Adobe Experience Manager uses a layered permission model that combines Adobe Identity Management System (IMS) organization-level access with AEM's internal repository-level Access Control Lists (ACLs). User management differs significantly between AEM as a Cloud Service (AEMaaCS) and on-premise/AMS deployments.
Permission model overview
AEM uses a JCR (Java Content Repository) ACL system where permissions are applied to nodes in the content tree. Access is controlled through:
- Adobe Admin Console (IMS) -- manages who can access the AEM environment at all
- AEM User Groups -- bundle permissions and map to IMS product profiles
- ACL entries -- grant or deny specific privileges (read, modify, create, delete, replicate) on content paths
Permissions are additive by default. A user's effective access is the union of all groups they belong to, with explicit deny entries overriding allows.
Key built-in groups and roles
AEM ships with several predefined groups. On AEMaaCS, these map to IMS product profiles:
- administrators -- Full access to all AEM functionality including CRXDE, OSGi console, and user management. Maps to the
AEM Administratorsproduct profile in Admin Console. - content-authors -- Create, edit, and publish pages and assets within Sites and Assets. Maps to
AEM Usersproduct profile. - dam-users -- Access to Assets (DAM) for uploading, tagging, and managing digital assets.
- template-authors -- Create and edit editable templates under
/conf. Cannot modify components or code. - workflow-editors -- Create and modify workflow models. Does not grant the ability to start workflows on content.
- workflow-users -- Participate in workflows (approve, reject, complete work items).
- tag-administrators -- Create, edit, and delete tags in the tag namespace.
- forms-users -- Access to AEM Forms authoring and submission data.
On AEMaaCS, the admin super-user account is disabled. All access flows through IMS product profiles assigned in Adobe Admin Console.
Admin UI paths
AEM as a Cloud Service:
- Add users to the AEM environment via Adobe Admin Console (
adminconsole.adobe.com) > Products > Adobe Experience Manager > select environment > add user to product profile - Manage AEM-internal groups at Tools > Security > Groups (
/security/groups.html) - View and edit user properties at Tools > Security > Users (
/security/users.html) - Set ACL permissions via Tools > Security > Permissions or directly in CRXDE Lite at
/crx/de(developer environments only)
AEM On-Premise / AMS:
- Create users at Tools > Security > Users > Create User
- Manage groups at Tools > Security > Groups
- Edit ACLs at the node level in CRXDE Lite: navigate to the content node, open the Access Control tab
API and service account access
AEM provides multiple API authentication methods:
- Service Credentials (AEMaaCS) -- Generated in Developer Console for server-to-server integrations. These use IMS technical account credentials and are scoped to specific product profiles.
- Local Development Token -- Short-lived token for developer testing, generated from Developer Console.
- Service Users (on-premise) -- System accounts mapped to bundles via
ServiceUserMapperconfigurations. These bypass interactive login and are used by OSGi services. - API Keys via Adobe I/O -- For integrations using AEM APIs through Adobe Developer Console. Scoped via product profiles.
Service credentials should be stored in your CI/CD secrets manager, not in developer accounts. Rotate when team members with access to Developer Console leave.
Analytics and tracking permissions
Installing or managing analytics on AEM requires specific access:
- GTM/script injection -- Requires template-author or developer access to edit page templates and components under
/appsor/conf. Content authors cannot inject scripts. - Adobe Analytics integration -- Configured via Cloud Services configuration under Tools > Cloud Services > Legacy Cloud Services or via Adobe Launch (Experience Platform Tags). Requires the
administratorsgroup or a custom group with write access to/etc/cloudservices. - Experience Platform Tags (Launch) -- Managed externally in Adobe Experience Platform, but the embed code is placed in AEM page templates. Template editors need access to modify the header component.
- Data Layer -- The Adobe Client Data Layer (ACDL) is configured through component policies. Modifying data layer output requires developer-level access to component code.
- Reports access -- Built-in AEM page analytics views require the user to have read access to the content path and membership in a group with analytics viewing permissions.
A content author can view page-level analytics data in the Sites console if their group has the analytics permission, but they cannot modify tracking configuration.
Security and SSO
- AEMaaCS mandates Adobe IMS SSO -- no local authentication is possible for end users
- On-premise supports SAML 2.0 SSO via the
SAML 2.0 Authentication HandlerOSGi configuration - SCIM is not natively supported; user provisioning is handled through Admin Console or LDAP sync (on-premise)
- Enable the
Closed User Group (CUG)feature to restrict published content to specific authenticated groups - Audit logs for user and permission changes are available under Tools > Operations > Audit Log
Further Reading
- Adobe Experience Manager Overview -- Platform overview and analytics integration guides