Operations Access Control
Objective
This runbook defines the operational sequence for stable workspace onboarding and access control management.
New Workspace Onboarding
- Create workspace.
- Connect GitHub App installation for the workspace.
- Run repo sync.
- Confirm repo -> project links.
- Run permission sync (dry-run, then apply).
- Connect OIDC provider and validate login access checks.
- Configure group mappings (boost policy only).
- Verify audit trail for setup actions.
GitHub Setup Procedure
Install and Sync
- Open workspace GitHub integration page.
- Connect installation.
- Click sync repos.
- Verify linked projects.
Permission Sync
- Run dry-run.
- Review unmatched users.
- Link users (
Claustrum user <-> GitHub login). - Run apply sync.
OIDC Setup Procedure
- Configure OIDC provider metadata.
- Validate issuer and client configuration.
- Validate
(issuer, subject)identity creation. - Configure group mapping with stable group IDs.
- Confirm OIDC access-check enforcement on protected endpoints.
Team Mapping Procedure
- Register team mapping rules.
- Set target scope (workspace/project).
- Set role and priority.
- Trigger sync or wait for webhook-driven recompute.
- Validate resulting memberships.
Incident Debugging Order
Use this order to reduce diagnostic noise:
- Confirm OIDC access-check success for the user.
- Confirm workspace membership.
- Confirm GitHub installation exists and is healthy.
- Confirm repo is synced and linked.
- Confirm GitHub user link exists.
- Inspect permission preview for direct/team max result.
- Inspect webhook deliveries (
queued/processing/done/failed). - Inspect recompute audits and permission apply audits.
Audit Log Checks
Critical action keys to monitor:
github.webhook.receivedgithub.webhook.signature_failedgithub.repos.syncedgithub.repos.synced.webhookgithub.permissions.computedgithub.permissions.appliedgithub.permissions.recomputedgithub.user_link.createdgithub.user_link.deleted
Operational Safeguards
- Keep
add_onlyas default for initial rollout. - Use
add_and_removeafter audit confidence is established. - Keep owner protection enabled.
- Use partial recompute to limit the impact scope.