Overview
Conduit Treasury uses role-based access control (RBAC) to ensure that team members have the appropriate level of access to perform their duties while maintaining security.Permission System
How It Works
Every action in Conduit Treasury requires a specific permission. When a user attempts an action:- System checks user’s role in the organization
- System verifies if that role has the required permission
- Action is allowed or denied based on permission check
Roles
Owner
Owner
Full ControlThe organization creator or appointed owner has complete access to all features and can perform any action.Typical User: CEO, CFO, Founder
- ✅ All account operations
- ✅ All transaction operations
- ✅ All workflow and trigger management
- ✅ View and manage all allocations
- ✅ Manage team members and roles
- ✅ Organization settings
- ✅ Billing and subscription
Admin
Admin
Management AccessAdmins can manage treasury operations but cannot modify team structure or billing.Typical User: Treasury Manager, Finance Director
- ✅ View, create, delete accounts
- ✅ Create and approve transactions
- ✅ Execute transactions
- ✅ Create, update, delete workflows
- ✅ Create, update, delete triggers
- ✅ View and manage allocations
- ❌ Manage team members
- ❌ Organization settings
- ❌ Billing
Member
Member
Read-Only AccessMembers can view treasury data but cannot make changes.Typical User: Accountant, Auditor, Board Member
- ✅ View accounts and balances
- ✅ View transactions
- ✅ View workflows and triggers
- ✅ View allocations
- ❌ Create, modify, or delete anything
- ❌ Execute transactions
- ❌ Approve transactions
Detailed Permission Matrix
| Permission | Owner | Admin | Member | Description |
|---|---|---|---|---|
| Accounts | ||||
account.view | ✅ | ✅ | ✅ | View account details and balances |
account.create | ✅ | ✅ | ❌ | Add new accounts to organization |
account.delete | ✅ | ✅ | ❌ | Remove accounts from organization |
| Transactions | ||||
transaction.view | ✅ | ✅ | ✅ | View transaction history |
transaction.create | ✅ | ✅ | ❌ | Create new transactions |
transaction.approve | ✅ | ✅ | ❌ | Approve pending transactions |
transaction.execute | ✅ | ✅ | ❌ | Execute approved transactions on-chain |
| Workflows | ||||
workflow.view | ✅ | ✅ | ✅ | View workflows |
workflow.create | ✅ | ✅ | ❌ | Create new workflows |
workflow.update | ✅ | ✅ | ❌ | Modify existing workflows |
workflow.delete | ✅ | ✅ | ❌ | Delete workflows |
| Triggers | ||||
trigger.view | ✅ | ✅ | ✅ | View triggers |
trigger.create | ✅ | ✅ | ❌ | Create new triggers |
trigger.update | ✅ | ✅ | ❌ | Modify existing triggers |
trigger.delete | ✅ | ✅ | ❌ | Delete triggers |
| Allocations | ||||
allocation.view | ✅ | ✅ | ✅ | View DeFi strategy allocations |
allocation.create | ✅ | ✅ | ❌ | Create new allocations |
allocation.update | ✅ | ✅ | ❌ | Update allocation values |
allocation.delete | ✅ | ✅ | ❌ | Delete allocations |
| Team | ||||
team.view | ✅ | ✅ | ✅ | View team members |
team.invite | ✅ | ❌ | ❌ | Invite new team members |
team.remove | ✅ | ❌ | ❌ | Remove team members |
team.role | ✅ | ❌ | ❌ | Change member roles |
API Permission Handling
Authentication Required
All API endpoints require a valid session:Permission Errors
When a user lacks permission:401 Unauthorized- No valid session403 Forbidden- Valid session but insufficient permissions
Checking Permissions
Permissions are checked server-side on every request. There’s no need to check permissions client-side beyond hiding UI elements for better UX.Security Best Practices
1. Principle of Least Privilege
Give users only the permissions they need:1
Assess Needs
Determine what each team member actually needs to do
2
Assign Minimum Role
Start with Member role, upgrade only if necessary
3
Regular Review
Audit permissions quarterly and remove unnecessary access
- Accountant reviewing records → Member role
- Treasury manager executing trades → Admin role
- CFO overseeing everything → Owner role
2. Use Teams for Organization
Organize accounts and users by department:3. Transaction Approval Workflow
Implement maker-checker controls:4. Audit Trail
All actions are logged with:- Who performed the action
- What action was performed
- When it occurred
- What resources were affected
5. Regular Security Reviews
Monthly: Access Review
Monthly: Access Review
- Review all team members
- Verify roles are still appropriate
- Remove departed team members
- Check for unused accounts
Quarterly: Permission Audit
Quarterly: Permission Audit
- Review all workflows and triggers
- Audit transaction history
- Check for anomalous activity
- Update security policies
Annually: Comprehensive Security Audit
Annually: Comprehensive Security Audit
- Full team access review
- Wallet security assessment
- Strategy risk evaluation
- Disaster recovery testing
Managing Team Members
Inviting Users
Changing Roles
Removing Users
Common Permission Scenarios
Scenario 1: New Hire
Junior Treasury Analyst joins the team:- Owner invites with Member role
- User can view all data but not make changes
- After 3 months of training, promote to Admin
- User can now manage workflows and transactions
Scenario 2: External Auditor
Accounting firm needs to review records:- Create temporary Member account
- Auditor can view all transactions and balances
- Auditor cannot make any changes
- Remove access after audit completes
Scenario 3: Emergency Response
Treasury Manager is unavailable, urgent transfer needed:- Owner or another Admin can approve/execute
- Multiple Admins provide redundancy
- All actions are logged in audit trail
- Review incident afterwards
Scenario 4: Intern Access
Finance intern needs limited access:- Create Member account
- Optionally restrict to specific team
- Intern can generate reports but not transact
- Remove access at end of internship
Security Incidents
If an Account is Compromised
1
Immediate Action
- Pause all workflows
- Lock affected accounts
- Change authentication credentials
2
Assessment
- Review audit logs
- Identify unauthorized actions
- Determine scope of breach
3
Remediation
- Revoke compromised user access
- Review and approve pending transactions
- Move funds to secure accounts if necessary
4
Post-Incident
- Document what happened
- Update security procedures
- Notify relevant parties
- Implement additional controls
Suspicious Activity Alerts
Watch for:- Unusual transaction amounts
- Transactions to unknown addresses
- Rapid succession of operations
- Access from unusual locations
- Permission elevation requests
- Bulk data exports
Best Practices Summary
Security Checklist
✅ Use principle of least privilege✅ Regular access reviews (monthly)✅ Enable multi-sig for large transactions✅ Implement maker-checker workflows✅ Monitor audit logs regularly✅ Use teams to organize access✅ Remove access for departed team members immediately✅ Test incident response procedures✅ Document security policies✅ Train team on security practices