Control who can do what across your Hyperping account and projects. Five roles give you fine-grained control, with every resource scoped inside a project, and team members only seeing the projects they belong to.
One Owner per account. All other team members are assigned one of three roles: Admin, Member, or Billing.
Quick reference for every capability. ✓ means allowed, — means blocked.
| Action | Owner | Admin | Member | Billing |
|---|---|---|---|---|
| View monitors, reports, and outages | ✓ | ✓ | ✓ | ✓ |
| View on-call schedules | ✓ | ✓ | ✓ | ✓ |
| View teammates list | ✓ | ✓ | ✓ | ✓ |
| Create, edit, and delete monitors | ✓ | ✓ | ✓ | — |
| Bulk-edit monitors | ✓ | ✓ | ✓ | — |
| Create and update on-call schedules | ✓ | ✓ | ✓ | — |
| Delete on-call schedules | ✓ | ✓ | — | — |
| Create outages | ✓ | ✓ | ✓ | — |
| Acknowledge and resolve outages | ✓ | ✓ | ✓ | — |
| Escalate outages | ✓ | ✓ | ✓ | — |
| Update outage severity and details | ✓ | ✓ | ✓ | — |
| Write postmortems and AI summaries | ✓ | ✓ | ✓ | — |
| Delete outages | ✓ | ✓ | ✓ | — |
| Invite and remove teammates | ✓ | ✓ | — | — |
| Transfer account ownership | ✓ | — | — | — |
| Manage billing and subscription | ✓ | — | — | ✓ |
| Configure SSO and authentication | ✓ | — | — | — |
Projects act as boundaries. A teammate invited to Project A cannot see monitors, status pages, or integrations in Project B. Only the Owner sees every project.
Common ways to split work across projects:
If you use SAML SSO, you can also restrict SSO users to specific projects through the SSO access scope setting. See login methods for the full flow.
Common mappings from job title to recommended role:
Add a second verification step to login. Once enabled, you need your password plus a code from your authenticator app.
Enable it in your account settings. Available to all users on every plan.
Every change is recorded: who did what, when, and in which project.
Useful for tracking config changes, reviewing teammate activity after an incident, and providing evidence for compliance audits.
Encrypted at rest with LUKS, in transit with SSL/HTTPS.
All data stored in the EU (DigitalOcean Frankfurt). GDPR-compliant with self-serve data deletion.