IdP group role bindings»
IdP groups can receive roles through direct group assignment. Assign roles to the entire group, which automatically applies to all members of that group.
Assign roles»
Assign roles to IdP groups using the web UI»
Permission Scope
- Root Space Admins can create/modify/delete IdP group mappings and manage role bindings across all spaces
- Non-root Space Admins can view all IdP group mappings but only manage role bindings for spaces they administer; they cannot create/modify/delete IdP group mappings
- Verify you meet the prerequisites:
- The selected management strategy for your organization must be User Management.
- Your identity provider must be connected to Spacelift.
- You must have Space Admin permissions on the target space where you want to assign roles (or Root Space Admin permissions for all spaces).
- Target spaces must exist where you want to assign roles.
- Navigate to IdP group mapping:
- Click your name in the bottom left corner of the Spacelift interface.
- Go to Organization Settings → Identity Management -> IdP group mapping.
- Create IdP group mapping:
- Click Map IdP group.
- Enter the id of the IdP group (this is the id of the group in your identity provider, e.g., GitHub team slug).
- Select the role you want to assign to the group.
- Select the space where the group should have this role.
- Click Add to add role assignment.
- Click Add to save the group mapping.
- Access group role management:
- Click on the group row in the group list.
- Click Manage Roles.
- This opens the group role assignment interface.
Assign roles to IdP groups using the Terraform provider»
Refer to the Spacelift Terraform provider documentation for detailed instructions on creating IdP group mappings programmatically.
Assign roles to IdP groups using the login policies»
- Verify you meet the prerequisites:
- The selected management strategy for your organization must be Login Policies.
- You must have appropriate permissions to create or modify login policies.
- Understanding of OPA/Rego policy language.
- Use the
rolesrule to assign roles to users:
1 2 3 4 5 6 7 8 | |
RBAC role assignment»
Getting Role slugs
To use custom roles in login policies, copy the role slug from Organization Settings → Access Control Center → Roles → select role → copy slug.
Use the roles rule to assign RBAC roles in login policies:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 | |
If a user is logged in, their access levels will not change, so newly added spaces might not be visible. The user must log out and back in to see new spaces they're granted access to.
However, the space's creator immediately has access to it.
Individual group assignment»
1 2 3 4 5 6 7 8 9 10 11 12 13 | |
Multiple teams, same role»
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 | |
Hierarchical team access»
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 | |
Department-based access»
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 | |
Project and functional groups»
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 | |
Multi-condition team assignment»
1 2 3 4 5 6 7 8 9 10 11 12 | |
Troubleshooting»
Group permissions not working»
- Verify group-to-role assignments are correct.
- Check if user is actually a member of the group.
- Ensure user has re-authenticated since group assignment.
- Validate role includes required actions.
Conflicting group permissions»
- Multiple groups can provide different roles.
- Permissions are additive across group memberships.
- Regular audit of group role combinations.
Debugging»
- Verify Group Membership: Check user is member of expected groups in IdP
- Validate Role Assignment: Confirm group has correct role assignments
- Review Audit Logs: Check for group-related permission errors
Related Topics»
- Assigning Roles to Users: Individual user role assignment
- Assigning Roles to API Keys: Service account permissions
- Login Policies: Policy-based access control
- Single Sign-On: IdP integration setup