Agent Vault has a single permission tier: instance roles. Each user or agent holds exactly one role —Documentation Index
Fetch the complete documentation index at: https://agent-vault-roles-unified-instance-tier.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
owner, admin, or agent — and that role, together with the actor’s set of scoped vaults, determines everything they can do. There is no separate per-vault role to keep in sync.
The three roles
| Role | Who can hold it | Effective power |
|---|---|---|
owner | Users and agents | God mode. Auto-accesses every vault. Can manage instance settings, users, agents, and every vault. |
admin | Users and agents | Manages scoped vaults end-to-end (services, credentials, proposal approval). Can create new vaults. Can invite other admins or agents — but cannot grant a role higher than their own and cannot pre-assign vaults outside their own scope. |
agent | Programmatic agents only | Proxy-only on scoped vaults. Can use the proxy and raise proposals; cannot reveal credentials, approve/reject proposals, or mutate services. Humans cannot hold this role. |
Vault scope
Owners auto-access every vault — there is no “join” step. Admin and agent actors carry an explicit list of vaults they can touch (their scope). Adding a user or agent to a vault simply attaches that vault to their scope; effective power inside the vault still comes from their instance role.| Operation | Owner | Admin (in scope) | Agent (in scope) |
|---|---|---|---|
| Use the proxy | Yes | Yes | Yes |
| Discover services | Yes | Yes | Yes |
| Raise proposals | Yes | Yes | Yes |
| List credential names | Yes | Yes | Yes |
| Reveal credential values | Yes | Yes | No |
| Set / delete credentials | Yes | Yes | No |
| Approve / reject proposals | Yes | Yes | No |
| Manage vault services | Yes | Yes | No |
| Add or remove vault scope (users / agents) | Yes | Yes | No |
| Delete vault | Yes | Yes | No |
| Manage instance settings, users, agents, all vaults | Yes | Limited (see below) | No |
Inviting other actors
Admins can invite users and agents, with two safety rails:- Cannot escalate. An admin can only create invites for
adminoragent. Only owners can mint owner-tier invites. - Cannot widen scope. Pre-assigned vaults on an admin’s invite must be a subset of the inviter’s own scope. Owners are unrestricted.
How proposals stay safe
Agents can raise proposals but cannot approve them. Approval requires the instanceadmin (with vault scope) or owner role. This is the same self-approval block the previous “proxy” tier provided, now structural — agents simply lack the verb.
The first user
Register
The first user to register becomes the instance owner and auto-accesses every vault, including the default vault that the server seeds at startup.
bash agent-vault register Start working
The owner can immediately invite admins or agents, set credentials, and configure services. No further setup is needed.