grafana-util docs

grafana-util access

What this page covers

Run the access-management command surface for users, orgs, teams, and service accounts.

When to open this page

  • List live or local access inventory.
  • Create, modify, export, import, diff, or delete access resources.
  • Manage service-account tokens.

Who this page is for

Best for administrators who work with org, user, team, service account, and token lifecycle operations.

Purpose

Run the access-management command surface for users, orgs, teams, and service accounts.

When to use

  • List live or local access inventory.
  • Create, modify, export, import, diff, or delete access resources.
  • Manage service-account tokens.

Description

Open this page when the work is about Grafana identity and access as a whole. The access namespace is the grouped entrypoint for org, user, team, service account, and service-account token lifecycle work.

This page is for administrators who first need to choose the right access surface. If your task touches membership, org structure, service-account rotation, or access snapshots, start here and then jump into the matching subcommand page.

Workflow lanes

  • Inspect: user, org, team, and service-account inventory reads from live Grafana or local bundles.
  • Move: export, import, diff, and snapshot paths for moving or comparing access state.
  • Review Before Mutate: lifecycle changes, membership edits, and service-account token rotation.

Choose this page when you need to decide whether the next access task is inventory, migration, or a reviewed mutation.

Before / After

  • Before: access work is split across ad hoc UI clicks, one-off API calls, and hard-to-repeat shell commands.
  • After: the same access surface is grouped into one CLI namespace, so inventory, lifecycle, token work, and snapshots can share the same defaults and review flow.

What success looks like

  • you can tell whether the task belongs to user, org, team, or service-account before you touch production
  • inventory reads are repeatable because profile and auth defaults are explicit
  • token and lifecycle changes are auditable enough to hand off to another operator or to CI

Failure checks

  • if a list command returns less than you expect, confirm whether you need admin-level Basic auth instead of a narrower token
  • if a token or membership operation fails, verify that you are on the right org and the right access surface before retrying
  • if the output is going into automation, check the selected --output-format first so the parser knows what shape to expect

Key flags

  • --profile, --url, --token, --basic-user, --basic-password
  • --prompt-password, --prompt-token, --timeout, --verify-ssl, --insecure, --ca-cert
  • Use the nested subcommands for user, org, team or group, and service-account.

Auth notes

  • Prefer --profile for repeatable inventory reads.
  • Org, user, team, and service-account lifecycle commands often need admin-level credentials; direct Basic auth is the most predictable fallback.
  • Token auth may be too narrow for org-wide administration even when read-only list commands work.

Examples

# Purpose: Inspect access inventory before choosing a lane.
grafana-util access user list --profile prod --json
# Purpose: Review a saved org bundle before importing or diffing it.
grafana-util access org list --input-dir ./access-orgs --output-format text
# Purpose: Add a service-account token after reviewing the target account.
grafana-util access service-account token add --url http://localhost:3000 --basic-user admin --basic-password admin --name deploy-bot --token-name nightly

Inspect

Review Before Mutate