Support

Roles and access rights in Business Manager: how to grant rights and not break anything

Roles and access rights in Business Manager: how to grant rights and not break anything
0.00
(0)
Views: 84153
Reading time: ~ 10 min.
Facebook
02/24/26

Summary:

  • A safe model is two-layered: assign the least BM role first, then grant granular asset permissions.
  • 2026 roles: Business Admin, Employee, Financial Analyst/Editor, Developer, with clear misassignment risks.
  • Separate governance from operations: BM roles control visibility/invites; asset rights control actions.
  • Most incidents start with ownership: assets should be owned by your BM; agencies use partner access.
  • Contractor setup: invite by email as Employee, then map ad account/Page/pixel/catalog rights to tasks.
  • Use Asset Groups, validate with "View as," review activity logs, apply temporary access + clean offboarding.

Definition

Business Manager roles and permissions are a two-layer access system: business roles define who can see and administer the environment, while asset-level permissions define what a person can do on an ad account, Page, pixel, catalog, or app. In practice, teams provision access via the Employee role, attach users to an Asset Group with only required operations, validate using "View as," and then review and revoke access on a set cadence.

 

Table Of Contents

New to the ecosystem and want a quick primer before diving into permissions? Start with a clear, jargon free introduction to Facebook media buying and how it works end to end — it frames roles, assets, and the real flow of spend and signals.

Business Manager roles and access in 2026 at a glance

A safe access model uses two layers: people join the Business Manager with the least necessary role, then receive granular permissions on assets like ad accounts, Pages, pixels, catalogs, and apps. Keeping this order and the least privilege principle prevents breakage and reduces data leakage.

If you are setting up your first structure, this practical starter roadmap will help you move from goals to a clean launch: a step by step Facebook Ads launch for media buyers in 2026.

What roles exist and how do they actually differ

In 2026 the core roles are business admin, employee, financial analyst or editor, and developer. Admins manage the company perimeter and invitations; employees operate only the assets assigned to them; financial roles handle billing and invoices; developers manage apps, events, and tokens. Most practitioners only need an employee role at business level plus precise asset permissions to do real work.

RoleScopeTypical actionsRisk when misassigned
Business AdminEntire Business ManagerInvite users, change roles, connect domains and apps, manage billing settingsLoss of control, asset ownership changes, hard to revert without a second admin
Business EmployeeAssigned assets onlyOperate campaigns in Ads Manager, edit creatives, view reports within scopeLow if assets are grouped and permissions are narrow
Financial AnalystBilling visibilityView spend, invoices, payment historyExposure of financial data without change rights
Financial EditorBilling managementAdd or change payment methods, pay invoicesUnwanted charges, disputed payments, blocked cards
DeveloperApps and eventsConfigure apps, system users, conversions, API tokensLeaked keys, noisy events, measurement distortion

Access model: business level versus asset level

Separate governance from operations. Business-level roles define who can see the environment and invite others; asset-level permissions define what a person does with a specific ad account, Page, pixel, catalog, or app. Mixing layers creates confusing states, like a contractor who sees everything but cannot launch campaigns, or someone who can change billing without operational context.

Making the basic connections correctly removes half of future friction. Here is a concise walkthrough on linking your Page and ad account to Business Manager so permissions align with assets from day one.

LayerIncludesCommon mistakeObservable symptom
BusinessAdmin, Employee, financial and developer rolesGranting admin to an agency "for convenience"Agency alters company settings or moves asset ownership
AssetPages, ad accounts, pixels, catalogs, appsAssigning only a Page but not the ad accountUser sees the Page but cannot start or edit campaigns

Asset ownership and partner access: the control plane most teams miss

Most access incidents do not start with roles, they start with ownership. Pages, pixels, catalogs, domains, and apps should be owned by your Business Manager, while agencies should work through partner access, not as internal users. This keeps control with the business and makes offboarding clean: you revoke partner permissions without leaving "hidden" inheritances behind.

A simple rule is operationally convenient: internal staff join as Business Employees, external teams use partner assignments tied to specific assets or Asset Groups. Avoid granting Business Admin "just to move faster". Admins can change admins, ownership, and billing settings, and the blast radius is hard to reverse if you do not have a second verified admin.

Access formatBest forWhy it reduces risk
Employee in BMIn-house teamClear HR driven offboarding and predictable accountability
Partner accessAgencies and contractorsLess visibility, faster revocation, fewer long term leftovers

How to grant a contractor access without breaking anything

Invite by email as a Business Employee in Business Settings, then grant asset rights: ad account for campaign management, Page as moderator or editor, pixel for event read or setup, and catalog if dynamic ads are used. Map permissions to tasks: media buyers need campaign control and pixel visibility; finance should remain in-house; developers get app and events scopes, not creative editing.

Advice from npprteam.shop: put contractors into an Asset Group instead of sprinkling single assets. One switch controls the whole project and deprovisioning is instant when the engagement ends.

Billing access separation

Billing privileges are independent from campaign control. A person can read campaigns without touching payment methods, or manage payment methods without seeing creatives. Give accounting a Financial Analyst role for invoices and spend; give a finance manager Financial Editor only if they must maintain funding sources, and restrict their ad account visibility to a minimal set.

ScenarioRoleWhy it is safer
Accounting pulls invoicesFinancial AnalystNo ability to add cards or trigger charges
CFO maintains payment methodsFinancial EditorControls funding sources without changing user roles
Agency runs campaignsEmployee + asset permissionsSees assigned ad accounts and pixels only, billing stays internal

Where to manage many permissions quickly

Use Asset Groups. Create a project group, add the Page, ad accounts, pixels, catalogs, and any app, then assign people to the group. This prevents omissions like a missing pixel that breaks attribution and keeps handoffs predictable across teams and time zones.

Advice from npprteam.shop: name groups with a readable pattern like Project Geo Language Team. Human-friendly labels reduce assignment errors and speed up onboarding.

Audit and activity log: how to know who did what

Weekly log reviews catch silent changes: new admins added, asset ownership switches, payment methods added, permissions broadened. A single owner scans the log and notes changes in a short internal report. That small ritual saves hours of incident response and restores confidence in access hygiene.

Temporary access protocol and recurring review: prevent permission drift

Even a good matrix breaks when access is granted "for now" and never revisited. A pragmatic 2026 process is: every permission has a scope, owner, and expiry. The requester states what task is needed, which assets, and for how long; the admin grants access via an Asset Group and validates the real experience using View as. When the work ends, access is removed the same day, not "later".

Run a lightweight monthly review: remove inactive users, shrink expanded permissions, and verify that billing roles remain separated from campaign operations. This turns security into routine hygiene, not incident response.

Access typeSuggested durationControl method
Launch contractor7–14 daysAsset Group + expiry note + View as validation
Analyst audit3–7 daysRead and report only, no billing permissions
FinanceOngoingFinancial Analyst or Editor, isolated from ad ops

Contingencies: staff exits or a personal profile gets restricted

Always keep at least two business admins with two-factor authentication on different email domains. Maintain a lean offboarding protocol: on the departure day move the person into an empty Asset Group, then remove them from the business. If a personal profile is restricted, the second admin reassigns critical ownership and project groups keep contractors working with zero downtime.

Frequent failure modes and how to avoid them

The classic failure is "temporary" admin for a contractor that never gets revoked. Next is confusion between business roles and asset permissions, causing people to see Ads Manager but fail to start campaigns. Third is uncontrolled billing access. The antidote is consistent least privilege, Asset Groups, and a weekly activity review with named responsibility.

Advice from npprteam.shop: handle urgent do it now requests via a temporary Asset Group with sunset date, not by upgrading someone to Business Admin.

Engineering details under the hood

Business roles set visibility and invitation power, not budget control. Ad account permissions are granular, with distinct scopes for manage campaigns, view, and report access. Pixels and conversions belong to the business, not the ad account, so data collection survives account rotations. Financial roles are isolated from creative and optimization work. Apps and server-side conversion events live in the developer domain and must not be bundled with creative access.

System Users and API tokens: keep infrastructure access off personal profiles

Teams often think permissions break because of Business roles, but the real fragility comes from personal-profile bound tokens. If your conversions pipeline, app access, or server-side events rely on one person’s login, you will eventually lose continuity. A safer pattern is to use System Users for technical integrations and grant them only the minimum permissions required for the app, Events Manager, and the specific assets involved.

Operationally: create one System User for infrastructure, link it to the app, scope it to the required pixel or dataset, and store tokens in a controlled secret vault. Contractors should get access to debugging and event validation, not long-lived keys. This keeps measurement stable during team rotation, account changes, and profile restrictions.

Advice from npprteam.shop: if a token can be copied into a chat, it must live in managed storage, not in someone’s notes.

Do you need Page access if all work happens in Ads Manager

Yes. Formats that use the Page feed and messaging require Page roles for moderation and publishing. Without Page access some placements remain unavailable and message routing breaks, hurting response times and brand safety.

When several teams run ads at once

Share capabilities, not everything. Creative producers get create and edit ads; analysts get read and reporting; media buyers get campaign and budget controls within guardrails. Separate ad accounts by market or product line and bind them to the same Page and pixels through a project Asset Group to reduce collisions.

A practical specification for common profiles

Define profiles up front to speed onboarding and reduce negotiation. A media buyer needs ad account campaign management, pixel read, and conversion diagnostics. A creative lead needs create and edit ads plus Page moderation. An analyst needs read-only campaigns, report access, and event visibility. A finance manager needs invoices and payment methods without creative or optimization scope.

ProfileBusiness roleAd accountPagePixel and eventsBilling
Media buyerEmployeeManage campaignsEditor or moderatorRead eventsNo
Creative leadEmployeeCreate and edit adsModeratorNoNo
AnalystEmployeeView and reportViewRead eventsNo
Finance managerEmployeeViewNoNoFinancial Editor

Privacy and compliance boundaries

Personal profiles should not hold critical keys or payment data. Keep billing inside the business and on company-owned accounts. Host server-side conversion infrastructure and apps in corporate developer tenants; grant contractors access only to events and debugging without exposing long-lived tokens. This supports audits and reduces data loss risks.

Signals that your access matrix needs a redesign

Triggers include hiring spikes, multi-agency orchestration, expansion to new markets, or permissions conflicts that stall campaigns. If emergency admin upgrades become normal, move to Asset Groups, rebuild role profiles, enforce two-factor authentication, and implement weekly log review. Migrate new projects first and retrofit older ones over time.

Micro procedure for safe provisioning without bureaucracy

Create a project Asset Group and add Page, ad accounts, pixels, catalogs, and any app. Invite the user as Business Employee and attach them to the group with only necessary operations. Use View as user to confirm exactly what they can see. Store a one-page access card in project docs and put a review date on the calendar.

Zero downtime handoffs

To preserve impressions when shifting teams, pre-onboard the incoming partner and grant the project Asset Group ahead of the switch. Remove the outgoing partner only after confirmation of access and parity checks. Conversions stay intact because the business owns the pixel and events, protecting optimization and learning phases.

Short answers to tough owner questions

Why not grant admin to everyone? Because admins can change admins. Why are campaigns invisible with access granted? Because the person has a business role but no ad account permission. Why does the analyst not see spend? Because they lack Financial Analyst rights. Why can the contractor not publish with the brand? Because Page roles are missing.

Two minute troubleshooting map: fix permission issues without guesswork

When something "doesn’t work", the fastest path is a symptom-based check. If a user cannot see an ad account, they usually have a business role but no asset permission. If they cannot select a Page in an ad, they lack the Page role. If pixel events are missing, access to the pixel is not granted, or the pixel is owned by a different business. If catalogs are invisible, the catalog was not added to the Asset Group or permissions were never assigned.

SymptomLikely causeFast fix
Ad account not visibleNo access to the assetAssign the ad account or the Asset Group
Page cannot be selectedNo Page roleGrant Page Editor or Moderator
No pixel events in Events ManagerNo pixel access or wrong ownerGrant pixel permissions and verify ownership

One day migration plan to a robust access model

Inventory assets and people, documenting ownership for each resource. Create Asset Groups by project and market, appoint two independent admins, enable two-factor authentication, and rebuild user access via groups rather than one-off assets. Save role profiles in the internal wiki and assign a weekly log steward. By end of day access becomes predictable and risk reduces while execution speed improves.

If you need production ready profiles to start testing today, consider buying Facebook accounts for ads to speed up onboarding; for broader options the catalog is here: https://npprteam.shop/en/facebook/.

Related articles

Meet the Author

NPPR TEAM
NPPR TEAM

Media buying team operating since 2019, specializing in promoting a variety of offers across international markets such as Europe, the US, Asia, and the Middle East. They actively work with multiple traffic sources, including Facebook, Google, native ads, and SEO. The team also creates and provides free tools for affiliates, such as white-page generators, quiz builders, and content spinners. NPPR TEAM shares their knowledge through case studies and interviews, offering insights into their strategies and successes in affiliate marketing.

FAQ

What roles exist in Business Manager and how do they differ?

Core roles in 2026 are Business Admin, Employee, Financial Analyst, Financial Editor, and Developer. Admins govern the Business Manager perimeter; Employees operate only assigned assets; Financial roles handle billing and invoices; Developers manage apps, system users, and events. Use least privilege and Asset Groups for safe, scalable access.

How do business level roles differ from asset level permissions?

Business level roles control visibility and invitations across the Business Manager. Asset level permissions control actions on specific resources like ad accounts, Pages, pixels, catalogs, and apps. A common failure is granting a business role without giving ad account or Page permissions, which blocks campaign launch.

How should I grant a contractor access without risking the account?

Invite the contractor as Business Employee, then assign an Asset Group containing the project’s ad accounts, Page, pixel, catalog, and app. Grant Manage Campaigns for the ad account, Editor or Moderator for the Page, and Read or Setup for the Pixel. Keep billing under internal staff.

Do I need Page access if work happens only in Ads Manager?

Yes. Placements using the Page feed and messaging require Page roles to publish and moderate. Without Page Editor or Moderator, certain ad formats will not activate, comments can’t be handled, and brand messaging may break.

How do I separate billing from campaign operations?

Assign Financial Analyst for read only invoices and spend, and Financial Editor to manage payment methods. These billing roles do not allow editing campaigns in Ads Manager. Keep funding sources and cards under internal finance rather than agencies.

What is the fastest way to provision many assets at once?

Use an Asset Group. Add the Page, ad accounts, pixels, catalogs, and any app, then grant access to the group. This prevents omissions like missing pixel permissions that break attribution and simplifies offboarding with a single switch.

How can I audit changes and detect risky actions?

Review the Activity Log weekly for new admins, asset ownership changes, broadened permissions, or added payment methods. Keep a short internal changelog and enforce least privilege. Assign a named steward for recurring reviews.

What should I do if a staff member’s personal profile is restricted?

Maintain at least two Business Admins with two factor authentication on different domains. Use an offboarding playbook: move the user to an empty Asset Group, then remove them. The second admin reassigns ownership; Asset Groups keep contractors working without downtime.

Why can someone see Ads Manager but not start campaigns?

They likely have a business role without asset permissions. Grant Manage Campaigns on the specific ad account, Page Editor or Moderator if needed, and Pixel Read or Setup. Confirm with View as user to validate their effective access.

When should I redesign my access matrix?

Triggers include rapid hiring, multiple agencies, new markets, permission conflicts, or frequent urgent admin upgrades. Move to Asset Groups, define profiles for media buyers, analysts, creatives, and finance, enforce two factor authentication, and institute weekly Activity Log reviews.

Articles