Roles and access rights in Business Manager: how to grant rights and not break anything
Summary:
- A safe model is two-layered: assign the least BM role first, then grant granular asset permissions.
- 2026 roles: Business Admin, Employee, Financial Analyst/Editor, Developer, with clear misassignment risks.
- Separate governance from operations: BM roles control visibility/invites; asset rights control actions.
- Most incidents start with ownership: assets should be owned by your BM; agencies use partner access.
- Contractor setup: invite by email as Employee, then map ad account/Page/pixel/catalog rights to tasks.
- Use Asset Groups, validate with "View as," review activity logs, apply temporary access + clean offboarding.
Definition
Business Manager roles and permissions are a two-layer access system: business roles define who can see and administer the environment, while asset-level permissions define what a person can do on an ad account, Page, pixel, catalog, or app. In practice, teams provision access via the Employee role, attach users to an Asset Group with only required operations, validate using "View as," and then review and revoke access on a set cadence.
Table Of Contents
- Business Manager roles and access in 2026 at a glance
- What roles exist and how do they actually differ
- Access model: business level versus asset level
- How to grant a contractor access without breaking anything
- Billing access separation
- Where to manage many permissions quickly
- Audit and activity log: how to know who did what
- Contingencies: staff exits or a personal profile gets restricted
- Frequent failure modes and how to avoid them
- Engineering details under the hood
- Do you need Page access if all work happens in Ads Manager
- When several teams run ads at once
- A practical specification for common profiles
- Privacy and compliance boundaries
- Signals that your access matrix needs a redesign
- Zero downtime handoffs
- Short answers to tough owner questions
- One day migration plan to a robust access model
New to the ecosystem and want a quick primer before diving into permissions? Start with a clear, jargon free introduction to Facebook media buying and how it works end to end — it frames roles, assets, and the real flow of spend and signals.
Business Manager roles and access in 2026 at a glance
A safe access model uses two layers: people join the Business Manager with the least necessary role, then receive granular permissions on assets like ad accounts, Pages, pixels, catalogs, and apps. Keeping this order and the least privilege principle prevents breakage and reduces data leakage.
If you are setting up your first structure, this practical starter roadmap will help you move from goals to a clean launch: a step by step Facebook Ads launch for media buyers in 2026.
What roles exist and how do they actually differ
In 2026 the core roles are business admin, employee, financial analyst or editor, and developer. Admins manage the company perimeter and invitations; employees operate only the assets assigned to them; financial roles handle billing and invoices; developers manage apps, events, and tokens. Most practitioners only need an employee role at business level plus precise asset permissions to do real work.
| Role | Scope | Typical actions | Risk when misassigned |
|---|---|---|---|
| Business Admin | Entire Business Manager | Invite users, change roles, connect domains and apps, manage billing settings | Loss of control, asset ownership changes, hard to revert without a second admin |
| Business Employee | Assigned assets only | Operate campaigns in Ads Manager, edit creatives, view reports within scope | Low if assets are grouped and permissions are narrow |
| Financial Analyst | Billing visibility | View spend, invoices, payment history | Exposure of financial data without change rights |
| Financial Editor | Billing management | Add or change payment methods, pay invoices | Unwanted charges, disputed payments, blocked cards |
| Developer | Apps and events | Configure apps, system users, conversions, API tokens | Leaked keys, noisy events, measurement distortion |
Access model: business level versus asset level
Separate governance from operations. Business-level roles define who can see the environment and invite others; asset-level permissions define what a person does with a specific ad account, Page, pixel, catalog, or app. Mixing layers creates confusing states, like a contractor who sees everything but cannot launch campaigns, or someone who can change billing without operational context.
Making the basic connections correctly removes half of future friction. Here is a concise walkthrough on linking your Page and ad account to Business Manager so permissions align with assets from day one.
| Layer | Includes | Common mistake | Observable symptom |
|---|---|---|---|
| Business | Admin, Employee, financial and developer roles | Granting admin to an agency "for convenience" | Agency alters company settings or moves asset ownership |
| Asset | Pages, ad accounts, pixels, catalogs, apps | Assigning only a Page but not the ad account | User sees the Page but cannot start or edit campaigns |
Asset ownership and partner access: the control plane most teams miss
Most access incidents do not start with roles, they start with ownership. Pages, pixels, catalogs, domains, and apps should be owned by your Business Manager, while agencies should work through partner access, not as internal users. This keeps control with the business and makes offboarding clean: you revoke partner permissions without leaving "hidden" inheritances behind.
A simple rule is operationally convenient: internal staff join as Business Employees, external teams use partner assignments tied to specific assets or Asset Groups. Avoid granting Business Admin "just to move faster". Admins can change admins, ownership, and billing settings, and the blast radius is hard to reverse if you do not have a second verified admin.
| Access format | Best for | Why it reduces risk |
|---|---|---|
| Employee in BM | In-house team | Clear HR driven offboarding and predictable accountability |
| Partner access | Agencies and contractors | Less visibility, faster revocation, fewer long term leftovers |
How to grant a contractor access without breaking anything
Invite by email as a Business Employee in Business Settings, then grant asset rights: ad account for campaign management, Page as moderator or editor, pixel for event read or setup, and catalog if dynamic ads are used. Map permissions to tasks: media buyers need campaign control and pixel visibility; finance should remain in-house; developers get app and events scopes, not creative editing.
Advice from npprteam.shop: put contractors into an Asset Group instead of sprinkling single assets. One switch controls the whole project and deprovisioning is instant when the engagement ends.
Billing access separation
Billing privileges are independent from campaign control. A person can read campaigns without touching payment methods, or manage payment methods without seeing creatives. Give accounting a Financial Analyst role for invoices and spend; give a finance manager Financial Editor only if they must maintain funding sources, and restrict their ad account visibility to a minimal set.
| Scenario | Role | Why it is safer |
|---|---|---|
| Accounting pulls invoices | Financial Analyst | No ability to add cards or trigger charges |
| CFO maintains payment methods | Financial Editor | Controls funding sources without changing user roles |
| Agency runs campaigns | Employee + asset permissions | Sees assigned ad accounts and pixels only, billing stays internal |
Where to manage many permissions quickly
Use Asset Groups. Create a project group, add the Page, ad accounts, pixels, catalogs, and any app, then assign people to the group. This prevents omissions like a missing pixel that breaks attribution and keeps handoffs predictable across teams and time zones.
Advice from npprteam.shop: name groups with a readable pattern like Project Geo Language Team. Human-friendly labels reduce assignment errors and speed up onboarding.
Audit and activity log: how to know who did what
Weekly log reviews catch silent changes: new admins added, asset ownership switches, payment methods added, permissions broadened. A single owner scans the log and notes changes in a short internal report. That small ritual saves hours of incident response and restores confidence in access hygiene.
Temporary access protocol and recurring review: prevent permission drift
Even a good matrix breaks when access is granted "for now" and never revisited. A pragmatic 2026 process is: every permission has a scope, owner, and expiry. The requester states what task is needed, which assets, and for how long; the admin grants access via an Asset Group and validates the real experience using View as. When the work ends, access is removed the same day, not "later".
Run a lightweight monthly review: remove inactive users, shrink expanded permissions, and verify that billing roles remain separated from campaign operations. This turns security into routine hygiene, not incident response.
| Access type | Suggested duration | Control method |
|---|---|---|
| Launch contractor | 7–14 days | Asset Group + expiry note + View as validation |
| Analyst audit | 3–7 days | Read and report only, no billing permissions |
| Finance | Ongoing | Financial Analyst or Editor, isolated from ad ops |
Contingencies: staff exits or a personal profile gets restricted
Always keep at least two business admins with two-factor authentication on different email domains. Maintain a lean offboarding protocol: on the departure day move the person into an empty Asset Group, then remove them from the business. If a personal profile is restricted, the second admin reassigns critical ownership and project groups keep contractors working with zero downtime.
Frequent failure modes and how to avoid them
The classic failure is "temporary" admin for a contractor that never gets revoked. Next is confusion between business roles and asset permissions, causing people to see Ads Manager but fail to start campaigns. Third is uncontrolled billing access. The antidote is consistent least privilege, Asset Groups, and a weekly activity review with named responsibility.
Advice from npprteam.shop: handle urgent do it now requests via a temporary Asset Group with sunset date, not by upgrading someone to Business Admin.
Engineering details under the hood
Business roles set visibility and invitation power, not budget control. Ad account permissions are granular, with distinct scopes for manage campaigns, view, and report access. Pixels and conversions belong to the business, not the ad account, so data collection survives account rotations. Financial roles are isolated from creative and optimization work. Apps and server-side conversion events live in the developer domain and must not be bundled with creative access.
System Users and API tokens: keep infrastructure access off personal profiles
Teams often think permissions break because of Business roles, but the real fragility comes from personal-profile bound tokens. If your conversions pipeline, app access, or server-side events rely on one person’s login, you will eventually lose continuity. A safer pattern is to use System Users for technical integrations and grant them only the minimum permissions required for the app, Events Manager, and the specific assets involved.
Operationally: create one System User for infrastructure, link it to the app, scope it to the required pixel or dataset, and store tokens in a controlled secret vault. Contractors should get access to debugging and event validation, not long-lived keys. This keeps measurement stable during team rotation, account changes, and profile restrictions.
Advice from npprteam.shop: if a token can be copied into a chat, it must live in managed storage, not in someone’s notes.
Do you need Page access if all work happens in Ads Manager
Yes. Formats that use the Page feed and messaging require Page roles for moderation and publishing. Without Page access some placements remain unavailable and message routing breaks, hurting response times and brand safety.
When several teams run ads at once
Share capabilities, not everything. Creative producers get create and edit ads; analysts get read and reporting; media buyers get campaign and budget controls within guardrails. Separate ad accounts by market or product line and bind them to the same Page and pixels through a project Asset Group to reduce collisions.
A practical specification for common profiles
Define profiles up front to speed onboarding and reduce negotiation. A media buyer needs ad account campaign management, pixel read, and conversion diagnostics. A creative lead needs create and edit ads plus Page moderation. An analyst needs read-only campaigns, report access, and event visibility. A finance manager needs invoices and payment methods without creative or optimization scope.
| Profile | Business role | Ad account | Page | Pixel and events | Billing |
|---|---|---|---|---|---|
| Media buyer | Employee | Manage campaigns | Editor or moderator | Read events | No |
| Creative lead | Employee | Create and edit ads | Moderator | No | No |
| Analyst | Employee | View and report | View | Read events | No |
| Finance manager | Employee | View | No | No | Financial Editor |
Privacy and compliance boundaries
Personal profiles should not hold critical keys or payment data. Keep billing inside the business and on company-owned accounts. Host server-side conversion infrastructure and apps in corporate developer tenants; grant contractors access only to events and debugging without exposing long-lived tokens. This supports audits and reduces data loss risks.
Signals that your access matrix needs a redesign
Triggers include hiring spikes, multi-agency orchestration, expansion to new markets, or permissions conflicts that stall campaigns. If emergency admin upgrades become normal, move to Asset Groups, rebuild role profiles, enforce two-factor authentication, and implement weekly log review. Migrate new projects first and retrofit older ones over time.
Micro procedure for safe provisioning without bureaucracy
Create a project Asset Group and add Page, ad accounts, pixels, catalogs, and any app. Invite the user as Business Employee and attach them to the group with only necessary operations. Use View as user to confirm exactly what they can see. Store a one-page access card in project docs and put a review date on the calendar.
Zero downtime handoffs
To preserve impressions when shifting teams, pre-onboard the incoming partner and grant the project Asset Group ahead of the switch. Remove the outgoing partner only after confirmation of access and parity checks. Conversions stay intact because the business owns the pixel and events, protecting optimization and learning phases.
Short answers to tough owner questions
Why not grant admin to everyone? Because admins can change admins. Why are campaigns invisible with access granted? Because the person has a business role but no ad account permission. Why does the analyst not see spend? Because they lack Financial Analyst rights. Why can the contractor not publish with the brand? Because Page roles are missing.
Two minute troubleshooting map: fix permission issues without guesswork
When something "doesn’t work", the fastest path is a symptom-based check. If a user cannot see an ad account, they usually have a business role but no asset permission. If they cannot select a Page in an ad, they lack the Page role. If pixel events are missing, access to the pixel is not granted, or the pixel is owned by a different business. If catalogs are invisible, the catalog was not added to the Asset Group or permissions were never assigned.
| Symptom | Likely cause | Fast fix |
|---|---|---|
| Ad account not visible | No access to the asset | Assign the ad account or the Asset Group |
| Page cannot be selected | No Page role | Grant Page Editor or Moderator |
| No pixel events in Events Manager | No pixel access or wrong owner | Grant pixel permissions and verify ownership |
One day migration plan to a robust access model
Inventory assets and people, documenting ownership for each resource. Create Asset Groups by project and market, appoint two independent admins, enable two-factor authentication, and rebuild user access via groups rather than one-off assets. Save role profiles in the internal wiki and assign a weekly log steward. By end of day access becomes predictable and risk reduces while execution speed improves.
If you need production ready profiles to start testing today, consider buying Facebook accounts for ads to speed up onboarding; for broader options the catalog is here: https://npprteam.shop/en/facebook/.

































