Managing Security Groups
Security Groups (SG) provide an efficient way to assign access to resources on your network. Security Groups require Lightweight Directory Access Protocol (LDAP) and Microsoft Active Directory (AD) groups. bipp’s Security Group enables integration of the Active Directory Security Group for the bipp platform.

Security Groups Overview
- Active Directory: learn about Active Directory groups
- Authentication: see the bipp authentication process
- Request Processing: understand the request process flow
Active Directory
Before you create a Security Group, it is important to understand Active Directory groups.
Active Directory groups collect user accounts, computer accounts, and other groups into manageable units. Working with groups simplifies network maintenance and administration.
Active Directory uses two types of groups:
- Distribution Groups are used with email applications to send email to collections of users. Distribution Groups are not listed in Discretionary Access Control Lists (DACLs).
- Security Groups - are used to assign permissions to shared resources.
There are two major functions for security groups:
1. Assign user rights to security groups in Active Directory
User rights are assigned to a Security Group to determine what actions group members can perform in the domain or forest. User rights are automatically assigned to some security groups when Active Directory is installed, to help administrators define a user’s administrative role in the domain.
For example, a user who is added to the Backup Operators group in Active Directory has the ability to back up and restore files and directories located on each domain controller in the domain.
2. Assign permissions to security groups for resources
Permissions are different from user rights. Permissions are assigned to the Security Group for the shared resource. They determine who can access the resource and the level of access, such as Full Control. Administrators assign the resource permissions to a security group rather than to individual users. Each account added to a group receives/inherits the rights that are assigned to that group in Active Directory, and the user receives the permissions defined for that group.
Authentication
Here is the process when you use LDAP or SSO authentication with bipp Security groups:
- The bipp Identity and Access Management (IAM) module receives a list of all the LDAP/AD groups for the user, from either the LDAP server or the respective Identity Provider (IdP).
- The IAM module searches for matching security groups configured in the tenant.
- For every matching security group, the IAM module finds the mapped Group and verifies the user is a member.
If the user is member, no further action is required. For new users, the user is automatically added to the bipp user Group.
Request Processing
Security Group membership verification happens at every API call. If a user is a member of a user group and the user’s security group membership is not found, requests fail with an authorization error.
This situation occurs if the user’s security group membership has been revoked. In this case, the user’s membership from the User Group is not automatically removed.

Adding Security Groups
-
Click Settings > Security Groups from the main menu. The Security Groups pane opens showing the list of defined Security Groups.
-
Click New Security Group.
-
Enter the Security group name and a Description.
The Security group name must match the actual LDAP / Active Directory group name.
-
Click Save.
Once you have created a Security group, you can map it to your defined Tenant Groups. The resource level permission/role assignments are performed in the platform using the bipp Groups, which mirror the LDAP / AD groups through the mapped Security Group. Security Groups act as the source of authorization when enabled in a tenant.
To map a Security Group to a group:
- Click Groups from the main menu. The Groups pane opens.
- Click
to the right of the name.
- Click Security Group.
Groups can only be mapped to a single Security Group. You must delete the currently associated security group before selecting a new one. Click
the icon to unmap the existing group.
- Select the Security Group from the list. Security Groups are defined from Home > Settings > Security Groups.
- Click Update.
- After the security groups are created, map those groups to the User Groups (UG) of the Tenant.
- You can map one SG to only one UG. Actual resource level permission/role assignments are performed in the platform using the User Groups which are a mirror of the actual LDAP / AD groups through the Security Groups. Security Groups act as the source of authorization when enabled in a tenant.
Editing Security Groups
- Click Settings > Security Groups from the main menu. The Security Groups pane opens showing the list of defined Security Groups.
- Click
to the right of the security group Name and select Edit.
- Modify the security group name and/or description.
- Click Update.
Deleting Security Groups
- Click Settings > Security Groups from the main menu. The Security Groups pane opens showing the list of defined Security Groups.
- Click
to the right of the security group Name and select Delete.
- Click Delete again to confirm the removal of the security group.
IN THIS PAGE