Mapping Identity Provider Groups to Fiddler Teams
This guide describes how to configure automatic synchronization between your identity provider (IdP) groups and Fiddler teams using the Fiddler AuthN management console, enabling streamlined access control and role management.
Overview
Group synchronization automatically maps users from your IdP groups to corresponding Fiddler teams and roles. This eliminates the need for manual user role assignment, ensuring that access permissions remain synchronized with your organizational structure.
Supported Identity Providers:
Okta (OIDC and SAML)
Microsoft Entra ID (formerly Azure AD) with OIDC (requires additional configuration steps)
Ping Identity (SAML)
Prerequisites
Before configuring group synchronization, ensure you have:
SSO Integration: A working SSO integration with a supported identity provider
Administrator Access: Both identity provider admin access and Fiddler AuthN admin "Org Owner" permissions
Group Configuration: Proper group setup in your identity provider with appropriate naming conventions
User Assignment: Users assigned to relevant groups in your identity provider
Group Naming Convention
All identity provider groups must follow a set naming pattern to be recognized by Fiddler:
fiddler_<identifier>
The default group prefix is fiddler_
, but this can be customized during the configuration process.
Team Identifiers
Any other identifier creates a corresponding team in Fiddler:
fiddler_data_scientist
- Creates/assigns users to the "data_scientist" teamfiddler_ml_engineers
- Creates/assigns users to the "ml_engineers" teamfiddler_product_team
- Creates/assigns users to the "product_team" team
Group Naming Examples
fiddler_ORG_ADMIN
User assigned "Org Admin" role
fiddler_ORG_MEMBER
User assigned "Org Member" role
fiddler_data_scientist
User added to "data_scientist" team
fiddler_finance_team
User added to "finance_team" team
fiddler_
Invalid - Will be ignored
data_scientist
Invalid - Missing "fiddler_" prefix
Configuration Steps
Configure Identity Provider Groups
Access your identity provider's admin console
Create groups following the
fiddler_<identifier>
naming convention or choose your own prefix, e.g.company_fiddler_
Assign appropriate users to each group
Configure group claims/attributes in your SSO application
Enable Group Sync in Fiddler AuthN Console
Access Organization Settings:
Log into Fiddler with AuthN console "Org Owner" privileges
Navigate to the Organization tab at the top
Ensure that your organization is selected in the top left dropdown (this will never be "fiddler" which is reserved)
Locate the METADATA section

Configure Group Sync Settings:
Select the Edit button in the METADATA section
Configure these key-value pairs:
fiddler_group_prefix: Set the group prefix (defaults to
fiddler_
unless manually modified)fiddler_group_sync_enabled: Set to
true
Save your changes by selecting the Save disk icon adjacent to each key value pair

Configure Automatic Organization Role Mapping
Setting up automatic organization role mappings uses these additional metadata keys:
fiddler_org_admin_mapper: Custom mapping key for the Org Admin role
fiddler_org_member_mapper: Custom mapping key for Org Member role
To configure automatic role mapping:
In the METADATA section, add the mapper keys as needed
Set the values to match your identity provider's group naming convention, noting that the METADATA key values should not include the Fiddler group prefix, which is the default
fiddler_
in this exampleCreate a group in your IdP for Fiddler Org Admin users named
fiddler_org_admins
Set the
fiddler_org_admin_mapper
metadata key value toorg_admins
Create a group in your IdP for Fiddler Org Member users named fiddler_org_members
Set the
fiddler_org_member_mapper
metadata key value toorg_members
Save your changes by selecting the Save disk icon adjacent to each key value pair

Verify Configuration
Test Group Synchronization:
Log in with a test user who belongs to the mapped groups
Verify the user is assigned to the correct Fiddler roles/teams
Check that team memberships update when identity provider groups change
Confirm that new groups create corresponding Fiddler teams automatically
Advanced Configuration
Custom Group Prefixes
You can customize the group prefix if fiddler_
doesn't fit your naming conventions:
In the Organization METADATA section, update
fiddler_group_prefix
For example, set to
company_fiddler_
to require groups likecompany_fiddler_data_team
All group names in your identity provider must use your custom prefix
Team Hierarchy and Permissions
Automatic Team Creation
Teams are automatically created when users with new group mappings first log in
Team names match the identifier portion of the group name
Teams inherit default permissions, which can be customized through the Fiddler UI
Team Management:
Organization admins can modify team permissions through Fiddler settings
Project-specific access can be configured per team
Teams persist even if all members are removed
Troubleshooting
Common Issues
Groups Not Synchronizing
Verify Group Sync Enable: Check that
fiddler_group_sync_enabled
is set totrue
Check Group Names: Ensure groups follow the correct naming convention with your configured prefix
Validate Claims: Confirm your identity provider includes group claims in authentication tokens
Review Permissions: Verify your SSO application has appropriate permissions to read group membership
Users Not Assigned to Correct Teams
Group Membership: Confirm users are actually members of the expected groups in your identity provider
Name Matching: Ensure group names exactly match the expected format (case-sensitive)
Re-authentication: Users may need to log out and back in for group changes to take effect
Custom Role Mapping Issues
Mapper Configuration: Verify that custom role mapper keys are configured correctly in the METADATA section
Group Assignment: Ensure users are assigned to groups that match the custom mapper values
Best Practices
Identity Provider Management
Consistent Naming: Establish clear naming conventions for Fiddler-related groups
Group Documentation: Maintain documentation of group purposes and membership criteria
Regular Audits: Periodically review group memberships and access levels
Change Management: Implement processes for group creation, modification, and deletion
Fiddler Team Organization
Logical Grouping: Align Fiddler teams with your organizational structure and project needs
Permission Planning: Design team permissions to match job functions and access requirements
Scalability: Consider how your team structure will scale as your organization grows
Security Considerations
Least Privilege: Apply the principle of least privilege when designing group access levels
Regular Reviews: Conduct periodic access reviews to ensure appropriate permissions
Separation of Duties: Consider separating administrative and operational roles
Audit Trails: Monitor group membership changes and access patterns
Getting Help
For additional assistance with group synchronization:
Organization Settings: Check the Organization METADATA section for configuration details
Identity Provider Support: Consult your identity provider's documentation for group configuration
Fiddler Support: Contact your Fiddler representative with group sync configuration details
Testing Environment: Use a test environment to validate group sync before production deployment
Related Documentation
Role-Based Access Control - Understanding Fiddler roles and permissions
Okta OIDC SSO Integration - Okta-specific group sync setup
Microsoft Entra ID OIDC SSO Integration - Entra ID group sync configuration
Ping Identity SAML SSO Integration - Ping Identity group sync setup
General SSO Authentication Guide - Overview of SSO concepts
❓ Questions? Talk to a product expert or request a demo.
💡 Need help? Contact us at [email protected].