Skip to main content

Manage custom roles on Enterprise plans

Updated today

Custom roles are available for Enterprise plan organizations. Owners and Primary Owners can manage custom roles in Organization settings > Custom roles.

What are custom roles?

Custom roles let you define exactly which features your members can access. Each custom role contains a set of permissions that grant or restrict access to specific capabilities like Claude Cowork, Claude Code, web search, and more.

Custom roles work alongside groups. The typical workflow is: create custom roles, assign them to groups, and then set members' roles to “Custom roles” so their access is governed entirely by the custom roles assigned to their groups.

Note: Custom roles only affect members whose role is set to “Custom roles.” Members with the User, Admin, or Owner roles get their permissions from those roles directly, not from custom roles.


How feature access works

Feature access is determined by a four-level precedence chain, where the most restrictive level wins:

  1. Platform-level overrides: Some features may be force-enabled or force-disabled for your organization by Anthropic as part of your contract. These can't be changed in organization settings.

  2. Organization-level setting: An Owner or Primary Owner can toggle a feature on or off for the entire organization. If a feature is disabled at the organization level, no custom role can grant access to it.

  3. Custom role permissions: If the feature is enabled at the organization level, the member's custom roles determine whether they can access it. If any of the member's custom roles grant the feature, they have it.

  4. User-level setting: If the feature is granted at the role level, it's available unless the member has disabled it in their own settings.

The key takeaway: the organization-level toggle is a main switch. Custom roles are the per-member switches underneath it. A feature must be enabled at the organization level before custom roles can control who gets access.


Available capabilities

Each custom role can grant or restrict access to the following capabilities:

Capability

Description

Claude Cowork

Access to the Cowork agent mode

Claude Code

Access to Claude Code

Fast-mode models (Claude Code)

Access to faster model options

Code execution and file creation

Ability to run code and create files in conversations

Web search

Ability to use web search in conversations

Memory

Ability to use memory across conversations


Create a custom role

  1. Click “+ Add role”

  2. Enter a name for the role (for example, "Developer," "Standard Access," or "Restricted").

  3. Select the groups you want to assign to the role.

  4. Toggle each capability on or off to define what this role grants.

  5. Click “Add role.”

Edit a custom role

  1. Click the role you want to edit.

  2. Update the name and groups, or toggle capabilities as needed.

  3. Click “Edit role” to save your changes.

Changes take effect within one minute. All members in groups assigned to this role are affected.

Delete a custom role

Click the menu button on any custom role and select “Delete role.” Deleting a role removes its permissions from all groups it was assigned to. Members in those groups lose the permissions the role granted, unless another role in their chain also grants them.


Assign groups to custom roles

Custom roles are assigned to groups, not directly to individual members. To assign a group to a role:

  1. Click the role you want to assign.

  2. In the groups selector, select one or more groups.

  3. Click "Save."

You can also assign custom roles when creating or editing a group in Organization settings > Groups. See Manage groups and group spend limits on Enterprise plans.


How permissions combine across multiple roles

If a member belongs to multiple groups with different custom roles, their permissions are additive—they get the union of all permissions from all roles in their chain. If any role grants a feature, the member has access to it.

This means you can't use one role to remove a permission granted by another role. This is by design — it enables a layered approach where a base role covers common features and additional roles layer on specific capabilities.

Example: A member is in two groups. The "All Users" group is assigned a "Standard Access" role with web search and memory. The "Engineering" group is assigned a "Developer" role with Cowork and Claude Code. The member gets all four: web search, memory, Cowork, and Claude Code.


What members see when access is restricted

Reason

What the member sees

Feature is disabled at the organization level

The feature appears greyed out or hidden, with the message "This feature is disabled for your organization."

Member's roles don't grant the feature

The feature appears greyed out or hidden, with the message "Contact your admin to request access to this feature."

Did this answer your question?