Environment RBAC
Environment RBAC is available on Railway Enterprise.
Environment RBAC (Role-Based Access Control) allows you to restrict access to sensitive environments like production. This ensures that only authorized team members can view or modify critical infrastructure.
How it works
When an environment is marked as restricted:
- Non-admin members can see that the environment exists but cannot access its resources
- Restricted resources include variables, logs, metrics, services, and configurations
- Deployments can still be triggered via git push, allowing developers to deploy without accessing sensitive data
This separation allows development teams to deploy code while keeping production secrets and configurations secure.
Enabling environment RBAC
Contact us to enable Environment RBAC for your enterprise workspace.
Once enabled for your workspace:
- Go to Project Settings → Environments
- Find the environment you want to restrict (e.g.,
production) - Toggle the Restricted switch

Role permissions
| Role | Can access restricted environments | Can toggle restriction |
|---|---|---|
| Admin | ✔️ | ✔️ |
| Member | ❌ | ❌ |
| Deployer | ❌ | ❌ |
Admin
Admins have full access to all environments, including restricted ones. They can:
- View and modify variables, services, and configurations
- Access logs and metrics
- Toggle the restricted status on any environment
Member
Members cannot access restricted environments. They can:
- See that the environment exists in the project
- Trigger deployments via git push
- Access non-restricted environments normally
Deployer
Deployers have the same restrictions as Members for restricted environments. They can:
- Trigger deployments via git push
- Cannot view variables, logs, or configurations in restricted environments
Use cases
Protecting production secrets
Keep production API keys, database credentials, and third-party service tokens hidden from developers who don't need access.
Compliance requirements
Meet security compliance requirements (SOC 2, HIPAA, etc.) by limiting access to production data and configurations.
Separation of duties
Allow developers to deploy code without having access to view or modify production infrastructure settings.
Best practices
- Restrict production by default - Mark your production environment as restricted immediately after enabling the feature
- Limit admin count - Only grant admin access to team members who need to manage production configurations
- Use staging for debugging - Keep a non-restricted staging environment that mirrors production for debugging purposes
- Audit regularly - Review who has admin access periodically to ensure it aligns with current team responsibilities
Related
- Environments - Learn about environment management
- Project Members - Manage team access and roles
- Enterprise Features - Explore other enterprise capabilities