Adding Users and Managing Roles
How to grant users access to the CIPP App
Initial User Setup
When you first set up CIPP, you will need to create your first user in one of two ways:
For hosted clients, invites and roles can be managed by logging into the management portal here
For self-hosted users:
Go to the Azure Portal.
Go to your CIPP Resource Group.
Select your CIPP Static Web App
CIPP-SWA-XXXX.Under Settings, Select Role Management (Not IAM Role Management).
Select invite user.
Add the roles for the user. Multiple roles can be applied to the same user.
Additional User Setup
Once you have your initial superadmin user added, you are now ready to finish the first setup. After completing the setup, you can return hereto set up additional users using the built-in roles or custom CIPP roles via CIPP Roles.
Built-In Roles
CIPP features a role management system which utilizes the Roles feature of Azure Static Web Apps. The roles available in CIPP are as follows:
readonly
Only allowed to read and list items and send push messages to users.
editor
Allowed to perform everything, except change system settings.
admin
Allowed to perform everything.
superadmin
A role that is only allowed to access the settings menu for specific high-privilege settings, such as setting up the I want to manage my own tenant settings.
You can assign these roles to users using the CIPP Roles page.
Custom Roles
While CIPP only supplies the above roles by default, you can create your own custom roles and apply them to your users with editor or readonly rights, admin users are unaffected by custom roles.
Set up Custom Roles by following these steps:
Go to CIPP -> Advanced -> Super Admin -> CIPP Roles.
Select a Custom Role from the list or start typing to create a new one if you do not yet have any.
Please ensure that your custom role is entirely in lowercase and does not contain spaces or special characters.
Optionally select a Entra group this role will be mapped to. Adding an Entra group removes the requirement to add the user to either the SWA or inviting via the Management Portal.
For Allowed Tenants select a subset of tenants to manage, tenant groups, or AllTenants.
If AllTenants is selected, you can block a subset of tenants or tenant groups using Blocked Tenants.
Optionally select the CIPP endpoints that you want to block for the role. For example, if you do not want the role to have access to delete users/mailboxes you would block
RemoveUser.Select the API permission from the listed categories and choose from None, Read or Read/Write.
To find out which API endpoints are affected by these selections, click on the Info button.
Not defining a category is the same as setting None. Be sure that you define all base role permissions you want to apply to the user.
You must be sure to assign both the custom role and the base role
readonlyoreditorto the users.If using Entra ID groups, you can map the base role to a Entra group (eg.
CIPP readonlymapped toreadonly) and add the user to the base role Entra group and the custom role Entra group to properly manage permissionsIf using SWA role management (self-hosted) or management portal (CyberDrain hosted) be sure to add both roles to the user manually.
Users previously directly added to the SWA or via the Management App will retain their settings from there. Adding those users via Entra group to a role with different permissions can cause errors in determining the user's access. It is recommended not to duplicate how you provide the user with permissions.
If you continue to utilize SWA/Management App for role assignment, note that the roles do not sync so you will need to carefully type the role exactly as it appears in CIPP Roles for the role to properly apply.
Last updated
Was this helpful?

