Overview
Genesis Data Agents provides enterprise-grade security controls through a multi-layered approach to access management. Administrators can control what users can see, which agents they can interact with, and what actions agents can perform on behalf of users.Users and Roles Management
The Users and Roles Management interface provides a centralized location for managing all security configurations. Access this through the Genesis UI sidebar under Config → Users & Roles.Key Features
User Management
View and manage user roles and permissions across your organization
Role Definitions
Create and customize roles with granular permission controls
Agent Access
Control which agents users can interact with based on their roles
Tool Access
Manage which tools are available to different roles
Role Configuration
Editing Roles
When editing a role, you’ll have access to four main configuration sections:Basic Information
Basic Information
Name: The role identifier (e.g., “admin”, “user”, “data_analyst”)Description: A clear explanation of the role’s purpose and intended users
Permissions
Permissions
Controls what users with this role can access within the Genesis UI, including:
- access_config_panel: Access to configuration panel
- access_pulse_panel: Access to monitoring panel
- manage_users: Manage users and roles
- manage_agents: Create/update/delete agents
- manage_connections: Manage database connections
- manage_secrets: Manage secrets and credentials
- view_all_threads: View all chat threads
- view_all_secrets: View all secrets
Agent Access
Agent Access
Specify which data agent that users with this role can interact with.
You can:
You can:
- Grant access to specific agents by selecting them individually
- Restrict access by leaving agents unselected
- Update agent access as your organization’s needs evolve
Secret Access
Secret Access
Control which secrets stored in the Genesis Secret Vault are accessible to this role. This ensures sensitive credentials are only available to authorized users.
Tool Access
Tool Access
Define which tools agents can use when acting on behalf of users with this role.Configuration Options:
- Select specific tools to allow
- Use “Select All” and then remove specific tools to create an allowlist
- Remove tool access entirely to create the most restrictive permissions
Three-Layer Tool Control System
Genesis implements a sophisticated three-layer approach to tool access control, providing defense-in-depth security:Layer 1: Tool Configuration (Agent Toolbox)
An agent must have a tool in its toolbox to use it. This is the foundational layer of tool access.
- Each agent has a configured set of tools available in its toolbox
- By default, agents can add tools to themselves dynamically as needed
- Administrators can disable the “Allow Agents to Add Tools to Itself” setting to prevent self-service tool addition
Layer 2: RBAC Tool Usage Control (Primary Access Control)
How it works:- Each role has a defined set of tools it’s permitted to use
- Administrators can include or exclude any tool for any role
- Dual Authorization: Just because an agent has a tool doesn’t mean it can use it—both the agent’s role and the user’s role must permit access
Layer 3: High-Risk Tools Toggle (System-Level Override)
How it works:- Independent control that overrides Layer 1 and Layer 2
- Blocks specific tools identified as high-risk (currently hard-coded, more will be added)
- When enabled, high-risk tools are completely blocked system-wide
- Python code execution tools
- System command execution tools
- File system modification tools
- Database write/delete operations
- ✓ An agent has the tool configured (Layer 1)
- ✓ Both agent and user roles allow the tool (Layer 2)
Built-in Roles
Genesis provides default roles for common use cases:Admin
Default Role for Eve AgentFull access to all features, agents, tools, and administrative functions. Use sparingly and only for trusted administrators.
User
Default Role for New AgentsStandard user access with configurable agent and tool permissions. New agents created in the system automatically receive this role.
Current User Information
View your own role assignments and permissions by navigating to Users & Roles → Current User Information. This section shows:- Your assigned roles
- Permissions granted to you
- Agents you have access to
- Tools you’re authorized to use
Security Best Practices
1
Apply Least Privilege
Grant users and agents only the minimum permissions required for their functions. Start with restrictive permissions and add access as needed.
2
Review Tool Access Regularly
Periodically audit which tools are enabled for each role. Remove access to tools that are no longer needed.
3
Enable High-Risk Tools Toggle
For production environments, consider enabling the High-Risk Tools toggle to prevent dangerous operations unless explicitly needed.
4
Use Role-Based Agent Assignment
Assign agents to roles based on their intended purpose. Specialized agents should have restricted tool access aligned with their function.
5
Monitor Agent Tool Usage
Regularly review which tools agents are attempting to use. Unusual tool access patterns may indicate misconfigurations or security concerns.
6
Secure Secrets Properly
Leverage the Secret Access configuration to ensure sensitive credentials are only available to roles that absolutely require them.
Creating Custom Roles
To create a new role tailored to your organization’s needs:- Navigate to Users & Roles in the Genesis UI
- Click Create New Role
- Configure the four main sections:
- Basic Information: Name and description
- Permissions: UI and system access
- Agent Access: Which agents this role can use
- Tool Access: Which tools are permitted
- Click Save to activate the role
Agent Role Assignment
All agents are assigned roles just like users:- Eve (the primary Genesis agent) has the admin role by default
- New agents are automatically assigned the user role
- Administrators can assign additional roles to agents as needed
- Agent role permissions are enforced in conjunction with user role permissions (Layer 2)
Remember: An agent having a tool and being allowed to use it are two different things. The agent’s role permissions must align with the user’s role permissions for tool execution to succeed.
FAQ
What happens if I disable a tool an agent is currently using?
What happens if I disable a tool an agent is currently using?
The agent will immediately lose access to that tool. Any in-progress operations using that tool will fail, and future attempts to use it will be blocked.
Can I create roles that have access to some agents but not others?
Can I create roles that have access to some agents but not others?
Yes! Use the Agent Access section when editing a role to specify exactly which agents users with that role can interact with.
What's the difference between Layer 2 and Layer 3 tool controls?
What's the difference between Layer 2 and Layer 3 tool controls?
Layer 2 (RBAC) provides granular, role-based control over individual tools. Layer 3 (High-Risk Toggle) is a system-wide emergency switch that blocks specific high-risk tools regardless of role permissions. Layer 3 is simpler but less flexible.
Can agents add tools to themselves even with RBAC restrictions?
Can agents add tools to themselves even with RBAC restrictions?
By default, yes—agents can add tools to their toolbox. However, even if they add a tool (Layer 1), they still need role permission to use it (Layer 2). Admins can also disable self-service tool addition entirely.
How do I see which tools are currently blocked by the High-Risk toggle?
How do I see which tools are currently blocked by the High-Risk toggle?
Navigate to Users & Roles → Security Settings. The interface lists all high-risk tools that will be blocked when the toggle is enabled. This list will expand as more tools are identified as high-risk.

