Access Control

Nexus Repository uses role-based access control (RBAC) that gives administrators very fine-grained control over user rights to:

  • read from a repository or a subset of repositories
  • administer the repository manager or specific parts of the configuration
  • access specific parts of the user interface
  • deploy to repositories or even just specific sections of a repository

The default configuration ships with roles and users with a standard set of permissions. As your security requirements evolve, you will likely need to customize security settings to create protected repositories for multiple departments or development groups. Nexus Repository provides a security model that can adapt to any scenario.

Learn More

To learn more about access control, check out this guide.

The default administrator user gives you privilege to all aspects of the Nexus Repository system and uses the username admin and the initial password can be found in an admin.password file in the $data-dir directory after startup.

This section covers user account and access right management related to user interface as well as to component access documented in PrivilegesRoles and Users. Security-related configuration can be performed with the feature views available via the Security section of the Administration main menu. Many of the features shown in this section are only available to users with the necessary privileges to access them. The role-based access control system is backed by different authentication and authorizations systems as documented in Realms and designed around the following security concepts:


Privileges are rights to read, update, create, or manage resources and perform operations related to the user interface as well as the components managed by the repository manager in the various repositories. The repository manager ships with a set of core privileges that cannot be modified.


Privileges can be grouped into collections called roles to make it easier to define privileges common to certain classes of users. For example, administrative users will all have similar sets of permissions. Instead of assigning individual privileges to individual users, you use roles to make it easier to manage users with similar sets of privileges.


Users can be assigned one or more roles, and model the individuals who will be logging into the user interface and read, deploy, or manage repositories as well as connect from client tools such as Apache Maven.

Topics in this section: