. 4. Look for unexpected patterns: Frequent DENY, unusual activity
  5. 5. Export logs if needed for compliance

Dashboard Best Practices

  • 1.Test before deploying: Always simulate grant changes in Simulator tab first
  • 2.Use descriptive names: When naming overrides, provide clear reasons for audit trail
  • 3.Regular audits: Check Audit tab weekly for unexpected permission patterns
  • 4.Export logs monthly: Download audit logs for compliance and archival
  • 5.Keep policies simple: Avoid excessive overlapping grants. Clear structure is easier to audit.
  • 6.Use Overrides sparingly: If creating many overrides for a role, grant the role instead