Skip to main content

SSO Role Mapping & Permissions

Auto assigning roles to SSO users based on group permissions

Updated today

BetaTesting can automatically assign roles to SSO users based on their group memberships in your identity provider (IdP). This ensures your team members get the right level of access in BetaTesting without manual configuration.

How Role Mapping Works

When a user logs in via SSO, BetaTesting determines their role by checking which IdP groups they belong to. Your BetaTesting account manager configures role mapping rules that link specific IdP group names to BetaTesting roles.

Example: If your IdP has a group called "BT-Admins" and a mapping rule assigns that group to the BetaTesting Admin role, any user who belongs to "BT-Admins" will automatically receive Admin access in BetaTesting.

Available BetaTesting Roles

Role mappings can assign users to the following BetaTesting roles:

Role

Access Level

Description

Full Admin

Company-wide

Full management access to all tests, settings, and team members across the entire company account

Support

Company-wide

Can manage tests and tester communications, but cannot modify company settings or billing

Read-Only

Company-wide

View-only access to all tests and data across the company

Group Admin

Group-scoped

Full Admin access, but limited to tests within a specific test group

Group Support

Group-scoped

Support access limited to tests within a specific test group

Group Read-Only

Group-scoped

Read-only access limited to tests within a specific test group

Tester

N/A

Default role -- the user participates in tests as a tester, with no company admin access

How Groups Are Sent to BetaTesting

There are two ways IdP group information reaches BetaTesting, depending on whether you have SCIM enabled:

Without SCIM (SSO Only)

Group memberships are sent as claims in the SAML assertion each time the user logs in. You configure this by adding a Group Attribute Statement in your SAML app (see the SSO setup guides for details).

  • Roles are recalculated on every login

  • Changes to group membership in your IdP take effect the next time the user logs in

With SCIM

Group memberships are pushed to BetaTesting via the SCIM Groups API and stored persistently. When the user logs in via SSO, BetaTesting uses the stored SCIM group memberships for role resolution.

  • Roles are updated in real-time as your IdP pushes group changes via SCIM

  • Users don't need to log out and back in for role changes to take effect

  • This is the recommended approach for organizations that need tight access control

Setting Up Role Mappings

Role mappings are configured by your BetaTesting account manager. To set up mappings:

  1. Decide which IdP groups map to which BetaTesting roles

    For example:

IdP Group Name

BetaTesting Role

Scope

BT-Admins

Full Admin

Company-wide

BT-Support

Support

Company-wide

BT-Viewers

Read-Only

Company-wide

Project-Alpha-Team

Group Admin

Specific test group

  1. Share this mapping with your BetaTesting account manager

  2. Your account manager configures the rules in BetaTesting, linking each group name to the corresponding role

Priority and Conflict Resolution

When a user belongs to multiple mapped groups, BetaTesting resolves conflicts using a priority system:

  • Each mapping rule has a priority number (lower number = higher priority)

  • The highest-priority matching rule determines the user's role

  • If no mapping rules match any of the user's groups, the user receives the default role configured for your SSO connection (typically Tester)

Example: A user belongs to both "BT-Admins" (priority 1, maps to Admin) and "BT-Support" (priority 2, maps to Support). The Admin role wins because it has a higher priority.

Default Role

Every SSO connection has a default role that applies when:

  • The user doesn't belong to any mapped groups

  • No mapping rules match the user's group memberships

  • Group attributes are not configured in your IdP

The default role is typically Tester, meaning users without a specific group mapping will have tester-level access. Your BetaTesting account manager can change this default if needed.

Group-Scoped Access

For organizations that organize their BetaTesting work into test groups, role mappings can be scoped to specific groups:

  • Company-wide roles give access across all tests in the company

  • Group-scoped roles restrict access to tests within a specific test group

This is useful when different teams within your organization need access to different subsets of your BetaTesting projects.

Best Practices

  1. Use descriptive group names - Name your IdP groups clearly (e.g., BetaTesting-Admins rather than Group1) to make mappings easy to understand

  2. Start with the default role - Keep the default role as Tester so unrecognized users get the lowest access level

  3. Test with a dedicated user - Before rolling out to your entire team, test role mapping with a single user to verify correct assignment

  4. Keep groups consistent - The group names in your IdP must match the role mapping configuration exactly (case-sensitive). Any changes to group names in your IdP will need to be updated in BetaTesting

  5. Use SCIM for real-time sync - If you need role changes to take effect immediately (without the user logging out and back in), enable SCIM provisioning

Making Changes

To update role mappings:

  • Add a new mapping - Contact your BetaTesting account manager with the IdP group name and desired BetaTesting role

  • Change a mapping - Contact your account manager to update the role for an existing group

  • Remove a mapping - Contact your account manager to remove a mapping; affected users will fall back to the default role on their next login (SSO only) or immediately (SCIM)

Did this answer your question?