Capabilities reference

Every capability available on an organization template, what it gates, and whether it is project-scoped.

The capability matrix is the cell-by-cell vocabulary of organization templates. Every capability on this page corresponds to a checkable cell in the template editor. A member's effective permissions are the union of the cells checked on their assigned template, intersected with their project scope for project-scoped cells.

Three terms appear in every row:

  • Scope. Vault-wide capabilities apply across the whole organization vault; the member can act on every machine, every audit row, every alert configuration that exists in the vault. Project-scoped capabilities apply only to projects in the member's scope list (or every project, if the member has global project access).
  • Owner-only. Some capabilities can only ever be held by the vault owner. They appear in the matrix as locked cells. Checking them on a template has no effect — the cell is filtered out before the template grants render to any member.

Capabilities are grouped by the dashboard category they appear under.

Machines

Vault-wide. Machines are the runtime identities that read secrets via the SDK or CLI. Managing them includes bootstrapping, approving pending registrations, disabling, revoking, and renaming. AI agents are the same surface (they share the Machines page).

CapabilityGatesOwner-only
Machines: ViewSee the machines page and per-machine status.No
Machines: ManageBootstrap, approve, disable, revoke, rename machines. Mint single-use and temp-machine bootstrap tokens.No
AI agents: ViewSee AI agents listed on the machines page.No
AI agents: ManageBootstrap, approve, disable, revoke, and scope AI agents.No

Enrollment tokens

Vault-wide. Enrollment tokens are the multi-use credentials used to onboard fleets of ephemeral machines (CI runners, cron jobs, transient containers) without minting per-machine bootstrap tokens up front.

CapabilityGatesOwner-only
Enrollment tokens: ViewSee the enrollment tokens page.No
Enrollment tokens: ManageCreate, revoke, and configure enrollment tokens. Generate CI bootstrap scripts for those tokens.No

Audit log

Vault-wide. Members with the base view see their own actions only. Members with the expanded view see every actor in the vault (owner, members, machines, AI agents).

CapabilityGatesOwner-only
Audit log: ViewSee the audit log page. Only the member's own actions are visible.No
Audit log: View othersExpand the view to every actor in the vault.No

Alerts

Vault-wide. Email and webhook alerts are split because they carry different trust shapes — webhook configuration holds an HMAC signing secret, email subscriptions don't.

CapabilityGatesOwner-only
Alerts: ViewSee the alerts page (subscription preferences and configured webhooks).No
Alerts: Manage emailToggle which audit actions trigger email alerts for the vault.No
Alerts: Manage webhookCreate, update, delete, and test outbound webhooks (HMAC-signed delivery).No

IP allowlist

Vault-wide. The IP allowlist gates machine authentication (not dashboard authentication). A member with manage rights can add, remove, and enable/disable CIDR entries.

CapabilityGatesOwner-only
IP allowlist: ViewSee the configured IP allowlist entries.No
IP allowlist: ManageEnable/disable the allowlist; add/remove CIDR entries.No

Integrations

Vault-wide. Integrations cover the GitHub App, GitLab OAuth, Bitbucket OAuth, and other third-party connections.

CapabilityGatesOwner-only
Integrations: ViewSee connected integrations.No
Integrations: ManageInstall, configure, and uninstall integrations.No

Trash

Vault-wide. The trash holds soft-deleted secrets pending hard-delete by the cleaner.

CapabilityGatesOwner-only
Trash: ViewSee secrets currently in the trash.No
Trash: ManageRestore secrets from trash; permanently delete trashed secrets.No

Organization

Vault-wide. The roster surface — viewing members, sending invites, suspending, removing. Assigning templates is split out because it is the privilege-escalation surface that defines what every other capability resolves to.

CapabilityGatesOwner-only
Organization: ViewSee the organization member roster.No
Organization: ManageInvite, suspend, and remove organization members.No
Organization: Assign templatesChange which template a member is assigned to, and change a member's project scope.Yes

Templates

Vault-wide. Editing templates rewrites the permission shape of every member who holds them, so the manage right is owner-only.

CapabilityGatesOwner-only
Templates: ViewSee the organization templates page.No
Templates: ManageCreate, edit, archive, and delete templates and their capability grants.Yes

Support

Vault-wide. The support page covers tickets opened on behalf of the organization.

CapabilityGatesOwner-only
Support: ViewSee the support tickets page for the vault.No
Support: ManageCreate, reply to, and close support tickets on the organization's behalf.No

Projects

The umbrella for project-scoped capabilities. Projects: View is vault-wide (it unlocks the Projects sidebar category for the member). Every other project capability is project-scoped — it only applies to projects in the member's scope list (or every project, if the member has global project access).

CapabilityGatesScopeOwner-only
Projects: ViewSee projects in the dashboard sidebar.Vault-wideNo
Projects: ManageCreate, delete, and unfreeze projects.Vault-wideNo
Secrets: ManageModify existing secrets in scoped projects (rotation schedules, canary toggles, sync configurations, value updates).Project-scopedNo
Secrets: CreateCreate new secrets in scoped projects.Project-scopedNo
Secrets: DeleteDelete (soft-delete to trash) secrets in scoped projects.Project-scopedNo
Policies: ViewSee access policies attached to secrets in scoped projects.Project-scopedNo
Policies: ManageCreate, edit, delete access policies; bind and unbind secrets to policies.Project-scopedNo
Project machines: ViewSee machines attached to scoped projects.Project-scopedNo
Project machines: ManageAttach and detach machines to/from scoped projects; configure per-secret machine grants.Project-scopedNo

Project scope

A project-scoped capability is only effective on projects in the member's scope. Two scope modes exist:

  • Global: the member can act on every project in the vault. Project-scoped capabilities behave as if every project is in their scope.
  • Specific: the member has an explicit list of projects. Project-scoped capabilities apply only to those projects; everything else is invisible and inaccessible.

A member with Projects: View but global=false and an empty scope list sees the Projects category in their sidebar but no actual projects under it. Adding projects to their scope is how the projects become visible.

What members without any template see

A member with no template assigned can:

  • Sign in to SikkerKey with their own credentials.
  • Pick your vault from the post-login picker.
  • See the Overview and Settings pages of the vault.
  • Read their own audit log entries (they will be empty until they do anything that fires an event, which without capabilities is nearly nothing).

Everything else is invisible until a template is assigned.