Skip to main content
Together uses role-based access control (RBAC) at both the Organization and Project level. Every Member of an Organization is assigned a role, and every Collaborator of a Project is assigned a role. There are two roles: Admin and Member.
Roles and permissions are being progressively rolled out across Together’s products and services. This page will be updated as more granular controls become available.

Organization Roles

RoleScopeDescription
AdminOrg-wideFull access to all Organization settings, billing, Members, and Projects.
MemberOrg (read-only)Can see Organization-level info and the Projects list. Joins Projects as a Member by default.
The creator (“Owner”) of an Organization is a special Admin. They cannot be removed from the Organization, their role cannot be changed from Admin, and they cannot delete their own account.

Organization Permissions

ScopeAdminMember
Organization settings: ReadYesYes
Organization settings: WriteYesNo
Billing: ReadYesYes
Billing: WriteYesNo
Projects: ReadYesYes
Projects: CreateYesNo
Members: ReadYesYes
Members: InviteYesNo
Members: RemoveYesNo
Members: Manage rolesYesNo

Project Roles

RoleDescription
AdminCan access and update Project settings. Organization Admins are granted Project Admin in any Project they join. Organization Members can be promoted to Project Admin by an existing Project Admin.
MemberCan use the Project’s resources but cannot access or update Project settings. Organization Members are added to Projects as Project Members by default.

Project Permissions

ScopeAdminMember
Project settings: ReadYesYes
Project settings: WriteYesNo
Project cost analyticsYesYes
API keys: ReadYesYes
API keys: CreateYesYes
API keys: RevokeYesYes
Collaborators: ReadYesYes
Collaborators: AddYesNo
Collaborators: RemoveYesNo
Collaborators: Manage rolesYesNo

External Collaborators

An External Collaborator is someone who participates in a Project without being a Member of the Project’s parent Organization. They can be assigned any role within the Project but have no Organization-level permissions beyond seeing the Organization’s name. What External Collaborators can do:
  • Full access to any Project they have been explicitly added to (based on their Project role)
  • View their own profile settings
What they cannot do:
  • Access billing settings
  • View the Organization Members list
  • See Organization-level settings

Product-Specific Permissions

GPU Clusters (Control Plane)

The control plane covers infrastructure operations: creating, modifying, and deleting clusters and volumes.
ActionAdminMember
Create clustersYesNo
Delete clustersYesNo
Scale clustersYesNo
Modify cluster configurationsYesNo
Create and resize volumesYesNo
View cluster status and detailsYesYes
View volume detailsYesYes

GPU Clusters (Data Plane)

The data plane covers using clusters for actual work: running jobs, accessing nodes, executing workloads.
ActionAdminMember
SSH into cluster nodesYesYes
Run Kubernetes workloads (kubectl)YesYes
Access Kubernetes DashboardYesYes
Submit Slurm jobsYesYes
Read and write to volumesYesYes
Control plane vs data plane: Think of the control plane as “managing the infrastructure” and the data plane as “using the infrastructure.” Members have full access to use clusters for their work. They just cannot create, delete, or resize them.

Fine-Tuning, Endpoints, Serverless Inference & Other Products

Role-based access control for Fine-Tuning, Endpoints, Serverless Inference, and other Together products is still being rolled out. Today, all Project Collaborators (both Admin and Member) have full access to these services.

What’s Coming

Together is actively rolling out RBAC across more services. Granular permissions for fine-tuning, dedicated endpoints, and serverless inference are coming soon.
Have a specific RBAC requirement? Let us know — customer feedback directly shapes our roadmap.

Projects

Create workspaces and manage team access

Together's IAM Model

How users, credentials, and resources are organized