IdP delegation overview
IdP delegation lets you map a Seqera team to a group in your identity provider (IdP). After you delegate a team, the IdP becomes the sole authority for membership: every time a user signs in through SSO, Seqera reads the groups claim from their token and updates the user's delegated-team memberships to match.
IdP delegation is available on Cloud Pro organizations with an active SSO connection. To set up SSO before configuring delegation, see Single sign-on (SSO).
Cloud Basic organizations see an upgrade prompt when an owner attempts to set the IdP Group field on a team. To use IdP delegation, upgrade to Cloud Pro and configure SSO first.
How it works
Delegation has three components that you configure once per organization.
1. The IdP group catalog
Seqera maintains a per-organization catalog of IdP groups. The catalog populates the IdP Group dropdown on the team form, so organization owners can select an IdP group when delegating a team. Groups appear in the catalog as soon as they're synced or entered, before any user has signed in.
The catalog is populated in one of two ways:
- SCIM 2.0 push: Your IdP pushes its group directory to Seqera's per-organization SCIM endpoint. Used with Okta and Entra ID.
- Manual entry: For IdPs that don't support SCIM group sync (Google Workspace, Keycloak), an organization owner enters group identifiers in the catalog UI.
A manually-entered group is automatically promoted to SCIM-managed if your IdP later pushes the same group. See Manage your IdP group catalog.
2. The groups claim
At login, Seqera reads the user's IdP claims to decide which delegated teams they belong to. The groups claim must be present in the token issued by Auth0, and its values must match the group identifiers in your catalog.
This requires an attribute mapping on the Auth0 SSO connection. See Auth0 connection mapping.
3. The team's IdP Group field
When an organization owner sets the IdP Group field on a team, the team becomes delegated. This:
- Marks the team as "Managed in IdP" in the teams list.
- Hides the Add member and Remove member controls.
- Blocks team deletion until the field is cleared.
- Leaves the team's name, description, avatar, and workspace assignments editable.
The same IdP group can be assigned to more than one team. Each team can reference exactly one IdP group. See Delegate a team to an IdP group.
What happens at login
On every SSO login, Seqera evaluates each delegated team in your organization against the user's groups claim:
- Match found: The user is added to the Team if they aren't already a member.
- No match: If the user was previously a member they're removed from the team.
- No match: If the user was never a delegation-driven member there is no change.
Manual assignments to non-delegated teams are never touched by this evaluation. Users added manually to a team with no IdP Group value keep their membership regardless of their IdP claims.
If the user's token has no groups claim or the claim is malformed, it's treated as no group memberships and revokes any delegation-driven team memberships the user previously had.
Audit trail
Delegation activity is recorded in the audit log:
- Setting, changing, or clearing the IdP Group field on a team produces a
team_updatedevent with the previous and new value. - Each delegation-driven membership change at login produces a
team_member_addedorteam_member_removedevent. - Group catalog operations (create, rename, delete) produce
scimGroupCreated,scimGroupUpdated, andscimGroupDeletedevents so you can correlate catalog changes with downstream membership changes.
SCIM-originated entries - operations performed by your IdP's provisioning agent against Seqera's SCIM endpoint - are attributed to a System operator rather than to a named administrator, because they authenticate with a SCIM bearer token. To correlate a SCIM event with a specific administrator action in your IdP, match by displayName and timestamp against your IdP's provisioning logs.
Set up delegation
Complete these steps in order. Each step links to a dedicated guide.
- Configure SSO for your organization if you haven't already.
- Populate the IdP group catalog. Choose SCIM push or manual entry depending on your IdP.
- Map your IdP's
groupsclaim through Auth0 so it reaches Seqera at login. - Delegate a team to an IdP group.