Skip to main content
A registry admin can configure registry roles, add users, or remove users from a registry by configuring the registry’s settings.

Manage users

Add a user or a team

Registry admins can add individual users or entire teams to a registry. To add a user or team to a registry:
  1. Navigate to the Registry App in the W&B App UI.
  2. Select the registry you want to add a user or team to.
  3. Click on the gear icon on the upper right hand corner to access the registry settings.
  4. In the Registry access section, click Add access.
  5. Specify one or more user names, emails, or the team names to the Include users and teams field.
  6. Click Add access.
Adding teams to registry
Learn more about configuring user roles in a registry, or Registry role permissions .

Remove a user or team

A registry admin can remove individual users or entire teams from a registry. To remove a user or team from a registry:
  1. Navigate to the Registry App in the W&B App UI.
  2. Select the registry you want to remove a user from.
  3. Click on the gear icon on the upper right hand corner to access the registry settings.
  4. Navigate to the Registry access section and type in the username, email, or team you want to remove.
  5. Click the Delete button.
Removing a user from a team also removes that user’s access to the registry.

Change the owner of a registry

A registry admin can designate any member as a registry’s owner, including a Restricted Viewer or a Viewer. Registry ownership is primarily for accountability purposes and does not confer any additional permissions beyond those granted by the user’s assigned role. To change the owner:
  1. Navigate to the Registry App in the W&B App UI.
  2. Select the registry you want to configure.
  3. Click the gear icon on the upper right hand corner.
  4. Scroll to the Registry members and roles section.
  5. Hover over the row for a member.
  6. Click the action menu at the end of the row, then click Make owner.

Configure Registry roles

This section shows how to configure roles for Registry members. For more information about Registry roles, including the cabilities of each role, order of precedence, defaults, and more, see Details about Registry roles.
  1. Navigate to the Registry App in the W&B App UI.
  2. Select the registry you want to configure.
  3. Click the gear icon on the upper right hand corner.
  4. Scroll to the Registry members and roles section.
  5. Within the Member field, search for the user or team you want to edit permissions for.
  6. In the Registry role column, click the user’s role.
  7. From the dropdown, select the role you want to assign to the user.

Details about Registry roles

The following sections give more information about Registry roles.
Your role in a team has no impact or relationship to your role in any registry.

Default roles

W&B automatically assigns a default registry role to a user or team when they are added to a registry. This role determines what they can do in that registry.
EntityDefault registry role
(Dedicated Cloud / Self-Managed)
Default registry role
(Multi-tenant Cloud)
TeamViewerRestricted Viewer
User or service account (non admin)ViewerRestricted Viewer
Service account (non admin)Member1Member1
Org adminAdminAdmin
1: Service accounts cannot have Viewer or Restricted Viewer roles. A registry admin can assign or modify roles for users and teams in the registry. See Configure user roles in a registry for more information.
Restricted Viewer role availabilityThe Restricted Viewer role is currently available only in Multi-Tenant Cloud organizations by invitation only. To request access, or to express interest in the feature on Dedicated Cloud or Self-Managed, contact support.This role provides read-only access to registry artifacts without the ability to create, update, or delete collections, automations, or other registry resources.Unlike a Viewer, a Restricted Viewer:
  • Cannot download artifact files or access file contents.
  • Cannot use artifacts with use_artifact() in the W&B SDK.

Role permissions

The following table lists each Registry role, along with the permissions provided by each role:
PermissionPermission GroupRestricted Viewer
(Multi-tenant Cloud, by invitation)
ViewerMemberAdmin
View a collection’s detailsRead
View a linked artifact’s detailsRead
Usage: Consume an artifact in a registry with use_artifactRead
Download a linked artifactRead
Download files from an artifact’s file viewerRead
Search a registryRead
View a registry’s settings and user listRead
Create a new automation for a collectionCreate
Turn on Slack notifications for new version being addedCreate
Create a new collectionCreate
Create a new custom registryCreate
Edit collection card (description)Update
Edit linked artifact descriptionUpdate
Add or delete a collection’s tagUpdate
Add or delete an alias from a linked artifactUpdate
Link a new artifactUpdate
Edit allowed types list for a registryUpdate
Edit custom registry nameUpdate
Delete a collectionDelete
Delete an automationDelete
Unlink an artifact from a registryDelete
Edit accepted artifact types for a registryAdmin
Change registry visibility (Organization or Restricted)Admin
Add users to a registryAdmin
Assign or change a user’s role in a registryAdmin

Inherited Registry role

The registry’s membership list shows each user’s inherited (effective) registry role (in light gray) next to the role dropdown in their row.
Registry membership list showing the user's effective registry role
A user’s effective role in a particular registry matches their highest role among their role in the organization, the registry, and the team that owns the registry, whether inherited or explicitly assigned. For example:
  • A team Admin or organization Admin with the Viewer role in a particular registry owned by the team is effectively an Admin of the registry.
  • A registry Viewer with the Member role in the team is effectively a Member of the registry.
  • A team Viewer with the Member role in a particular registry is effectively a Member of the registry.

SDK compatibility

SDK version requirementTo use the W&B SDK to access artifacts as a Restricted Viewer, you must use W&B SDK version 0.19.9 or higher. Otherwise, some SDK commands will result in permission errors.
When a Restricted Viewer uses the SDK, certain functions are not available or work differently. The following methods are not available and result in permission errors: The following methods are limited to artifact metadata:

Cross-registry permissions

A user can have different roles in different registries. For example, a user can be a Restricted Viewer in Registry A but a Viewer in Registry B. In this case:
  • The same artifact linked to both registries will have different access levels
  • In Registry A, the user is a Restricted Viewer and cannot download files or use the artifact
  • In Registry B, the user is a Viewer and can download files and use the artifact
  • In other words, access is determined by the registry in which the artifact is accessed
I