RBAC Dashboard UI Guide
Complete step-by-step walkthrough of the RBAC dashboard (/dashboard/rbac). Learn how to navigate tabs, configure roles, manage permissions, and use all available tools.
Dashboard Overview
The RBAC dashboard is the central control center for all permission management. It's organized into 8 tabs for different functions:
Setup: Initialize policies, choose templates, configure global settings
Roles: View synced Discord roles, manage role priorities, view grants
Permissions: Create and manage capability grants for roles
Overrides: Manage user-specific permission exceptions
Audit: View and search permission decision logs
Simulator: Test permission decisions safely
Modules: View available modules and their capabilities
Catalog: Browse full capability catalog with filters
Setup Tab - Policy Initialization
The Setup tab is where you configure your policy foundation:
Policy Status Section
Shows current policy state:
- •Current policy version
- •Last modified timestamp
- •Total roles synced
- •Total grants defined
Template Selection (Initial Setup)
If RBAC not initialized, shows template grid:
Click any template card to select it and initialize RBAC.
Global Settings
Configuration toggles and inputs:
Admin Bypass Enabled
Toggle: Allow admins to skip RBAC checks
Break Glass Enabled
Toggle: Allow owner emergency override
Require Discord Gate
Toggle: Check Discord permissions first
Default Public
Toggle: Allow by default or deny by default
Audit Retention Days
Number input: How long to keep logs
Actions
Management buttons:
- •Save Changes: Green button to save any setting modifications
- •Reinitialize: Switch templates (destructive)
- •Export Policy: Download as JSON
- •Import Policy: Upload JSON
Roles Tab - Discord Role Management
View and manage Discord roles and their grants:
Sync Roles Button
Green button to manually refresh role list from Discord. Click after creating new roles in Discord server settings.
Roles List
Sortable table of all synced roles with columns:
- •Role Name: With Discord role color indicator
- •Priority: Evaluation order (editable)
- •Members: Count of users with role
- •Grants: Number of grants for this role
- •Actions: Expand/Edit buttons
Expand Role to View Grants
Click role row to expand. Shows all grants for that role:
- •Capability name
- •Effect (ALLOW/DENY badge, color-coded)
- •Scope (GUILD, CATEGORY, CHANNEL)
- •Delete button (red X) to remove grant
Edit Priority
Click priority number to edit. Can drag roles to reorder, or type priority number directly. Changes apply immediately.
Add Grant Button
Green button in expanded role section. Opens form to add new grant to that role.
Permissions Tab - Grant Management
Add and manage capability grants across all roles:
Filter & Search
Tools to find grants:
- •Role Filter: Dropdown to show grants only for selected role
- •Capability Search: Text field to find capabilities by name
- •Risk Level Filter: Checkboxes for LOW, MED, HIGH, CRITICAL
Grants Overview
Shows all grants matching your filters in a searchable list view.
Create Grant Workflow
1. Click "Add Grant" (green button at top)
2. Modal form opens:
- •Dropdown to select Role (SearchableSelect)
- •Dropdown to select Capability (SearchableSelect, shows risk tier)
- •Radio buttons: ALLOW or DENY
- •Optional scope selector (GUILD, CATEGORY, CHANNEL)
3. Click "Create Grant" (green button) to save
Edit/Delete Grants
In the grants list, each entry has Edit (pencil) and Delete (trash) buttons. Edit opens same form to modify grant. Delete removes it permanently.
Overrides Tab - User Exceptions
Manage user-specific permission overrides:
Create Override
Green "Create Override" button opens form to add user exception.
Override List
Table showing all active and expired overrides:
- •User name and ID
- •Capability overridden
- •Effect (ALLOW/DENY badge)
- •Expiry status (badge: Green/Yellow/Red/Gray)
- •Reason (if provided)
Filter & Search
Search by user name or capability. Filter by status (active, expired).
Edit/Remove
Click override row to expand and edit. Edit button (pencil) opens form. Remove button (trash) deletes it.
Audit Tab - Decision Logs
View and search permission decision logs:
Filter Controls
Top section with multiple filter options:
- •User filter (SearchableSelect)
- •Capability filter (SearchableSelect)
- •Decision checkboxes (ALLOW, DENY)
- •Reason code multi-select
- •Date range picker
Audit Log List
Chronological list of permission checks (newest first):
- •User who made request
- •Capability requested
- •Decision (ALLOW/DENY badge, color-coded)
- •Reason code
- •Timestamp
Expand for Details
Click any log entry to expand. Shows full details: user ID, all roles, scope, source, decision path with all evaluated grants.
Export
Green button to export visible logs to CSV or JSON for external analysis.
Simulator Tab - Permission Testing
Test permission decisions safely:
Simulation Form
Input fields for test case:
- •User ID input (username or ID)
- •Capability selector (SearchableSelect)
- •Scope selector (optional)
- •Green "Simulate" button
Simulation Results
After clicking Simulate:
- •Large ALLOW/DENY badge showing decision
- •Reason code
- •Actor details (roles, admin status, overrides)
- •Decision path showing grant evaluation order
Modules & Catalog Tabs
Reference tabs for exploring capabilities:
Modules Tab
Shows available modules and their capability groups:
- •Moderation: Member management, channel moderation
- •Economy: Currency, balance management
- •RBAC: Permission policy management
- •Security: Anti-nuke, anti-raid, threats
Catalog Tab
Browse all capabilities with filters:
- •Group filter dropdown
- •Risk tier checkboxes
- •Search text field
- •Click capability to view full details
UI Component Standards
All dashboard components follow consistent styling:
Buttons
Green buttons with black text: Primary actions (Save, Create, Simulate, Sync). Disabled if validation fails.
Red buttons: Destructive actions (Delete, Remove, Reset).
Gray buttons: Secondary actions (Cancel, Export).
Dropdowns
All dropdowns requiring user selection use SearchableSelect component: typeable for quick search, shows icons, filterable results.
Color-Coded Badges
Visual indicators for status:
- •Green: ALLOW, active, success
- •Red: DENY, error, critical
- •Yellow: Warning, medium risk, caution
- •Blue: Info, LOW risk
- •Gray: Disabled, archived, inactive
Info Boxes
Contextual information boxes with colored left border: Blue for info, Yellow for warnings, Green for tips.
Common Dashboard Workflows
Step-by-step guides for typical tasks:
Add a Grant to a Role
- 1. Roles tab → Find role and expand
- 2. Click "Add Grant" (green button)
- 3. Select capability from dropdown
- 4. Choose ALLOW or DENY effect
- 5. Optionally set scope (GUILD, CATEGORY, CHANNEL)
- 6. Click "Create Grant" (green button)
Create Temporary User Override
- 1. Overrides tab → Click "Create Override"
- 2. Search for user in dropdown
- 3. Select capability to override
- 4. Choose ALLOW or DENY effect
- 5. Set expiry date/time (e.g., tomorrow at 3 PM)
- 6. Add reason (e.g., "Emergency access for incident response")
- 7. Click "Create Override" (green button)
Debug: Why Can't User X Do Action Y?
- 1. Simulator tab → Enter user ID and capability
- 2. Click "Simulate" (green button)
- 3. See ALLOW/DENY result and reason code
- 4. Review decision path to understand why
- 5. If result is wrong, go to Roles tab and add missing grant
- 6. Re-simulate to confirm fix
Review Permission Decisions
- 1. Audit tab → Set filters (user, capability, decision)
- 2. Review log entries for patterns
- 3. Click entry to expand and see full details
- 4. Look for unexpected patterns: Frequent DENY, unusual activity
- 5. Export logs if needed for compliance
Dashboard Best Practices
- 1.Test before deploying: Always simulate grant changes in Simulator tab first
- 2.Use descriptive names: When naming overrides, provide clear reasons for audit trail
- 3.Regular audits: Check Audit tab weekly for unexpected permission patterns
- 4.Export logs monthly: Download audit logs for compliance and archival
- 5.Keep policies simple: Avoid excessive overlapping grants. Clear structure is easier to audit.
- 6.Use Overrides sparingly: If creating many overrides for a role, grant the role instead