Use this file to discover all available pages before exploring further.
Noorle uses a role-based access control (RBAC) system combined with resource-level and action-level permissions. This allows granular control over who can do what.
Beyond role, permissions are also scoped to resources:
User: DeveloperRole: Developer (can create agents)Agent: Research Bot (created by this user)├─ Permissions: Full (create, read, update, delete)Agent: Support Bot (created by someone else)├─ Permissions: Execute only (can run it, but not modify)Gateway: Public Research (shared)├─ Permissions: Read, Execute (can see tools, run them, but not attach capabilities)
Team: Data TeamResources: All agents tagged "data-pipeline"Permissions: read, execute→ All Data Team members can see/run these agents→ Cannot modify (would need manage permission)
For fine-grained control, create custom permission sets:
Console → Settings → Team → Custom RolesCreate Role: "Pipeline Engineer"├─ Can create agents (scope: tagged with "pipeline")├─ Can execute agents├─ Can manage API keys (own only)├─ Cannot delete agents├─ Cannot access customer data└─ [Save]Assign role to: charlie@acme.com
API keys inherit from creator’s permissions but can be further scoped:
API Key created by: alice (Admin)Scope: entire account├─ Permissions: allCan be scoped to:├─ Single gateway├─ Single agent├─ Specific actions (read, execute, manage)├─ Time-limited (expires after N days)
Example:
API Key: databot-read-only├─ Creator: alice (Admin)├─ Scope: Agent "DataBot"├─ Permissions: read, execute├─ Expires: 2024-06-30│→ Can only read/execute DataBot→ Cannot create/modify anything→ Automatically expires
Third-party apps get permissions based on user and requested scope:
User: bob (Developer)App: "Analytics Dashboard"Requested scope: read offline_accessEffective permissions:├─ Can read only (inherited from user)├─ Cannot execute (not in scope)├─ Cannot create (not in scope)│→ Even if bob is Admin, app only gets "read"
Agent: "Customer Analysis"Owner: aliceShare with:├─ bob@acme.com (Execute, Read)├─ data-team@acme.com (Execute, Read)└─ finance-team@acme.com (Read only)Permissions:├─ bob can run agent and view results├─ data-team can run agent and view results├─ finance-team can only view results (read-only)
Account Level├─ alice (Owner) → Full controlGateway Level├─ Research Gateway ├─ alice (inherited: Owner) ├─ bob (Developer, shared) └─ charlie (Member, shared)Capability Level├─ Web Search (attached to Research Gateway) ├─ alice can manage/execute ├─ bob can execute └─ charlie can executeAgent using Gateway + Capability├─ alice full control├─ bob can execute (via gateway + agent share)├─ charlie can execute (via gateway + agent share)
Audit Log:├─ 2024-03-22 10:00 | alice | added bob as Admin├─ 2024-03-22 10:05 | alice | shared Agent "DataBot" with charlie├─ 2024-03-22 10:10 | bob | created Agent "Report"├─ 2024-03-22 10:15 | alice | removed charlie from "Data Team"├─ 2024-03-22 10:20 | bob | executed Agent "DataBot"└─ 2024-03-22 10:25 | alice | rotated API keyFull history preserved. Searchable by:├─ User├─ Action type├─ Resource├─ Time range
1. Create account with Developer role2. Can create own agents and gateways3. Cannot see others' resources initially4. Grant read access to shared agents if needed
1. Create account with Member role2. Share specific agent to execute3. They can run agent, view results4. They cannot create or modify anything5. Revoke access when done
1. List all resources owned by person2. Transfer ownership to another team member3. Remove their account access4. Revoke API keys5. Verify in audit log
Check your role. Ask owner for higher role if needed.
Can’t see shared agent
Confirm resource was shared with you. Owner may need to re-share.
API key works for some calls, not others
Check API key scope. May be limited to specific resource.
Can’t find audit log
Owner/Admin only. Ask owner to check audit log.
You’ve completed the Learn tab! All 20 pages cover Noorle’s architecture, core concepts, and security model. Next, explore the Use tab for practical guides.