- Assign roles to IdP groups: Manage Glean roles collectively rather than per individual user.
- Manage permissions at scale: Leverage existing identity provider groups.
- Control feature access: Use groups in feature greenlists, such as access to Glean Assistant and data source test groups.
- Automate inheritance: Ensure users automatically receive or lose permissions as their IdP group memberships change.
Supported identity providers
Glean supports group-based permissions for the following identity providers:| Identity Provider | Group Support | Notes |
|---|---|---|
| Azure AD (Microsoft 365) | ✓ | Groups synced via the O365 connector |
| Google Groups (Google Workspace) | ✓ | Groups synced via the Google Workspace connector |
| Okta | ✗ | User provisioning via SCIM is supported, but group-based role assignment is not yet available |
Glean only reads group membership information from your identity provider. It does not sync, modify, or enforce IdP permission rules.
Group-to-Role Mapping
Groups as principals
In Glean’s role-based access control (RBAC) model, groups are treated as principals alongside individual users. This means a group can be assigned:- One primary role (Member, Setup Admin, Admin, or Super Admin)
- Multiple secondary roles (such as Agent Creator, Answers Moderator, Insights Moderator, or Sensitive Content Moderator)
Effective permission calculation
When a user belongs to one or more groups with assigned roles, Glean calculates effective permissions by merging:- Roles assigned directly to the user
- Roles inherited from all groups the user belongs to
- Primary role: The highest-precedence role takes effect. Precedence follows this order: Super Admin > Admin > Setup Admin > Member.
- Secondary roles: All secondary roles from the user’s direct assignments and group memberships are combined (union).
Example: Effective permission calculation
Example: Effective permission calculation
Consider a user with the following role assignments:
Effective result:
| Source | Primary Role | Secondary Roles |
|---|---|---|
| Direct assignment | Admin | — |
| Group: IT-Admins | Setup Admin | API Token Creator |
| Group: Content-Team | Member | Answers Moderator |
- Primary role: Admin (highest precedence wins)
- Secondary roles: API Token Creator + Answers Moderator (union of all)
Configure Group-to-Role mappings
Admins can map IdP groups to Glean roles from the Teammates page in the Admin console.Only users with the Admin or Super Admin role can configure group-based permissions.
Steps to Configure
Access User Group Permissions
Admin Console > TeammatesClick the Default Member permissions button, then navigate to the User group permissions section.
Select Identity Provider
Choose the identity provider that contains your groups (for example, Microsoft 365 or Google Workspace).
Add Group Mappings
Click Add mapping to create a new group-to-role mapping:
- Search and select a group by name or email.
- Assign a primary role for the group.
- Optionally assign one or more secondary roles.
- Repeat for additional groups as needed.
Limits and sync behavior
- You can assign roles to a maximum of 1,000 groups.
- Glean automatically syncs group membership changes from your IdP. The synchronization frequency depends on your integration type:
- SAML/SCIM integrations: Changes sync in near real-time.
- OIDC integrations: Changes may take up to three hours to sync.
- An on-demand sync control is available to refresh group membership immediately.
Use groups for feature access
Group-based permissions integrate with Glean’s greenlist-style provisioning for features such as:- Glean Assistant access: Grant Assistant access to entire groups instead of adding users individually.
- Feature rollouts: Use groups to control access to beta features or phased rollouts.
- Data source test groups: Include groups when configuring which users can see results from a data source during testing.
Privacy and Security
Group information visibility
Only Admins and Super Admins can view group names, descriptions, and membership information within the Admin Console. Regular users cannot view their group memberships or identify how the system derives their permissions.For organizations with sensitive group structures (such as executive or M&A-related groups), contact Glean support to discuss options for limiting group name visibility.
Manage group-derived roles
Glean treats roles inherited through group membership as read-only. To modify these inherited roles, you must perform one of the following:- Add or remove the user from the relevant group in your identity provider.
- Modify the role mapping for the group in Glean Admin console.
Safety rails
The following guardrails apply to group-based permissions:- Admins cannot remove the last user or group from any role.
- Admins cannot downgrade or remove Super Admin permissions from users or groups.
- Only Super Admins can assign the Super Admin role to groups.
Limitations
The following limitations apply to group-based permissions:| Limitation | Details |
|---|---|
| Okta groups | Not yet supported. Okta SCIM provides user provisioning, but groups cannot be used for role assignment. |
| Group membership latency | OIDC-based integrations may have up to 3 hours of sync delay for membership changes. |
| Custom roles | Group-based permissions work with Glean’s existing role structure. Custom role definitions are not currently supported. |
| Feature flag | Group-based permissions are controlled by a feature flag. If the feature is disabled, group-derived roles are ignored and only direct user role assignments apply. |
Examples
Example 1: IT administrators group
Map your IT Admins group to the Admin role so that all IT team members automatically receive Glean Admin permissions:| Group | Primary Role | Secondary Roles |
|---|---|---|
| IT-Admins@company.com | Admin | — |
Example 2: Assistant Pilot Group
Grant Glean Assistant access to a pilot group of early adopters:| Group | Primary Role | Secondary Roles |
|---|---|---|
| Assistant-Pilot@company.com | Member | — |
Example 3: Content Moderators
Assign content moderation permissions to your knowledge management team:| Group | Primary Role | Secondary Roles |
|---|---|---|
| Knowledge-Team@company.com | Member | Answers Moderator, Collections Moderator |