How restricted environments work
By default, environments are unrestricted, meaning any workspace member can modify deployments, autoscaling settings, and other configurations. When you mark an environment as restricted, only users you explicitly grant access can make changes. Restricted environments apply across all models and chains in your workspace. For example, if you restrict an environment namedproduction, that restriction applies to
every model and chainβs production environment, not just one specific model or chain.
Permissions by access level
| Action | With access | Without access |
|---|---|---|
| View environment and configuration | β | β (read-only) |
| View metrics | β | β (read-only) |
| Call inference on models and chains | β | β |
| View logs | β | β |
| Modify deployment settings | β | β |
| Change autoscaling configurations | β | β |
| Promote deployments to the environment | β | β |
| Manage environment-specific settings | β | β |
Managing restricted environments
Only workspace admins can create or modify restricted environments. Members (non-admin users) can only create unrestricted environments and cannot change environment restrictions.From the environments page
- Navigate to Settings and then choose Environments.
- Select an existing environment to modify, or select Create environment to create a new one.
- Set the access level to Restricted.
- Add users by searching by name or by email.
- Select Save changes or Create environment.
From a model or chain
- Go to your model or chainβs management page.
- Select an existing environment to modify, or select Add environment then Create environment to create a new one.
- Set the access level to Restricted.
- Add users by searching by name or by email.
- Select Save changes or Create environment.
Only admins can create restricted environments, and all admins have implicit
access to every restricted environment. If an admin is later demoted to a member
role, they lose this implicit access and can be removed from the environment
like any other member.
API behavior
Restricted environments apply the same permission checks to API and truss CLI operations as the UI. API keys inherit the permissions of their associated user. If you attempt to modify a restricted environment using an API key associated with a user without access, youβll receive a403 Forbidden error.
This includes operations like:
- Promoting deployments through the promote endpoint.
- Updating autoscaling settings through the autoscaling endpoint.
- Modifying environment configurations through the update environment endpoint.