Skip to main content

Super Admin

The Super Admin role in Glean is a powerful role that controls access to Glean’s security features, including the Sensitive Content Report (DLP), Sensitive Content Search, and Client API Token. This role is not automatically assigned by Glean.The Super Admin role has all the Admin permissions plus the following:
  • Can assign the Admin Search role
  • Can assign the DLP moderator role
  • Can create global scope API tokens
  • Can assign the Super Admin role and any other permission or role
The actions of a Super Admin are logged, including user, action, and timestamp details. Once a user is granted Super Admin status, they have continuous access to the associated permissions and features.
  • Get in touch with your Glean Account Manager or file a ticket with Glean Support.
  • CSM will request for a written email authorization from a high-level approver at the customer’s end. This person should ideally be a CxO role or VP and above who is typically responsible for giving security access to others in their organization.
  • Once an email approval is obtained, the super admin access would be granted in 1-2 days.
Contact your company’s existing Glean super admin and they should be able to assign other teammates to be Super Admins.

User Permissions

In Glean, they refer to the set of permissions that are automatically assigned to all members when they join the workspace. These permissions can be managed and modified by Admins.
As an Admin, you can configure this by navigating to Admin console > Teammates and clicking on the ”⚙ Default Member permissions” button near the top right corner of the table. For smaller teams, we recommend keeping most of the permissions toggled on by default.
If you want to adjust the permissions of an individual, you can go back to the main Teammates page, find the specific individual in the table, click on the ⋮ menu, then “Edit roles”. You’ll be able to see the different permissions associated with different roles (i.e. Super Admin, Admin, Setup Admin, Member). You can also scroll to the bottom of the modal and assign additional permissions (e.g. sensitive content moderator).

Group-based Permissions

Yes, if group-based permissions are enabled for your deployment. Glean can sync groups and membership from supported identity providers (currently Azure AD and Google Groups) and let you map those groups to Glean roles (Admin, Setup Admin, Member, and additional Moderator roles) from the Teammates page. Users then inherit permissions from all of the groups they belong to, in addition to any roles you’ve assigned directly to them.For more information, see Group-based Permissions.
No. Glean only reads groups and members from your identity provider. It does not sync or enforce IdP permission rules, and it never overrides your data source ACLs. All document- and app-level permissions continue to be enforced by the original source systems.
Not yet. Today, Glean does not ingest Okta groups, so you cannot map Okta groups directly to Glean roles. Okta SCIM is available for user provisioning, but role assignments still need to be managed in the Glean Admin UI or via supported group sources (Azure AD or Google Groups).
Glean computes effective permissions by merging all role assignments from the user’s direct assignments and group memberships:
  • Primary role: The highest-precedence role wins (Super Admin > Admin > Setup Admin > Member)
  • Secondary roles: All secondary roles from all sources are combined
For example, if a user is directly assigned the Admin role and also belongs to a group with Setup Admin + Agent Creator, their effective permissions would be Admin (primary) plus Agent Creator (secondary).
Roles inherited from groups cannot be directly removed in Glean. To change a user’s group-derived permissions, you must update their group membership in your identity provider (Azure AD or Google Workspace). The change will sync to Glean automatically.