Provisioned Members
When external identity provider users (LDAP, OIDC, or Windows Auth) log in to RAMP for the first time, they are automatically provisioned as tenant members. The Provisioned Members view gives Tenant Administrators visibility into these auto-created user accounts.
How Auto-Provisioning Works
Section titled “How Auto-Provisioning Works”The provisioning process is automatic and transparent:
- A user authenticates through an external identity provider configured for the tenant.
- RAMP verifies the authentication and reads the user’s profile information (name, email, groups) from the identity provider.
- If the user does not yet exist in the RAMP tenant, a new member record is created automatically.
- The user is associated with the identity provider connection they used to log in.
- If any IDP group mappings match the user’s groups, the corresponding RAMP roles are assigned.
Viewing Provisioned Members
Section titled “Viewing Provisioned Members”- Navigate to Tenants and select the tenant.
- Open the Provisioned Members tab.
- The list displays all users who have been automatically provisioned, along with:
- User display name and email
- The identity provider they authenticated through
- When they were first provisioned
- Their current status (active or inactive)
Managing Provisioned Members
Section titled “Managing Provisioned Members”While provisioned members are created automatically, Tenant Administrators can still manage them after provisioning.
Viewing Details
Section titled “Viewing Details”Click on a provisioned member to view their full profile, including:
- The identity provider connection they used
- Their group memberships from the external IDP
- Any RAMP roles assigned through IDP mappings or manual assignment
Deactivating a Provisioned Member
Section titled “Deactivating a Provisioned Member”If a user should no longer have access to the tenant, you can deactivate their account:
- Click on the provisioned member.
- Toggle their status to Inactive.
- Click Save.
Assigning Additional Roles
Section titled “Assigning Additional Roles”Provisioned members can receive roles in two ways:
- Automatically — through IDP group mappings that match the user’s external group memberships.
- Manually — by navigating to the user’s role assignments and adding roles directly.
Provisioning with Directory Browsing
Section titled “Provisioning with Directory Browsing”When directory browsing is enabled for an OIDC provider, Tenant Administrators gain additional capabilities:
- Search for users who have not yet logged in and view their profile information from the identity provider.
- Pre-assign roles by mapping IDP groups before users log in, so they receive the correct permissions on their first access.
- Browse group memberships to understand the organizational structure before provisioning occurs.
Without directory browsing (CachedOnly mode), only users who have previously logged in appear in RAMP.
Provisioned Members vs. RAMP Internal Users
Section titled “Provisioned Members vs. RAMP Internal Users”| Aspect | Provisioned Members | RAMP Internal Users |
|---|---|---|
| Creation | Automatic on first login | Manual by Tenant Administrator |
| Authentication | External IDP (LDAP, OIDC, Windows) | RAMP database (username/password) |
| Password management | Managed by external IDP | Managed within RAMP |
| Group membership | Synced from external IDP | Assigned manually in RAMP |
| Role assignment | Via IDP mappings and manual | Manual only |
Troubleshooting
Section titled “Troubleshooting”User Logged In but Not Appearing in Provisioned Members
Section titled “User Logged In but Not Appearing in Provisioned Members”- Verify the user authenticated through an external IDP connection for this tenant.
- Check that the authentication provider is correctly configured for the tenant.
- Review the authentication provider logs for any errors during the provisioning step.
Provisioned Member Has No Roles
Section titled “Provisioned Member Has No Roles”- Check if any IDP group mappings are configured for the tenant.
- Verify the user’s group memberships in the external identity provider.
- Ensure the external group names in the mappings match exactly with the provider.
Next Steps
Section titled “Next Steps”To manage tenant-level settings such as name, slug, and status, see Tenant Settings.