Skip to content

Group Sync

Group sync automatically maps groups from your identity provider (IdP) to workspace roles in SetGet. When a user authenticates via SSO, SetGet reads their group memberships from the SAML assertion and assigns the corresponding workspace role. This eliminates manual role assignment and ensures that access permissions stay in sync with your organization's directory.

Prerequisites

Before configuring group sync, you need:

  • SSO configured and working (see SSO)
  • Your IdP configured to include group membership in the SAML assertion
  • A workspace Owner or Admin role in SetGet

How group sync works

  1. A user signs in via SAML SSO.
  2. The IdP includes the user's group memberships in the SAML assertion.
  3. SetGet reads the group attribute from the assertion.
  4. SetGet matches the group names against configured role mappings.
  5. The user's workspace role is set (or updated) based on the matched mapping.
IdP Groups          Role Mappings         SetGet Role
─────────           ─────────────         ──────────
"Engineering" ─────> Engineering → Member ─────> Member
"IT-Admins"  ─────> IT-Admins → Admin   ─────> Admin
"Executives" ─────> Executives → Owner   ─────> Owner

Configure group attribute in your IdP

Your IdP must send group information in the SAML assertion. The configuration varies by provider:

Identity ProviderHow to configure
OktaIn the SAML app, add a Group Attribute Statement with name groups and filter for desired groups
Azure ADIn the Enterprise Application, configure "Groups Claim" under Token Configuration
Google WorkspaceUse a custom attribute or organizational unit mapping
OneLoginAdd a "Groups" parameter to the SAML app configuration

The SAML assertion should include an attribute like:

xml
<saml:Attribute Name="groups">
  <saml:AttributeValue>Engineering</saml:AttributeValue>
  <saml:AttributeValue>Product-Team</saml:AttributeValue>
</saml:Attribute>

Configure group sync in SetGet

  1. Navigate to Workspace Settings > Security > SSO.
  2. Click the Group Sync tab.
  3. Set the Group attribute name — the SAML attribute that contains group memberships (default: groups).
  4. Add role mappings:
FieldDescription
IdP Group NameThe exact group name as it appears in the SAML assertion
SetGet RoleThe workspace role to assign: Owner, Admin, Member, or Guest
  1. Click Add Mapping for each group-to-role pair.
  2. Click Save.

Example mappings

IdP GroupSetGet RoleNotes
setget-ownersOwnerFull workspace control
setget-adminsAdminWorkspace management without billing
engineeringMemberStandard project access
contractorsGuestLimited, invitation-only access

WARNING

Be careful when mapping groups to the Owner role. Any user in the mapped IdP group will have full control over the workspace, including billing and member management.

Role assignment rules

When a user belongs to multiple IdP groups that map to different roles, SetGet applies the highest privilege role:

User's IdP groupsMapped rolesAssigned role
engineeringMemberMember
engineering, setget-adminsMember, AdminAdmin
engineering, setget-admins, setget-ownersMember, Admin, OwnerOwner

Users with no matching groups

ScenarioBehavior
User's groups match no mappings, user is newUser is created with the default role (Member)
User's groups match no mappings, user existsUser's role is not changed (existing role preserved)
User is removed from all mapped groupsRole is downgraded on next SSO sign-in (if downgrade is enabled)

Role downgrade

By default, group sync only upgrades roles (assigns a higher role if the user's groups change). You can enable role downgrade to also lower roles when group memberships change:

  1. In the Group Sync settings, toggle Enable role downgrade.
  2. When enabled, if a user is removed from the "Admin" IdP group, their SetGet role is downgraded to match their remaining group memberships.

WARNING

Enabling role downgrade means that IdP group changes immediately affect workspace access. Ensure your IdP group memberships are accurate before enabling this feature.

Sync frequency

Group sync happens at specific trigger points:

TriggerWhen it runs
SSO sign-inEvery time a user authenticates via SSO
Periodic syncConfigurable interval (e.g., every 1 hour, 6 hours, or 24 hours)
Manual syncAdmin-triggered from the Group Sync settings page

Configure periodic sync

  1. In the Group Sync settings, set the Sync interval.
  2. Available intervals:
IntervalUse case
1 hourOrganizations with frequent group changes
6 hoursStandard for most organizations
24 hoursLow-change environments
DisabledSync only on sign-in

TIP

For most organizations, syncing on every SSO sign-in is sufficient. Enable periodic sync only if you need role changes to take effect between sign-in events.

Manual sync

  1. Navigate to Workspace Settings > Security > Group Sync.
  2. Click Sync Now.
  3. SetGet fetches the latest group memberships for all SSO users and updates roles accordingly.

The sync results are displayed, showing how many users were updated.

View sync status

The Group Sync settings page shows:

FieldDescription
Last sync timeWhen the most recent sync occurred
Users syncedNumber of users processed in the last sync
Roles updatedNumber of role changes applied
ErrorsAny sync errors (e.g., missing group attribute)

Troubleshooting

IssueLikely causeResolution
Groups not detected in SAML assertionIdP not configured to send groupsAdd group attribute to IdP SAML app configuration
Wrong attribute nameAttribute name mismatchVerify the SAML attribute name matches the configured "Group attribute name"
User gets wrong roleMultiple group mappings conflictCheck priority rules (highest privilege wins); review group memberships
Role not updated on sign-inGroup sync disabled or mapping missingEnable group sync and add the appropriate mapping
Role not downgradedDowngrade not enabledToggle "Enable role downgrade" in settings
Sync shows errorsIdP connection issue or malformed assertionCheck IdP configuration and review SAML response in browser dev tools

Debug SAML assertions

To see what group data your IdP sends:

  1. Open browser developer tools (F12).
  2. Sign in via SSO.
  3. In the Network tab, find the SAML callback request.
  4. Decode the SAML response (Base64) and inspect the group attribute values.

This helps identify mismatches between what the IdP sends and what SetGet expects.