granola-enterprise-rbac

0
0
Source

Enterprise role-based access control for Granola. Use when configuring user roles, setting permissions, or implementing access control policies. Trigger with phrases like "granola roles", "granola permissions", "granola access control", "granola RBAC", "granola admin".

Install

mkdir -p .claude/skills/granola-enterprise-rbac && curl -L -o skill.zip "https://mcp.directory/api/skills/download/6895" && unzip -o skill.zip -d .claude/skills/granola-enterprise-rbac && rm skill.zip

Installs to .claude/skills/granola-enterprise-rbac

About this skill

Granola Enterprise RBAC

Overview

Configure role-based access control for Granola with SSO group mapping, per-workspace permissions, sharing policies, and audit logging. Granola's role hierarchy controls who can create, share, and manage meeting notes across the organization.

Prerequisites

  • Granola Enterprise plan ($35+/user/month)
  • Organization admin access
  • SSO configured (Okta, Azure AD, or Google Workspace)
  • SCIM provisioning enabled (recommended for automated role assignment)

Instructions

Step 1 — Understand the Role Hierarchy

Organization Owner (1-2 people)
  │   Full control: billing, SSO, org settings, all workspaces
  │
  ├── Workspace Admin (per department)
  │     Manage workspace: members, integrations, settings
  │     All member capabilities
  │
  ├── Team Lead
  │     View team analytics, manage folder structure
  │     All member capabilities
  │
  ├── Member (default role)
  │     Create notes, share internally, use integrations
  │
  ├── Viewer
  │     Read-only access to shared notes
  │     Cannot create or record meetings
  │
  └── Guest (external)
      Single workspace access, read-only
      Time-limited (30-day default expiration)

Step 2 — Permission Matrix

PermissionOwnerWS AdminLeadMemberViewerGuest
Record meetingsYesYesYesYesNoNo
Create notesYesYesYesYesNoNo
Share internallyYesYesYesYesNoNo
Share externallyYesYesPolicyPolicyNoNo
View shared notesYesYesYesYesYesYes
Manage integrationsYesYesNoNoNoNo
Manage membersYesYesNoNoNoNo
View analyticsYesYesYesNoNoNo
Configure retentionYesYesNoNoNoNo
Manage billingYesNoNoNoNoNo
Configure SSO/SCIMYesNoNoNoNoNo

Step 3 — Map SSO Groups to Roles

Configure in Organization Settings > Security > SSO > Group Mapping:

SSO Group (IdP)Granola WorkspaceGranola Role
engineering-allEngineeringMember
engineering-leadsEngineeringAdmin
sales-teamSalesMember
sales-managersSalesAdmin
product-teamProductMember
hr-teamHRMember
hr-directorsHRAdmin
executivesExecutiveAdmin
contractors-engEngineeringGuest

Multi-workspace membership: A user can belong to multiple workspaces with different roles:

  • Sarah Chen: Engineering (Member) + Product (Admin) + Executive (Viewer)
  • Mike Johnson: Sales (Admin) + Engineering (Guest for cross-team visibility)

Step 4 — Configure Sharing Policies

Set per-workspace sharing rules to control data flow:

Standard workspaces (Engineering, Product, Sales):

Workspace Settings > Sharing:
  Internal sharing: Automatic within workspace members
  Cross-workspace: Allowed with admin approval
  External sharing: Allowed with link expiration (30 days)
  Public links: Disabled

Confidential workspaces (HR, Executive):

Workspace Settings > Sharing:
  Internal sharing: Manual only (no auto-share)
  Cross-workspace: Disabled
  External sharing: Disabled
  Public links: Disabled
  Note visibility: Creator + explicitly added viewers only

Step 5 — Implement Least Privilege

Follow the principle of least privilege for role assignments:

  1. Default new users to Member — sufficient for 90% of use cases
  2. Promote to Admin only for workspace managers — IT leads, department heads
  3. Use Viewer for stakeholders who need to read notes but not create them
  4. Time-limit Guest access — 30-day default, renew explicitly
  5. Review access quarterly:
## Quarterly Access Review Checklist

- [ ] Pull current user list: Settings > Team
- [ ] Verify each user's role matches current job function
- [ ] Deactivate users who have left the organization
- [ ] Downgrade over-privileged users (Admin → Member where appropriate)
- [ ] Remove expired Guest accounts
- [ ] Verify SSO group mappings match current org chart
- [ ] Review sharing policy compliance per workspace
- [ ] Check audit logs for unusual access patterns

Step 6 — Enable Audit Logging

Enterprise audit logging captures:

EventWhat's Logged
User loginWho, when, from where (IP)
Note createdCreator, meeting, workspace
Note sharedSharer, recipient, method (Slack/Notion/link)
Note exportedWho exported, which note
Role changedAdmin, user affected, old role → new role
Integration connected/disconnectedWho, which integration
Workspace settings changedAdmin, what changed

Access audit logs: Organization Settings > Security > Audit Log

Export audit logs for SIEM integration (Enterprise):

  • Granola can export audit events to external systems
  • Contact Granola support for Splunk/Datadog/SIEM integration

Step 7 — Handle User Lifecycle

Onboarding:

  1. User added to SSO group → SCIM provisions account → JIT assigns workspace + role
  2. First login: SSO authenticates, Granola provisions based on group mapping
  3. User can immediately record meetings in assigned workspaces

Role change:

  1. Update SSO group membership in IdP
  2. SCIM sync updates Granola role (within sync interval, typically 1-15 min)
  3. Or manually: Workspace Settings > Members > change role

Offboarding:

  1. Disable user in IdP → SCIM deactivates Granola account
  2. User loses access immediately
  3. Their shared notes remain visible to workspace members
  4. Their private notes are inaccessible (retained per retention policy)
  5. Reassign ownership of shared folders if needed

Output

  • Role hierarchy defined and documented
  • SSO group mappings configured for automated provisioning
  • Per-workspace sharing policies enforced
  • Audit logging enabled with SIEM export (if applicable)
  • User lifecycle procedures (onboard/offboard) established
  • Quarterly access review cadence scheduled

Error Handling

ErrorCauseFix
User can't access workspaceWrong SSO groupVerify IdP group membership
External sharing blocked unexpectedlyWorkspace policy overrideReview workspace sharing settings
Guest access expired30-day time limitRe-invite the guest or extend expiration
SCIM sync delayedIdP sync interval too longTrigger manual sync in IdP, or adjust interval
Orphaned accounts after terminationSCIM deprovisioning not configuredEnable deprovisioning in SCIM settings

Resources

Next Steps

Proceed to granola-migration-deep-dive for migrating from other meeting note tools.

svg-icon-generator

jeremylongshore

Svg Icon Generator - Auto-activating skill for Visual Content. Triggers on: svg icon generator, svg icon generator Part of the Visual Content skill category.

6814

d2-diagram-creator

jeremylongshore

D2 Diagram Creator - Auto-activating skill for Visual Content. Triggers on: d2 diagram creator, d2 diagram creator Part of the Visual Content skill category.

2412

performing-penetration-testing

jeremylongshore

This skill enables automated penetration testing of web applications. It uses the penetration-tester plugin to identify vulnerabilities, including OWASP Top 10 threats, and suggests exploitation techniques. Use this skill when the user requests a "penetration test", "pentest", "vulnerability assessment", or asks to "exploit" a web application. It provides comprehensive reporting on identified security flaws.

379

designing-database-schemas

jeremylongshore

Design and visualize efficient database schemas, normalize data, map relationships, and generate ERD diagrams and SQL statements.

978

performing-security-audits

jeremylongshore

This skill allows Claude to conduct comprehensive security audits of code, infrastructure, and configurations. It leverages various tools within the security-pro-pack plugin, including vulnerability scanning, compliance checking, cryptography review, and infrastructure security analysis. Use this skill when a user requests a "security audit," "vulnerability assessment," "compliance review," or any task involving identifying and mitigating security risks. It helps to ensure code and systems adhere to security best practices and compliance standards.

86

django-view-generator

jeremylongshore

Generate django view generator operations. Auto-activating skill for Backend Development. Triggers on: django view generator, django view generator Part of the Backend Development skill category. Use when working with django view generator functionality. Trigger with phrases like "django view generator", "django generator", "django".

15

You might also like

flutter-development

aj-geddes

Build beautiful cross-platform mobile apps with Flutter and Dart. Covers widgets, state management with Provider/BLoC, navigation, API integration, and material design.

643969

drawio-diagrams-enhanced

jgtolentino

Create professional draw.io (diagrams.net) diagrams in XML format (.drawio files) with integrated PMP/PMBOK methodologies, extensive visual asset libraries, and industry-standard professional templates. Use this skill when users ask to create flowcharts, swimlane diagrams, cross-functional flowcharts, org charts, network diagrams, UML diagrams, BPMN, project management diagrams (WBS, Gantt, PERT, RACI), risk matrices, stakeholder maps, or any other visual diagram in draw.io format. This skill includes access to custom shape libraries for icons, clipart, and professional symbols.

591705

ui-ux-pro-max

nextlevelbuilder

"UI/UX design intelligence. 50 styles, 21 palettes, 50 font pairings, 20 charts, 8 stacks (React, Next.js, Vue, Svelte, SwiftUI, React Native, Flutter, Tailwind). Actions: plan, build, create, design, implement, review, fix, improve, optimize, enhance, refactor, check UI/UX code. Projects: website, landing page, dashboard, admin panel, e-commerce, SaaS, portfolio, blog, mobile app, .html, .tsx, .vue, .svelte. Elements: button, modal, navbar, sidebar, card, table, form, chart. Styles: glassmorphism, claymorphism, minimalism, brutalism, neumorphism, bento grid, dark mode, responsive, skeuomorphism, flat design. Topics: color palette, accessibility, animation, layout, typography, font pairing, spacing, hover, shadow, gradient."

318398

godot

bfollington

This skill should be used when working on Godot Engine projects. It provides specialized knowledge of Godot's file formats (.gd, .tscn, .tres), architecture patterns (component-based, signal-driven, resource-based), common pitfalls, validation tools, code templates, and CLI workflows. The `godot` command is available for running the game, validating scripts, importing resources, and exporting builds. Use this skill for tasks involving Godot game development, debugging scene/resource files, implementing game systems, or creating new Godot components.

339397

nano-banana-pro

garg-aayush

Generate and edit images using Google's Nano Banana Pro (Gemini 3 Pro Image) API. Use when the user asks to generate, create, edit, modify, change, alter, or update images. Also use when user references an existing image file and asks to modify it in any way (e.g., "modify this image", "change the background", "replace X with Y"). Supports both text-to-image generation and image-to-image editing with configurable resolution (1K default, 2K, or 4K for high resolution). DO NOT read the image file first - use this skill directly with the --input-image parameter.

451339

fastapi-templates

wshobson

Create production-ready FastAPI projects with async patterns, dependency injection, and comprehensive error handling. Use when building new FastAPI applications or setting up backend API projects.

304231

Stay ahead of the MCP ecosystem

Get weekly updates on new skills and servers.