Skip to main content

Documentation Index

Fetch the complete documentation index at: https://hybridbox.mintlify.app/llms.txt

Use this file to discover all available pages before exploring further.

Permissions define who can view or manage resources in Hybridbox. Access is granted by assigning a role to a user or group on a scope.

What are permissions?

A permission grant combines two things: a role and a scope. The role defines what actions are allowed. The scope defines where those actions apply. For example, a user with DNS Manager on one domain can manage DNS records for that domain, but not for every domain in the account. The same role on a workspace or account applies more broadly. Use the narrowest scope that lets the person do their work.

Scopes

Scopes let you limit access to the right part of the account.
ScopeApplies to
AccountThe whole account and resources inside it, subject to the selected role.
WorkspaceOne workspace and resources inside that workspace.
DomainOne domain and resources attached to that domain, such as DNS and mailboxes.
A narrower scope is usually safer. Prefer domain or workspace scope for operational work, and reserve account scope for users who need broad access.

Roles

Roles are reusable access bundles. The same role can be granted on different scopes.
RoleWhat it can do
Account ownerFull account control, including roles, users, groups, billing-sensitive actions, and account-wide administration.
ManagerIncludes Domain Manager access. Can manage workspaces, connect or purchase domains, move domains between workspaces, and delete domains. It does not manage DNS records, master passwords, dedicated IP lifecycle, or billing.
Domain ManagerIncludes Editor access. Can also create and delete mailboxes. It does not manage DNS records or master passwords.
EditorCan update and verify domains, manage forwarding rules and tags, assign domains to dedicated IPs, update mailboxes, manage mailbox aliases, run mailbox backups/restores/exports, and reveal mailbox credentials. It cannot create/delete mailboxes, purchase/connect/delete/move domains, manage DNS records, or manage master passwords.
ViewerRead-only access to domains, DNS records, mailboxes, forwarding rules, dedicated IP details, and tags within scope.
DNS ManagerCan view domains and manage DNS records. It does not manage mailboxes or domains beyond DNS.
Credential ManagerCan create and manage master passwords within scope. It does not manage domains, mailboxes, DNS, dedicated IPs, or billing.
IP ManagerCan view, claim, authorize, and remove dedicated IPs. It does not assign domains to dedicated IPs.
Billing AdminCan view and manage billing.
Billing ViewerCan view billing only.

Users and groups

Assign roles directly to users when access is personal. Use groups when multiple people need the same access. Groups are useful for teams such as support, operations, billing, or DNS administrators. Instead of assigning the same role to each person, assign the role to the group and manage membership separately.

Service accounts

Service accounts let automation use the Public API without sharing a personal user login. Create a service account, copy its one-time token, and grant it only the roles and scopes the integration needs. Rotate exposed tokens and revoke service accounts that are no longer used.

Invitations

Use invitations to grant access to someone who has not joined the account yet. An invitation can include the role and scope the user should receive after accepting it. After the invitation is accepted, the user becomes an active account member with the assigned access. Review pending invitations regularly and remove invitations that are no longer needed.

Master passwords

Master passwords let authorized operators log in to SMTP mailboxes within a scope without retrieving each mailbox password individually. A master password can be scoped to an account, workspace, or domain. It is valid for SMTP mailboxes inside that scope. Use this for operational access when a team needs to troubleshoot or manage multiple mailboxes without handling every mailbox-specific password. Grant this access carefully. A master password can access many mailboxes if it is granted at a broad scope.

Role/action matrix

The scope still matters. A role marked Yes only applies within the scope where the role is granted.
ActionAccount ownerManagerDomain ManagerEditorViewerDNS ManagerCredential ManagerIP ManagerBilling AdminBilling Viewer
View operational resourcesYesYesYesYesYesDNS onlyNoDedicated IPs onlyNoNo
Create/manage workspacesYesYesNoNoNoNoNoNoNoNo
Update and verify domainsYesYesYesYesNoNoNoNoNoNo
Purchase/connect domainsYesYesNoNoNoNoNoNoNoNo
Move domains between workspacesYesYes, with both workspaces in scopeNoNoNoNoNoNoNoNo
Delete domainsYesYesNoNoNoNoNoNoNoNo
Manage DNS recordsYesNoNoNoNoYesNoNoNoNo
Update mailboxes and aliasesYesYesYesYesNoNoNoNoNoNo
Create/delete mailboxesYesYesYesNoNoNoNoNoNoNo
Backup/restore/export mailboxesYesYesYesYesNoNoNoNoNoNo
Reveal mailbox credentialsYesYesYesYesNoNoNoNoNoNo
Manage master passwordsYesNoNoNoNoNoYesNoNoNo
Manage forwarding rulesYesYesYesYesNoNoNoNoNoNo
Manage tagsYesYesYesYesNoNoNoNoNoNo
Claim/remove dedicated IPsYesNoNoNoNoNoNoYesNoNo
Assign domains to dedicated IPsYesYesYesYesNoNoNoNoNoNo
View billingYesNoNoNoNoNoNoNoYesYes
Manage billingYesNoNoNoNoNoNoNoYesNo
Invite usersYesNoNoNoNoNoNoNoNoNo
Create groupsYesNoNoNoNoNoNoNoNoNo
Assign or revoke rolesYesNoNoNoNoNoNoNoNoNo
Use Account owner for account administration. Use scoped roles for day-to-day operations whenever possible.