IDP Group Mappings
External IDP group mappings connect groups from your identity provider (LDAP, OIDC, Active Directory) to RAMP application roles. When a user belonging to a mapped external group logs in, they automatically receive the associated RAMP roles without manual assignment.
How Mappings Work
Section titled “How Mappings Work”The mapping process follows this flow:
- A user logs in through an external identity provider (LDAP, OIDC, or Windows Auth).
- RAMP reads the user’s group memberships from the identity provider.
- RAMP checks if any of those groups have been mapped to RAMP roles.
- If a match is found, the user automatically receives the mapped RAMP roles.
This means that role assignment is driven by your existing identity provider group structure, reducing manual administration.
Creating a Mapping
Section titled “Creating a Mapping”- Navigate to Tenants, then select the tenant.
- Open the External IDP Mappings tab.
- Click Add Mapping.
- Select the external IDP group from the directory. If directory browsing is enabled, you can search for groups directly. Otherwise, you will see only groups from users who have previously logged in.
- Select the RAMP application role to assign.
- Click Save.
Example Mappings
Section titled “Example Mappings”Here are common mapping patterns:
| External IDP Group | RAMP Role | Purpose |
|---|---|---|
RAMP-Admins | Administrator | Grant admin access to IT staff |
RAMP-Operators | GlobalInstanceExecutor | Allow operations team to execute all instances |
RAMP-Viewers | GlobalTemplateViewer | Give read-only access to all templates |
RAMP-Template-Editors | GlobalTemplateEditor | Allow engineers to edit all templates |
Release-Managers | GlobalInstanceHead | Grant full instance control to release managers |
QA-Team | GlobalTemplateApprover | Allow QA team to approve template versions |
Group Sync
Section titled “Group Sync”When directory browsing is enabled for an OIDC or LDAP provider, RAMP can synchronize group information from the external provider.
Automatic Sync
Section titled “Automatic Sync”Group memberships are automatically refreshed when a user logs in. RAMP reads the user’s current group memberships from the identity provider and updates the local cache accordingly.
Manual Sync
Section titled “Manual Sync”To refresh the full group list from the provider:
- Navigate to the tenant’s External IDP Groups tab.
- Click Sync to pull the latest groups from the identity provider.
- Review the updated group list.
Automatic Role Assignment
Section titled “Automatic Role Assignment”When a mapping is in place, the role assignment process is fully automatic:
- User logs in through the mapped identity provider.
- RAMP reads groups from the identity provider token or directory.
- Mappings are evaluated to determine which RAMP roles apply.
- Roles are assigned to the user’s session.
- User sees content based on their effective permissions.
If the user’s group membership changes in the external IDP (added to or removed from a group), the updated roles take effect the next time the user logs in and receives a new token.
Editing and Removing Mappings
Section titled “Editing and Removing Mappings”Editing a Mapping
Section titled “Editing a Mapping”To change the RAMP role associated with an external group:
- Navigate to the External IDP Mappings tab.
- Click on the mapping you want to modify.
- Change the RAMP role.
- Click Save.
Removing a Mapping
Section titled “Removing a Mapping”Removing a mapping stops the automatic role assignment for that external group. Users who previously received roles through the mapping will lose those roles on their next login.
- Navigate to the External IDP Mappings tab.
- Click Delete on the mapping you want to remove.
- Confirm the deletion.
Troubleshooting
Section titled “Troubleshooting”Roles Not Applying for External IDP Users
Section titled “Roles Not Applying for External IDP Users”If users from mapped groups are not receiving the expected roles:
- Verify the mapping — check that the external group name matches exactly.
- Check group membership — confirm the user is a member of the external group in the identity provider.
- Require re-login — role changes require a new token. Ask the user to log out and log back in.
- Check directory browsing — if using CachedOnly mode, the group may not be visible until a member has logged in.
External Groups Not Appearing
Section titled “External Groups Not Appearing”- Has the user logged in at least once? (Required for CachedOnly mode.)
- Is directory browsing enabled for the OIDC provider?
- Is the Admin API Endpoint configured correctly?
- Does the OAuth2 client have the necessary API permissions?
Next Steps
Section titled “Next Steps”After configuring IDP mappings, review provisioned members to see which external users have been automatically created in the tenant.