Teams
Organize users into logical groups and control their access to MCP Servers and Agent Personas. Teams integrate with your Identity Provider (IdP) to automatically assign users based on SSO group membership, enabling scalable role-based access control.
Overview
Teams provide a layer of access control that determines which MCP Servers and Agent Personas users can access. Key concepts:
- SSO Group Mapping: Automatically assign users to teams based on their IdP group membership
- Resource Assignment: Control which MCP Servers and Personas each team can access
- Public by Default: Resources without team assignments remain accessible to all authenticated users
- Intersection Logic: When a Persona is assigned to multiple teams, only shared resources are accessible
Key Features
SSO Group Integration
Map IdP groups directly to AI Gateway teams. When users log in, their group memberships are automatically evaluated and team access is granted in real-time.
| IdP Provider | Group Claim | Setup Guide |
|---|---|---|
| Microsoft Entra ID | groups claim in SAML/OIDC | Configure Entra Group Claims |
| Google Workspace | Groups attribute in SAML | Configure Google Workspace Group Claims |
| Okta | Group membership | Coming soon |
Access Control Model
Teams use a "public by default" model with flexible access control:
| Resource Configuration | Visibility |
|---|---|
| No teams assigned | Public - visible to all authenticated users |
| Teams assigned | Restricted - visible only to team members |
Bidirectional Sync
Team assignments are automatically synchronized:
- Assign MCP Servers to teams from either the Team detail page or MCP Server settings
- Assign Personas to teams from either the Team detail page or Persona creation wizard
- Removing a resource automatically updates all related team assignments
Use Cases
Department-Based Access
Create teams for each department with access to relevant tools:
Example: Engineering Team
- Access to GitLab, Jira, and internal DevOps MCP servers
- Engineering SSO group:
engineering@company.comorEngineering Department
Example: Sales Team
- Access to Salesforce, HubSpot, and CRM MCP servers
- Sales SSO group:
sales@company.comorSales Department
Project-Based Access
Create temporary teams for cross-functional projects:
Example: Product Launch Team
- Members from Engineering, Marketing, and Sales
- Access to shared project tools and documentation servers
- Multiple SSO groups can map to the same team
Compliance & Security
Restrict sensitive tools to authorized personnel:
Example: Security Operations Team
- Access to security monitoring and incident response MCP servers
- Strict SSO group membership controlled by IT/Security admins
Creating a Team
Prerequisites
- Super Admin, Tenant Admin, or Platform Operator role
- SSO configured with your Identity Provider
- IdP groups created for team membership (see IdP Setup Guides)
Step 1: Navigate to Teams
- Log in to the Cequence AI Gateway portal
- Click Access → Teams in the left navigation
- Click Create Team
Step 2: Configure Team Details
- Enter a Team Name (required)
- Add a Description to explain the team's purpose (optional)
- Add SSO Groups that should be mapped to this team:
- Type the exact group name or ID from your IdP
- Press Enter to add each group
- Multiple groups can be added (users matching ANY group join the team)
The SSO group name must match exactly what your IdP sends in the token. See the IdP Setup Guides for instructions on finding or configuring group names for your provider.
Step 3: Click Create
Your team is created and ready for resource assignment. Users with matching SSO groups will automatically join on their next login.
Assigning Resources to Teams
Assigning MCP Servers
From the Team Detail Page:
- Navigate to Access → Teams
- Click on the team name to open details
- Go to the MCP Servers tab
- Click Assign Servers
- Select the MCP servers to assign
- Click Save
From the MCP Server Settings:
- Navigate to MCP Registry
- Click on an MCP server
- Go to Settings → Access Control
- Select teams that should have access
- Click Save
Assigning Agent Personas
During Persona Creation:
- In the Create Agent Persona wizard, Step 1 (Basic Info)
- Select one or more teams in the Teams dropdown
- Continue with persona creation
From the Team Detail Page:
- Navigate to Access → Teams
- Click on the team name
- Go to the Agent Personas tab
- Click Assign Personas
- Select the personas to assign
- Click Save
When creating a Persona assigned to multiple teams, only MCP Servers accessible by ALL selected teams will be available for tool selection. This prevents unauthorized access escalation.
Example: If you select both "Engineering" and "Design" teams for a Persona:
- Only MCP Servers that BOTH teams can access appear in tool selection
- Public MCP Servers (no team assignment) are always available
Access Control Behavior
For Employees (Non-Admin Users)
| Scenario | MCP Server Access | Persona Access |
|---|---|---|
| User in no teams, no teams configured | All resources (graceful adoption) | All resources |
| User in no teams, teams configured | Public resources only | Public resources only |
| User in Team A | Public + Team A resources | Public + Team A resources |
| User in Teams A and B | Public + Team A + Team B resources | Public + Team A + Team B resources |
For Admins
Admins (Super Admin, Tenant Admin, Platform Operator, Security Admin, Network Admin) bypass team-based access control and can see all resources regardless of team membership.
Managing Teams
Viewing Team Members
Team membership is dynamic based on SSO group matching:
- Navigate to Access → Teams
- Click on a team name
- View the SSO Mappings tab to see configured group mappings
- Current members are determined at login time based on IdP groups
Unlike traditional group systems, team membership is evaluated in real-time during authentication. Changes to IdP group membership take effect on the user's next login.
Editing a Team
- Navigate to Access → Teams
- Click on the team name
- Click Edit (pencil icon)
- Modify name, description, or SSO mappings
- Click Save
Deleting a Team
- Navigate to Access → Teams
- Click on the team name
- Click Delete
- Confirm the deletion
When a team is deleted:
- Users lose access to team-restricted resources
- MCP Servers previously assigned to the team become public (if no other teams assigned) or remain accessible only to remaining teams
- The team is automatically removed from all assigned Personas
IdP Setup Guides
Configure your Identity Provider to send group claims that AI Gateway can use for team mapping:
Microsoft Entra ID (Azure AD)
Configure group claims in your Entra ID SAML/OIDC setup to include user's group memberships in the authentication token.
Configure Microsoft Entra Group Claims →
Google Workspace
Configure group membership in your Google Workspace SAML app to include user's group memberships in the authentication response.
Configure Google Workspace Group Claims →
Okta
Coming soon - Configure Okta group membership claims for team mapping.
Best Practices
Security
- Use SSO groups: Leverage your existing IdP groups rather than manual membership
- Principle of least privilege: Only assign teams to resources they need
- Regular audits: Review team assignments and SSO mappings periodically
- Separate sensitive resources: Create dedicated teams for compliance-sensitive tools
Organization
- Consistent naming: Use clear, descriptive team names (e.g., "Engineering - Platform Team")
- Document SSO mappings: Record which IdP groups map to which teams
- Align with org structure: Mirror your organizational hierarchy for intuitive access control
Performance
- Minimize team sprawl: Consolidate teams where possible to reduce complexity
- Use public access for shared resources: Don't create teams just for widely-used resources
Troubleshooting
Users Not Seeing Expected Resources
Issue: User should have access but can't see MCP servers or Personas
Solution:
- Verify the user's IdP groups include the team's SSO mapping
- Check that the resource is assigned to the user's team
- Have the user log out and log back in (membership is evaluated at login)
- Verify the SSO group name matches exactly (case-sensitive)
SSO Groups Not Working
Issue: Team SSO mapping configured but users aren't joining
Solution:
- Verify your IdP is configured to send group claims (see IdP Setup Guides)
- Check the exact group name/ID your IdP sends
- Ensure the group claim attribute is correctly mapped in your SSO configuration
- Verify the SSO mapping rule is enabled (not disabled)
Persona Tool Selection Empty
Issue: When creating a Persona with teams selected, no MCP servers appear
Solution:
- This occurs when selected teams have no common MCP Server access (intersection logic)
- Verify at least one MCP Server is assigned to ALL selected teams
- Public MCP Servers should always appear - check if any exist
- Consider reducing the number of teams assigned to the Persona
Admin Can't See Team Restrictions
Issue: Admin user sees all resources regardless of team settings
Solution: This is expected behavior. Admins bypass team-based access control by design. To test team restrictions, use a non-admin account.
Getting Help
If you encounter issues not covered in this documentation:
- Support: Contact your organization's administrator
- Community: Reach out to Cequence support