--- Title: Create roles with combined access alwaysopen: false categories: - docs - operate - rs description: Create roles with both cluster and database access. linkTitle: Create roles with combined access weight: 16 url: '/operate/rs/7.8/security/access-control/create-combined-roles/' --- To create a role that grants database access privileges and allows access to the Cluster Management UI and REST API: 1. [Define Redis ACLs](#define-redis-acls) that determine database access privileges. 1. [Create a role with ACLs](#create-role) added and choose a **Cluster management role** other than **None**. ## Define Redis ACLs You can use the [Cluster Manager UI](#define-acls-ui) or the [REST API](#define-acls-rest-api) to define Redis ACL rules that you can assign to roles. ### Cluster Manager UI method {#define-acls-ui} To define a Redis ACL rule using the Cluster Manager UI: 1. From **Access Control > Redis ACLs**, you can either: - Point to a Redis ACL and select {{< image filename="/images/rs/buttons/edit-button.png#no-click" alt="The Edit button" width="25px" class="inline" >}} to edit an existing Redis ACL. - Select **+ Add Redis ACL** to create a new Redis ACL. 1. Enter a descriptive name for the Redis ACL. This will be used to associate the ACL rule with the role. 1. Define the ACL rule. For more information about Redis ACL rules and syntax, see the [Redis ACL overview]({{}}). {{}} The **ACL builder** does not support selectors and key permissions. Use **Free text command** to manually define them instead. {{}} 1. Select **Save**. {{}} For multi-key commands on multi-slot keys, the return value is `failure`, but the command runs on the keys that are allowed. {{}} ### REST API method {#define-acls-rest-api} To define a Redis ACL rule using the REST API, use a [create Redis ACL]({{}}) request. For more information about Redis ACL rules and syntax, see the [Redis ACL overview]({{}}). Example request: ```sh POST /v1/redis_acls { "name": "Test_ACL_1", "acl": "+@read +FT.INFO +FT.SEARCH" } ``` Example response body: ```json { "acl": "+@read +FT.INFO +FT.SEARCH", "name": "Test_ACL_1", "uid": 11 } ``` To associate the Redis ACL with a role and database, use the `uid` from the response as the `redis_acl_uid` when you add `roles_permissions` to the database. See [Associate a database with roles and Redis ACLs](#associate-roles-acls-rest-api) for an example request. ## Create roles with ACLs and cluster access {#create-role} You can create a role that grants database access privileges and allows access to the Cluster Management UI and REST API. ### Cluster Manager UI method {#create-roles-ui} To define a role for combined access using the Cluster Manager UI: 1. From **Access Control** > **Roles**, you can: - Point to a role and select {{< image filename="/images/rs/buttons/edit-button.png#no-click" alt="The Edit button" width="25px" class="inline" >}} to edit an existing role. - Select **+ Add role** to create a new role. {{Add role with name}} 1. Enter a descriptive name for the role. This will be used to reference the role when configuring users. 1. Choose a **Cluster management role** other than **None**. For details about permissions granted by each role, see [Cluster Manager UI permissions]({{}}) and [REST API permissions]({{}}). {{Add role with name}} 1. Select **+ Add ACL**. {{Add role database acl}} 1. Choose a Redis ACL and databases to associate with the role. {{Add databases to access}} 1. Select the check mark {{< image filename="/images/rs/buttons/checkmark-button.png#no-click" alt="The Check button" width="25px" class="inline" >}} to confirm. 1. Select **Save**. {{Add databases to access}} You can [assign the new role to users]({{}}) to grant database access and access to the Cluster Manager UI and REST API. ### REST API method {#define-roles-rest-api} To define a role for combined access using the REST API: 1. [Create a role.](#create-role-rest-api) 1. [Associate a database with roles and Redis ACLs.](#associate-roles-acls-rest-api) #### Create a role {#create-role-rest-api} To [create a role]({{}}) using the REST API: ```sh POST /v1/roles { "name": "", "management": "db_viewer | db_member | cluster_viewer | cluster_member | admin" } ``` Example response body: ```json { "management": "admin", "name": "", "uid": 7 } ``` To associate the role with a Redis ACL and database, use the `uid` from the response as the `role_uid` when you add `roles_permissions` to the database. See [Associate a database with roles and Redis ACLs](#associate-roles-acls-rest-api) for an example request. #### Associate a database with roles and Redis ACLs {#associate-roles-acls-rest-api} [Update a database's configuration]({{}}) to add `roles_permissions` with the role and Redis ACL: ```sh POST /v1/bdbs/ { "roles_permissions": [ { "role_uid": , "redis_acl_uid": } ] } ```