Skip to main content
A registry admin can configure registry roles, add users, or remove users from a registry by configuring the registryโ€™s settings.

Manage users

Add a user or a team

Registry admins can add individual users or entire teams to a registry. To add a user or team to a registry:
  1. Navigate to the W&B Registry.
  2. Select the registry you want to add a user or team to.
  3. Click on the gear icon on the upper right hand corner to access the registry settings.
  4. In the Registry access section, click Add access.
  5. Specify one or more user names, emails, or the team names to the Include users and teams field.
  6. Click Add access.
Adding teams to registry
Learn more about configuring user roles in a registry, or registry role permissions .

Remove a user or team

A registry admin can remove individual users or entire teams from a registry. To remove a user or team from a registry:
  1. Navigate to the W&B Registry at https://wandb.ai/registry/.
  2. Select the registry you want to remove a user from.
  3. Click on the gear icon on the upper right hand corner to access the registry settings.
  4. Navigate to the Registry access section and type in the username, email, or team you want to remove.
  5. Click the Delete button.
Removing a user from a team also removes that userโ€™s access to the registry.

Change the owner of a registry

A registry admin can designate any member as a registryโ€™s owner, including a Restricted Viewer or a Viewer. Registry ownership is primarily for accountability purposes and does not confer any additional permissions beyond those granted by the userโ€™s assigned role. To change the owner:
  1. Navigate to the W&B Registry at https://wandb.ai/registry/.
  2. Select the registry you want to configure.
  3. Click the gear icon on the upper right hand corner.
  4. Scroll to the Registry members and roles section.
  5. Hover over the row for a member.
  6. Click the โ€ฆ action menu at the end of the row, then click Make owner.

Configure Registry roles

This section shows how to configure roles for Registry members. For more information about Registry roles, including the cabilities of each role, order of precedence, defaults, and more, see Details about Registry roles.
  1. Navigate to the W&B Registry at https://wandb.ai/registry/.
  2. Select the registry you want to configure.
  3. Click the gear icon on the upper right hand corner.
  4. Scroll to the Registry members and roles section.
  5. Within the Member field, search for the user or team you want to edit permissions for.
  6. In the Registry role column, click the userโ€™s role.
  7. From the dropdown, select the role you want to assign to the user.

Details about Registry roles

The following sections give more information about Registry roles.
Your role in a team has no impact or relationship to your role in any registry.

Default roles

W&B automatically assigns a default registry role to a user or team when they are added to a registry. This role determines what they can do in that registry.
EntityDefault registry role
(Dedicated Cloud / Self-Managed)
Default registry role
(Multi-tenant Cloud)
TeamRestricted Viewer (Server v0.75.0+)
Viewer (Server v0.74.x and below)
Restricted Viewer
User or service account (non admin)Restricted Viewer (Server v0.75.0+)
Viewer (Server v0.74.x and below)
Restricted Viewer
Service account (non admin)Member1Member1
Org adminAdminAdmin
1: Service accounts cannot have Viewer or Restricted Viewer roles. A registry admin can assign or modify roles for users and teams in the registry. See Configure user roles in a registry for more information.

Role permissions

The following table lists each Registry role, along with the permissions provided by each role:
PermissionPermission GroupRestricted Viewer
(Multi-tenant Cloud, by invitation)
ViewerMemberAdmin
View a collectionโ€™s detailsReadโœ“โœ“โœ“โœ“
View a linked artifactโ€™s detailsReadโœ“โœ“โœ“โœ“
Usage: Consume an artifact in a registry with use_artifactReadโœ“โœ“โœ“
Download a linked artifactReadโœ“โœ“โœ“
Download files from an artifactโ€™s file viewerReadโœ“โœ“โœ“
Search a registryReadโœ“โœ“โœ“โœ“
View a registryโ€™s settings and user listReadโœ“โœ“โœ“โœ“
Create a new automation for a collectionCreateโœ“โœ“
Turn on Slack notifications for new version being addedCreateโœ“โœ“
Create a new collectionCreateโœ“โœ“
Create a new registryCreateโœ“โœ“
Edit collection card (description)Updateโœ“โœ“
Edit linked artifact descriptionUpdateโœ“โœ“
Add or delete a collectionโ€™s tagUpdateโœ“โœ“
Add or delete an alias from a linked artifactUpdateโœ“โœ“
Add or delete a protected alias from a linked artifactUpdateโœ“
Create or delete a protected aliasUpdateโœ“
Link a new artifactUpdateโœ“โœ“
Edit allowed types list for a registryUpdateโœ“โœ“
Edit registry nameUpdateโœ“โœ“
Delete a collectionDeleteโœ“โœ“
Delete an automationDeleteโœ“โœ“
Unlink an artifact from a registryDeleteโœ“โœ“
Edit accepted artifact types for a registryAdminโœ“
Change registry visibility (Organization or Restricted)Adminโœ“
Add users to a registryAdminโœ“
Assign or change a userโ€™s role in a registryAdminโœ“

Inherited Registry role

The registryโ€™s membership list shows each userโ€™s inherited (effective) registry role (in light gray) next to the role dropdown in their row.
Registry membership list showing the user's effective registry role
A userโ€™s effective role in a particular registry matches their highest role among their role in the organization, the registry, and the team that owns the registry, whether inherited or explicitly assigned. For example:
  • A team Admin or organization Admin with the Viewer role in a particular registry owned by the team is effectively an Admin of the registry.
  • A registry Viewer with the Member role in the team is effectively a Member of the registry.
  • A team Viewer with the Member role in a particular registry is effectively a Member of the registry.

Restricted Viewer role details

The Restricted Viewer role is Generally Available (GA). For Dedicated Cloud and Self-Managed, Server v0.75.0 or newer is required. This role provides read-only access to registry artifacts without the ability to create, update, or delete collections, automations, or other registry resources. Unlike a Viewer, a Restricted Viewer:
  • Cannot download artifact files or access file contents.
  • Cannot use artifacts with wandb.Run.use_artifact() in the W&B SDK.

SDK compatibility

SDK version requirementTo use the W&B SDK to access artifacts as a Restricted Viewer, you must use W&B SDK version 0.19.9 or higher. Otherwise, some SDK commands will result in permission errors.
When a Restricted Viewer uses the SDK, certain functions are not available or work differently. The following methods are not available and result in permission errors: The following methods are limited to artifact metadata:

Cross-registry permissions

A user can have different roles in different registries. For example, a user can be a Restricted Viewer in Registry A but a Viewer in Registry B. In this case:
  • The same artifact linked to both registries will have different access levels
  • In Registry A, the user is a Restricted Viewer and cannot download files or use the artifact
  • In Registry B, the user is a Viewer and can download files and use the artifact
  • In other words, access is determined by the registry in which the artifact is accessed