Mar 30, 2026
1 min read

Step 8: Team collaboration

Step 8: Team collaboration
Give your team access without sacrificing security or control.

So far, you've been working alone. But the real value of centralized secrets management appears when multiple people need access. A new engineer joins the team. Do you send them secrets over Slack? Copy a .env file from your machine? Neither option is secure nor maintainable.

Doppler solves this with role-based access control. Team members authenticate with their own accounts and access secrets based on their assigned roles. When someone leaves the team, you revoke their access in one place.

Invite team members

From the Doppler dashboard, navigate to your project and open the Members section, as shown in the image below.

Doppler dashboard showing project members and the process for adding new members.
Doppler dashboard showing project members and the process for adding new members.

From there, invite team members by email and assign each person a role based on their responsibilities. The available roles are:

RoleCapabilities

Admin

Full access, manage team, delete project

Collaborator

View and edit secrets in all environments

Viewer

View secrets (read-only)

For most teams, developers who need to run the application locally should have Collaborator access, while stakeholders who just need to verify configurations can have Viewer access.

Team member setup

New team members can get up and running in minutes:

No .dev.vars files to share. No secrets in Slack messages. Everyone pulls from the same source.

Audit trail

Doppler maintains a complete history of every secret access and modification. You can view recent activity on the Activity Logs page in your dashboard, as shown below.

Doppler dashboard project activity logs
Doppler dashboard project activity logs

You can also view activity through the CLI:

This shows workplace-level activity, including who accessed or modified secrets and when. If a breach occurs, you can determine exactly which secrets were potentially exposed and who had access. This level of visibility is essential for security compliance and incident investigation.