Configure Groq enterprise SSO, role-based access control, and organization management. Use when implementing SSO integration, configuring role-based permissions, or setting up organization-level controls for Groq. Trigger with phrases like "groq SSO", "groq RBAC", "groq enterprise", "groq roles", "groq permissions", "groq SAML".
Use the skills CLI to install this skill with one command. Auto-detects all installed AI assistants.
Method 1 - skills CLI
npx skills i jeremylongshore/claude-code-plugins-plus-skills/plugins/saas-packs/groq-pack/skills/groq-enterprise-rbacMethod 2 - openskills (supports sync & update)
npx openskills install jeremylongshore/claude-code-plugins-plus-skillsAuto-detects Claude Code, Cursor, Codex CLI, Gemini CLI, and more. One install, works everywhere.
Installation Path
Download and extract to one of the following locations:
No setup needed. Let our cloud agents run this skill for you.
Select Provider
Select Model
Best for coding tasks
No setup required
Configure enterprise-grade access control for Groq integrations.
| Role | Permissions | Use Case |
|---|---|---|
| Admin | Full access | Platform administrators |
| Developer | Read/write, no delete | Active development |
| Viewer | Read-only | Stakeholders, auditors |
| Service | API access only | Automated systems |
enum GroqRole {
Admin = 'admin',
Developer = 'developer',
Viewer = 'viewer',
Service = 'service',
}
interface GroqPermissions {
read: boolean;
write
// Groq SAML setup
const samlConfig = {
entryPoint: 'https://idp.company.com/saml/sso',
issuer: 'https://groq.com/saml/metadata',
cert: process.env.SAML_CERT,
callbackUrl: 'https://app.yourcompany.com/auth/groq/callback',
};
// Map IdP groups to Groq roles
const groupRoleMapping: Record<string, GroqRole> =
import { OAuth2Client } from '@groq/sdk';
const oauthClient = new OAuth2Client({
clientId: process.env.GROQ_OAUTH_CLIENT_ID!,
clientSecret: process.env.GROQ_OAUTH_CLIENT_SECRET!,
redirectUri: 'https://app.yourcompany.com/auth/groq/callback',
scopes: ['read', 'write'],
});interface GroqOrganization {
id: string;
name: string;
ssoEnabled: boolean;
enforceSso: boolean;
allowedDomains: string[];
defaultRole: GroqRole;
}
async function createOrganization
function requireGroqPermission(
requiredPermission: keyof GroqPermissions
) {
return async (req: Request, res: Response, next: NextFunction) => {
const user = req.user as { groqRole
interface GroqAuditEntry {
timestamp: Date;
userId: string;
role: GroqRole;
action: string;
resource: string;
success: boolean;
ipAddress: string;
}
Map organizational roles to Groq permissions.
Set up SAML or OIDC integration with your IdP.
Add permission checks to API endpoints.
Track all access for compliance.
| Issue | Cause | Solution |
|---|---|---|
| SSO login fails | Wrong callback URL | Verify IdP config |
| Permission denied | Missing role mapping | Update group mappings |
| Token expired | Short TTL | Refresh token logic |
| Audit gaps | Async logging failed | Check log pipeline |
if (!checkPermission(user.role, 'write')) {
throw new ForbiddenError('Write permission required');
}For major migrations, see groq-migration-deep-dive.