Policy Setup
Initialize and configure your server's RBAC policy. Choose from templates, adjust global settings, and manage policy versions for your permission framework.
Policy Initialization
When you first enable RBAC for your server, you initialize a policy by selecting a template that matches your server's security needs:
Permissive Template
Best for: Small, casual servers where you trust most roles
Configuration:
- •All Discord roles granted broad permissions by default
- •Admin role has most capabilities except some CRITICAL ones (like "rbac.manage")
- •Moderator role can moderate but not manage economy
- •defaultPublic is true (capabilities allowed unless explicitly denied)
Risk level: Medium. Good for starting, but you should tighten over time.
Balanced Template
Best for: Most servers. Provides good security without excessive friction.
Configuration:
- •Owner role: All capabilities except dangerous ones require confirmation
- •Admin role: Can manage moderation and some settings, not RBAC or economy
- •Moderator role: Can ban, mute, warn, manage channels in assigned areas
- •Member role: Can use public commands, access basic capabilities only
- •defaultPublic is false (deny unless explicitly granted)
Risk level: Low. Recommended starting point (default).
Strict Template
Best for: Security-focused servers or large communities with complex role structures
Configuration:
- •Only explicitly granted capabilities are allowed
- •Each role must be individually configured with required grants
- •All dangerous operations require additional confirmation
- •defaultPublic is false (whitelist-only permissions)
Risk level: Very Low. Requires more setup but maximizes security.
Lockdown Template
Best for: Emergency situations when you need to restrict permissions immediately
Configuration:
- •Only server owner and designated emergency admins have any permissions
- •All other roles stripped of dangerous capabilities
- •Members can only view and read, not post or interact
- •defaultPublic is false
Risk level: Minimal (emergency mode). Switch to normal template after incident.
Tip: Start with Balanced template (recommended default). It provides good security without requiring extensive customization. You can always tighten permissions later as you identify actual needs.
Global Policy Settings
After choosing a template, configure these server-wide RBAC settings:
Admin Bypass Enabled
ToggleWhen enabled, users with Discord's "Administrator" permission skip all RBAC checks. They have full permissions regardless of grants.
When to enable: Small/casual servers where you want flexibility. New servers getting started.
When to disable: Security-focused servers or if you want to enforce RBAC on everyone including admins. Recommended for strict policy.
Break Glass Enabled
ToggleWhen enabled, server owner can activate break-glass mode during emergencies to bypass RBAC temporarily.
Every activation is logged: See when, why, and for how long in audit logs.
Recommendation: Keep enabled. It's a safety valve if RBAC configuration locks you out.
Require Discord Gate
ToggleWhen enabled, users must pass Discord's built-in permission check before SYNTHET evaluates RBAC. Creates a two-gate system.
Example: User tries to ban someone. Discord checks if user has "Ban Members" Discord permission. If no, blocked immediately. If yes, SYNTHET checks RBAC grants for "moderation.ban".
When useful: If you want RBAC to be additional restrictions on top of Discord permissions, not a replacement.
Default Public
ToggleWhen true, capabilities are allowed by default unless explicitly denied. When false, capabilities are denied unless explicitly allowed.
defaultPublic = true: Whitelist-based denial. Start permissive, deny what you don't want.
defaultPublic = false: Whitelist-based allowance. Start restrictive, allow what you need.
Recommendation: Use false for security. More explicit, less chance of accidental permissions.
Audit Retention Days
Number Input: 30-365How many days to keep audit logs before automatic deletion (default: 90 days).
Higher retention: Better for compliance and incident investigation, uses more storage.
Shorter retention: Lighter storage footprint, less historical data available.
Policy Version Management
Every change creates a new policy version. You can review history, compare versions, and rollback:
Version History
Shows all policy versions with timestamps. Each version displays:
- •Version number (auto-incrementing)
- •Created timestamp
- •Modified by (which user/admin made the change)
- •Change summary (what was modified)
Version Comparison
Click two versions to see a detailed diff: which grants were added, removed, or modified. Useful for understanding what changed.
Rollback to Previous Version
If a policy change causes problems, click "Rollback" on a previous version. The system creates a new version that matches the old state, preserving history.
Note: Rollback doesn't delete versions, it creates a new version with the old permissions. This preserves audit trail.
Reset and Reinitialization
If you want to start fresh with a different template or clear all customizations:
Reinitialize Policy
Choose a new template and apply it. This:
- •Preserves your current Discord roles
- •Replaces all grants with the template's defaults
- •Removes any custom grants you've added
- •Resets policy settings to template defaults
Warning: This is a destructive operation. The previous policy version is preserved in history, but you'll need to reapply any custom grants.
Disable RBAC Entirely
Completely disable RBAC for your server. This removes all SYNTHET permission checks and Discord permissions are used as-is. All audit logs and policy history are retained for reference.
Caution: Both of these actions are irreversible via the UI. Make sure you really want to do this.
Import & Export Policy Snapshots
Backup and share your policy configuration:
Export Policy
Download your current policy as a JSON file. Includes:
- •All policy settings (admin bypass, break glass, etc.)
- •All role bindings and grants
- •All user overrides (if policy includes them)
- •Timestamp and version information
Useful for: Backup, version control in Git, documentation, or migrating to another server.
Import Policy
Upload a previously exported JSON policy file to restore or copy a configuration.
Validation: The system validates the JSON structure before importing. If invalid, you'll see helpful error messages.
Tip: Use export/import to maintain policies in version control (Git). Commit policy.json alongside your server documentation.
Policy Statistics & Health Check
Overview of your policy's configuration and potential issues:
Policy Stats
Dashboard shows:
- •Current version number
- •Last modified timestamp
- •Total number of Discord roles synced
- •Total grants defined
- •Total user overrides active
- •Days of audit logs retained
Health Warnings
System identifies potential issues:
- ⚠Admin bypass enabled: Admins skip all RBAC checks
- ⚠No overrides for break-glass: No users have emergency access
- ⚠High grant count: Over 100 grants may indicate overly complex policy
- ⚠CRITICAL capabilities ungranted: No one can use critical actions
Recommended Setup Workflow
Follow this process to set up RBAC correctly:
1.Choose a template
Select Balanced template (default) or adjust based on your security needs
2.Configure settings
Review global settings: admin bypass, break glass, Discord gate, default public
3.Review role bindings
Go to Roles tab and verify Discord roles are synced with correct priority
4.Test with Simulator
Test permission checks for your key roles (moderator, admin, etc.) to ensure expected behavior
5.Monitor audit logs
After enabling, check audit logs for denied permission patterns. Adjust grants based on legitimate needs
6.Export and document
Export policy.json and store in your documentation. Add notes about role structure and grant rationale