Manage Team Access

Temps has a role-based permission system that controls who can view, deploy, and configure your projects. Use roles for team members and API keys for CI/CD and external integrations.


Understand roles

Temps includes several built-in roles:

RoleDescription
AdminFull access to everything — projects, deployments, settings, users, backups, and system configuration
UserCan create and manage projects, deploy, and view most resources. Cannot delete critical resources or manage system settings.
ReaderRead-only access. Can view projects, deployments, logs, and analytics but cannot make changes.
CustomNo default permissions. Used for API keys where you want to grant only specific capabilities.

Additional specialized roles:

RoleDescription
ApiReaderRead-only API access. For monitoring and reporting integrations.
McpFor MCP (Model Context Protocol) server integrations.
DemoLimited access for demonstration purposes.

Create a user account

  1. In the sidebar, click Settings
  2. Go to the Users section
  3. Click Add User
  4. Enter the user's email and name
  5. Set a temporary password (the user should change it on first login)
  6. Select a role

The new user can now log in at your Temps instance URL with the provided credentials.


Assign a role

To change a user's role:

  1. Go to Settings > Users
  2. Find the user
  3. Click Edit (or the actions menu)
  4. Select the new role
  5. Save

Role changes take effect immediately. The user's next API call or page load uses the new permissions. Active sessions are not terminated — the user does not need to log in again.

Permission examples by role

ActionAdminUserReader
View projects and deploymentsYesYesYes
Create and deploy projectsYesYesNo
Manage environment variablesYesYesNo
View logs and analyticsYesYesYes
Manage domainsYesYesNo
Delete projectsYesNoNo
Manage users and rolesYesNoNo
Configure backupsYesNoNo
System settingsYesNoNo

Create an API key

API keys are used for programmatic access — CI/CD pipelines, scripts, monitoring integrations, and MCP servers.

  1. Go to Settings > API Keys
  2. Click Create API Key
  3. Enter a name (e.g. github-actions-deploy, monitoring-readonly)
  4. Select the permissions to grant (see below)
  5. Click Create
  6. Copy the key immediately — it is shown only once

The API key is used in the Authorization header:

curl -H "Authorization: Bearer tk_your_api_key" \
  "https://your-temps-instance/api/projects"

Scope API key permissions

API keys use the Custom role by default, meaning they have no permissions until you explicitly grant them. This follows the principle of least privilege.

Common permission scopes:

CI/CD deployment key

Grant only what is needed to trigger deployments:

  • deployments:create — trigger new deployments
  • deployments:read — check deployment status
  • projects:read — list projects
  • environments:read — list environments

Read-only monitoring key

For dashboards and reporting tools:

  • projects:read
  • deployments:read
  • environments:read
  • analytics:read
  • monitoring:read

Full management key

For administrative scripts (use sparingly):

  • All permissions — equivalent to Admin role

Deployment tokens

In addition to API keys, Temps automatically generates a deployment token for each project environment. This token is injected as the TEMPS_API_TOKEN environment variable in your application container.

Deployment tokens allow your running application to call back into the Temps API — for example, to report analytics events or upload source maps.

These tokens are:

  • Auto-generated and managed by Temps
  • Scoped to the specific project and environment
  • Rotated on each deployment
  • Not visible in the API key management UI (they are managed per-environment)

You do not need to create or manage deployment tokens manually. They are available in your application as process.env.TEMPS_API_TOKEN.

Was this page helpful?