Prerequisites
- Control Plane
- YAML
- Golf Control Plane account with Admin role
- Identity provider configured with group sync enabled (Configure SSO)
- MCP server registered in Control Plane
How it works
Server RBAC controls access to entire MCP servers based on user group membership. Users must be in an allowed group (or not in a denied group) to access the server.Understanding the 3-layer policy hierarchy
Golf Gateway uses a 3-layer policy hierarchy where policies at each level can override or inherit from the level above:| Layer | Where Configured | Scope | Inheritance |
|---|---|---|---|
| Organization | Control Plane > Settings > Policies | All gateways & servers | Base defaults |
| Gateway | Control Plane > Gateway > Policies | All servers on this gateway | NULL = inherit from org |
| Server | Control Plane > Server > Policies | Single MCP server | Most specific |
- Boolean flags (rbac_enabled, scrubbing_enabled): OR logic - if ANY layer enables, it’s enabled
- Allowed groups: INTERSECTION - user must be in allowed groups at ALL levels
- Denied groups: UNION - user denied if in denied groups at ANY level
RBAC modes
| Mode | Behavior |
|---|---|
| Allow (default) | Only users in allowed_groups can access |
| Deny | Users in denied_groups are blocked, others allowed |
Configure server RBAC
- Control Plane
- YAML
Organization defaults:
- Go to Settings > Policies
- Find the Server Access section
- Enable RBAC and set default mode (Allow/Deny)
- Add default allowed or denied groups
- Click Save
- Go to Gateways > select a gateway > Policies
- Override organization defaults as needed
- Click Save
- Go to MCP Servers > select a server
- Open the Policies tab
- Enable the Access policy
- Select mode: Allowlist or Denylist
- Add groups from your identity provider
- Click Save
Configure multiple servers
Different servers can have different access requirements:- Control Plane
- YAML
Configure each server individually through MCP Servers > server > Policies.
Verify RBAC is working
- Authenticate as a user NOT in the allowed groups
- Connect your MCP client (Claude Desktop, Cursor, etc.) to the gateway
- Try to use any tool from the protected server
- Verify you receive an access denied error
- Check audit log in Admin Portal > Logs / Sessions
Troubleshooting
- Access denied unexpectedly: Verify the user’s identity provider groups match at least one of the allowed groups configured in the server’s Access policy
- Groups not appearing: Verify management API credentials for your identity provider
- Inherited policy blocking: Check organization and gateway policies - the most restrictive setting wins
Related guides
- Set Up Capability RBAC - Fine-grained tool access
- Configure SSO - Identity provider setup