Humans in Eden are organization-scoped IAM accounts. Human metadata lives on the account record, and organization access is expressed with exact control-plane permission bits in the perms field.
perms is an ordered string made from these control-plane bits:
| Bit | Meaning |
|---|---|
R | Read configuration and metadata |
C | Configure resources and draft changes |
P | Promote or roll back versioned changes |
G | Grant or revoke permissions |
D | Perform destructive or irreversible operations |
A | View audit history and decision records |
Examples:
R = read-only configuration accessRCA = read + configure + auditRCPGA = broad admin-style access without destroyRCPGDA = full control-plane accessPOST /api/v1/iam/humans
curl -X POST http://localhost:8080/api/v1/iam/humans \
-u admin:password \
-H "Content-Type: application/json" \
-d '{
"username": "jane.doe",
"password": "SecurePassword123!",
"description": "Application developer",
"email": "jane@company.com",
"display_name": "Jane Doe",
"perms": "RCA"
}'Fields:
| Field | Required | Description |
|---|---|---|
username | Yes | Human login name |
password | Yes | Initial password |
description | No | Free-form notes |
email | No | Email address |
display_name | No | Friendly display name |
perms | No | Exact organization control-plane permission bits. Defaults to R. |
The caller must already hold G plus every bit being granted.
GET /api/v1/iam/humans/{username}
curl http://localhost:8080/api/v1/iam/humans/jane.doe \
-u admin:passwordPATCH /api/v1/iam/humans/{username}
curl -X PATCH http://localhost:8080/api/v1/iam/humans/jane.doe \
-u admin:password \
-H "Content-Type: application/json" \
-d '{
"display_name": "Jane D.",
"description": "Staff engineer",
"bio": "Owns the API platform.",
"perms": "RCPGA"
}'Patchable fields:
| Field | Effect |
|---|---|
username | Rename the human |
password | Replace the password |
description | Update free-form notes |
email | Update email |
display_name | Update friendly name |
bio | Update profile bio |
perms | Replace the exact organization permission-bit set |
Rules:
C.G plus the target's current bits and the new bits being assigned.D.DELETE /api/v1/iam/humans/{username}
curl -X DELETE http://localhost:8080/api/v1/iam/humans/jane.doe \
-u admin:passwordDeleting a human removes the account and its organization-scoped grants.
perms set that lets the human do their job.RCA for most day-to-day builders and operators.G only for people who manage IAM grants.D only for trusted break-glass or platform-owner paths.