Overview
Cekura provides comprehensive Role-Based Access Control (RBAC) to help enterprise teams manage permissions and secure access to your voice AI testing infrastructure. Control who can access what through both the dashboard UI and programmatic API keys.User Roles (Dashboard)
Cekura supports three membership types for team collaboration through the dashboard interface:Admin
Full administrative access to all features and settings. Permissions include:- Complete workspace management and configuration
- User management (invite, remove, and change member roles)
- Billing and subscription management
- Create, edit, and delete agents, evaluators, and metrics
- Access to all projects and test results
- Configure integrations and webhooks
- Manage API keys and developer settings
- View raw transcripts, recordings, and analytics
- Engineering leads and managers
- DevOps and infrastructure teams
- Account owners
Member
Standard access for developers and engineers building and testing agents. Members only have access to selected projects assigned to them by Admins. Permissions include:- Create, edit, and delete agents, evaluators, and metrics within assigned projects
- Run tests and simulations on assigned projects
- View test results and analytics for assigned projects
- Access raw transcripts and recordings for assigned projects
- Configure test profiles and scenarios within assigned projects
- Access projects they haven’t been assigned to
- Manage billing or subscriptions
- Invite or remove team members
- Change other users’ permissions
- Delete the workspace
- Voice AI developers working on specific environments (dev, staging, production)
- Team-specific access (e.g., Team A only accesses their projects, Team B only accesses theirs)
- QA engineers testing specific product lines
- Contractors or external developers with limited scope
Project-based isolation: Use projects to separate environments (dev, staging, production) or teams. Assign Members only to the projects they need access to for enhanced security and organization.
Viewer
Read-only access for stakeholders who need visibility without modification capabilities. Permissions include:- View agents, evaluators, and test results
- Access analytics and dashboards
- View scrubbed call history
- Generate reports
- Create or modify any resources
- Start tests or make calls
- Access raw transcripts or recordings
- Manage integrations or settings
- View billing information
- Product managers
- Business stakeholders
- Compliance and audit teams
API Key Types
Cekura provides three types of API keys with different permission levels for programmatic access:Admin API Keys
Full API access equivalent to Admin dashboard permissions. Capabilities:- All CRUD operations across all resources
- Access to all projects in the organization
- User and organization management
- Billing and usage data retrieval
- Webhook configuration
- Complete observability data access
- Treat as highly sensitive credentials
- Rotate regularly (recommended: every 90 days)
- Store in secure secret management systems
- Limit to backend services only
- Never commit to version control
Project API Keys
Scoped access limited to specific projects for enhanced security. Capabilities:- Full access to assigned project resources only
- Create and manage agents, evaluators, metrics within the project
- Run tests and retrieve results for the project
- Send observability data for the project
- Access transcripts and analytics for the project
- Cannot access other projects
- Cannot manage users or organization settings
- Cannot view billing information
- Cannot create or delete projects
- Use for development and staging environments
- Assign minimum required project access
- Different keys per project for isolation
- Safe to use in CI/CD pipelines
Read-Only API Keys
Limited to read operations only, ideal for analytics and monitoring. Capabilities:- Retrieve agents, evaluators, and metrics (GET only)
- Access test results and analytics
- Fetch call transcripts and recordings
- Query observability data
- Generate reports
- No write, update, or delete operations
- Cannot start tests or make calls
- Cannot modify any configurations
- Cannot access billing or user management
- Safe for frontend applications with proper precautions
- Suitable for monitoring and alerting systems
- Can be shared with external analytics tools
- Lower risk if accidentally exposed
Best Practices
Team Structure Recommendations
Project-Based Access Patterns
Environment Separation:API Key Management
-
Key Rotation
- Admin keys: Rotate every 90 days
- Project keys: Rotate every 180 days
- Read-only keys: Rotate annually or when team members leave
-
Storage
- Use environment variables for all API keys
- Store in secret management systems (AWS Secrets Manager, HashiCorp Vault, etc.)
- Never hardcode in application code
- Never commit to version control
-
Access Patterns
-
Monitoring and Auditing
- Track API key usage through activity logs
- Set up alerts for unusual access patterns
- Review permissions quarterly
- Audit key access when team members change roles
Security Checklist
- All Admin API keys stored in secure secret management
- Project API keys used for development and CI/CD
- Read-Only keys used for monitoring and analytics
- Regular key rotation schedule established
- Team members have minimum required permissions
- Viewers assigned for stakeholders without modification needs
- API key usage monitored and logged
- Keys revoked when team members leave
Managing Access
Adding Team Members
1
Navigate to Settings
Go to your Cekura dashboard and click on Settings > Team.
2
Invite User
Click Invite Member and enter their email address.
3
Assign Role
Select the appropriate role: Admin, Member, or Viewer based on their responsibilities.
4
Send Invitation
The user will receive an email invitation to join your workspace.
Creating API Keys
1
Access Developer Settings
Navigate to Settings > API Keys in the dashboard.
2
Generate New Key
Click Create API Key and select the key type.
3
Configure Scope
For Project API keys, select which projects should be accessible.
4
Save Securely
Copy the API key immediately - it will only be shown once. Store it in your secret management system.
Migration Guide
Upgrading from Single API Key
If you’re currently using a single API key for all purposes, follow these steps to implement proper RBAC:- Audit current usage - Identify all systems and services using your current key
- Create scoped keys - Generate Project API keys for each service/environment
- Update services - Migrate each service to use its dedicated Project key
- Enable read-only keys - Switch monitoring and analytics tools to read-only keys
- Rotate admin key - Generate a new Admin key and update only necessary systems
- Revoke old key - Once migration is complete, revoke the original key