User Management Options
Option 1: Golf User Management
Use Golf’s built-in user management to invite and manage users directly:- Navigate to Settings > Users
- Click Invite user
- Enter the user’s email address
- Select a role (Admin or Member)
- Click Send invitation
| Role | Permissions |
|---|---|
| Admin | Manage users, gateways, and all settings |
| Member | View and use MCP servers from the dev portal |
Option 2: Connect to Your Identity Provider
For enterprise SSO, connect your organization to an external identity provider. This enables:- Single sign-on with your corporate credentials
- Automatic user provisioning
- Group synchronization for RBAC policies
- Navigate to Settings > Organization
- Find the SSO Configuration section
- Click Configure SSO to open the setup portal
- Follow the guided setup to connect your identity provider
Group Synchronization
When connected to an identity provider, Golf Gateway can automatically sync user groups for use in RBAC policies.How Group Sync Works
- Users authenticate via your identity provider
- Gateway retrieves the user’s group memberships
- Groups are available for Server RBAC and Capability RBAC policies
Configuring Group Sync
Group sync configuration depends on your identity provider:- Microsoft Entra ID
- Auth0 / Descope
When using Microsoft Entra ID for SSO, group synchronization is automatic via directory sync (SCIM). Groups are synced in real-time as changes occur in your directory.Setup:
- Navigate to Settings > Organization
- Click Configure SSO and complete the Entra ID setup
- Enable directory sync in the setup portal
- Select which groups to sync
Using Groups in RBAC
Once group sync is configured, use groups in your access policies: Server RBAC:- Set
allowed_groupsto restrict server access to specific groups - Set
denied_groupsto block specific groups from accessing a server
- Assign groups to individual tools, prompts, or resources
- Use annotation-based policies to apply group restrictions based on tool characteristics (read-only, destructive, etc.)
Troubleshooting
Users can’t sign in with SSO
- Verify SSO is correctly configured in Settings > Organization
- Check that the user exists in your identity provider
- Ensure the user’s email domain matches your organization’s verified domain
Groups not appearing in RBAC policies
- For Entra ID: Verify directory sync is enabled and the groups are selected for sync
- For Auth0/Descope: Check that Management API credentials are correctly configured
- Allow a few minutes for group changes to propagate
User has wrong permissions
- Verify the user’s group memberships in your identity provider
- Check that RBAC policies reference the correct group names (case-sensitive)
- Review the policy hierarchy: organization → gateway → server
Next Steps
- Configure Identity Provider - Set up IdP for MCP client authentication
- Set Up Server RBAC - Control server access based on groups
- Set Up Capability RBAC - Fine-grained tool permissions