CallMeter Docs

Managing Project Members

Invite team members, assign roles, control project access, and understand the permission model for collaborative SIP testing.

CallMeter uses a role-based access control (RBAC) system to manage who can access projects and what actions they can perform. Members are managed at the organization level, and their access to individual projects is controlled through project assignments.

How Project Access Works

Member access in CallMeter follows a two-layer model:

  1. Organization membership -- A user must first be a member of your organization
  2. Project access -- The organization admin then grants them access to specific projects (or all projects)

Each organization member has:

  • A role that determines their permissions (Viewer, Tester, Editor, Admin, or Owner)
  • A project access setting that controls which projects they can see
Access TypeBehavior
All ProjectsThe member can access every project in the organization, including any projects created in the future
Specific ProjectsThe member can only access the projects explicitly assigned to them

Inviting Members to Your Organization

Before a team member can access a project, they must be part of your organization.

  1. Navigate to your organization Settings
  2. Click on the Members tab
  3. Click Invite Member
  4. Enter the invitee's email address
  5. Select their role (see the role permissions table below)
  6. Choose their project access: All Projects or Specific Projects
  7. If you selected Specific Projects, check the boxes next to the projects they should access
  8. Click Send Invitation

The invitee receives an email with a link to join your organization. Once they accept, they gain immediate access to their assigned projects.

Pending invitations

Invitations remain pending until the recipient creates a CallMeter account (or logs in with an existing one) and accepts. You can revoke pending invitations from the Members page at any time.

The Five Roles

CallMeter provides five roles with progressively broader permissions. Each role inherits all permissions of the roles below it.

RoleDescription
ViewerRead-only access. Can view test results, probe health, and dashboards but cannot create, modify, or execute anything
TesterEverything a Viewer can do, plus the ability to run existing tests. Cannot create or modify test configurations
EditorEverything a Tester can do, plus full create/edit/delete permissions on tests, registrars, probes, media files, and other project resources
AdminEverything an Editor can do, plus organization-level management: inviting members, managing roles, configuring billing, and deleting projects
OwnerFull control. One per organization. Can transfer ownership, manage all billing, and perform all administrative actions. Cannot be removed

Detailed Permission Matrix

The table below shows exactly which actions each role can perform within accessible projects:

ActionViewerTesterEditorAdminOwner
View test results and metricsYesYesYesYesYes
View probe health statusYesYesYesYesYes
View registrars and SIP accountsYesYesYesYesYes
View project settingsYesYesYesYesYes
Run existing testsNoYesYesYesYes
Stop running testsNoYesYesYesYes
Create and edit testsNoNoYesYesYes
Create and edit registrarsNoNoYesYesYes
Manage SIP accountsNoNoYesYesYes
Upload and delete media filesNoNoYesYesYes
Create and edit probesNoNoYesYesYes
Configure webhooksNoNoYesYesYes
Create and edit status pagesNoNoYesYesYes
Delete tests, registrars, probesNoNoYesYesYes
Invite organization membersNoNoNoYesYes
Remove organization membersNoNoNoYesYes
Change member rolesNoNoNoYesYes
Manage project access assignmentsNoNoNoYesYes
Delete projectsNoNoNoYesYes
Manage billing and subscriptionsNoNoNoNoYes
Transfer organization ownershipNoNoNoNoYes

Granting Project Access to Existing Members

If a member is already in your organization but needs access to additional projects:

  1. Go to organization Settings then Members
  2. Find the member in the list
  3. Click on their name or the edit icon
  4. Change their project access setting or add/remove specific projects
  5. Click Save

Changes take effect immediately. The member sees the newly accessible projects in their sidebar on next page load.

Removing a Member's Project Access

To revoke a member's access to a specific project without removing them from the organization:

  1. Go to organization Settings then Members
  2. Find the member
  3. Edit their project access
  4. Uncheck the project you want to revoke
  5. Click Save

The member loses access to that project immediately. They can no longer view tests, results, or any resources within it.

Removing a Member from the Organization

Removing a member revokes all their access across every project:

  1. Go to organization Settings then Members
  2. Find the member
  3. Click Remove
  4. Confirm the action

Active tests

If the removed member had running tests or active probes, those continue to execute normally. Removing a member does not affect in-progress operations.

Role Selection Guide

Choosing the right role for each team member depends on their responsibilities:

Team MemberRecommended RoleRationale
QA engineer running tests dailyTesterNeeds to execute tests and view results, but should not modify configurations
VoIP engineer configuring testsEditorNeeds full control over test configurations, registrars, and probes
Management reviewing dashboardsViewerOnly needs to review results and probe health
Team lead managing the workspaceAdminNeeds to invite members, manage access, and oversee project settings
Customer stakeholder (MSP scenario)ViewerExternal stakeholders should only view results for their project

Organization-Level vs. Project-Level Access

It is important to understand that roles are set at the organization level, not per-project. A member with the Editor role has Editor permissions in every project they can access. You cannot give someone Editor access in one project and Viewer access in another.

To limit what a member can do, choose between:

  • Restricting their role -- Give them a lower role (e.g., Tester instead of Editor) that applies everywhere
  • Restricting their project access -- Keep their role but limit which projects they can see

This design keeps permissions simple and predictable across your organization.

Next Steps

On this page