YouTubeXLinkedIn

Questions about the FTX creditor distribution via BitGo? Read our FAQs.

skip to content

Admin Console

What is the Admin Console?

The Admin Console allows you to manage users, roles and permissions across your organization. With the Admin Console you can:

  • See all users, roles and activity in one place for complete visibility

  • Assign and adjust permissions based on enterprise, wallet or role

  • View activity such as pending changes awaiting approval 

  • Easily onboard and offboard members while maintaining consistent security standards

Why does user and role permissioning matter? 

Proper user and role permissioning ensure that only authorized users can initiate transactions, approve withdrawals, manage wallets or view sensitive information. This reduces the risk of unauthorized activity, protects assets and supports compliance. 

What types of roles and permissions exist? 

Roles define what actions members can take and where. BitGo provides default roles and also allows you to create custom roles tailored to your organization’s needs. 

  • Default roles: preconfigured and automatically applies to current and future enterprises and wallets. These are designed to help maintain consistent permissioning across your organization.

    • Organization Admins: can manage user permissions and access.

    • Enterprise Admins: can create wallets and manage enterprise level-policies.

    • Wallet Admins: can manage wallet-level policies and whitelists.

    • Wallet Spenders: can initiate transactions.

    • Wallet Traders: can place orders and view all wallets in the enterprise.

    • Viewers: can view wallet balances and transactions.

    • Auditors: can view activity logs for all users in the enterprise.

  • Custom roles: for more granular control you can create and assign custom roles. Custom roles allow you to define specific combinations of permissions for enterprises and wallets. 

What are some best practices when managing roles and permissions? 

Start with Bitgo’s default roles to maintain consistency and consider introducing custom roles to fine-tune access and align with your controls and compliance requirements.

Regularly review roles and permissions, along with your Policies, to ensure that they align with your operational needs and risk management objectives.