Skip to main content

Identity And Access

Enterprise identity model

Builder Insights should move toward MongoDB-managed workforce identity through Okta SSO, with app entitlements derived from trusted org signals rather than ad hoc access rules.

Core operating concerns

  • who can sign in
  • how roles are assigned and reviewed
  • how Builder Relations membership becomes authoritative
  • how exceptions and privileged access stay auditable

Target operating model

Current-state assumptions to replace

Avoid app-local identity truth

The product should not become the system of record for workforce identity or org structure.

Avoid email-only membership logic

Email domain or manually curated allowlists are not enough to prove Builder Relations membership or leadership scope.

Avoid silent privilege exceptions

Privileged access should be explicit, reviewable, and revocable rather than hidden inside code or one-off data fixes.

Decision areaRecommended default
Workforce sign-inMongoDB Okta SSO
Primary identity sourceOkta identity claims
Org membership sourceHRIS or approved org graph feeding group membership
App rolesmapped in an entitlement layer, not hard-coded directly from raw IdP groups
Break-glass adminexplicit, limited, and audited

Decision tracker

DecisionCurrent recommendationOwnerStatus
Workforce sign-in pathMongoDB Okta SSOIdentity and SecurityNeeds decision
Builder Relations org sourceHRIS or approved org graphBuilder Relations Ops and Org SystemsNeeds decision
Entitlement mapping layerapp-managed mapping from trusted identity and org inputsProduct and Application EngineeringDrafted
Break-glass admin policyexplicit and audited exception flowSecurity and Designated App AdminsDrafted

Builder Relations org truth

What the app should know

The app needs enough trusted org context to assign roles and shape visibility responsibly.

  • whether a user belongs to Builder Relations
  • their manager or leadership chain when role logic needs it
  • whether they hold a privileged administrative exception
  • when the last entitlement update occurred
What should live outside the app

These truths should come from approved internal systems, not hand-maintained app data.

  • official team membership
  • reporting structure
  • employment status
  • department or org alignment

Risk

The biggest access risk

If Builder Relations membership is not authoritative, the app can end up with ambiguous visibility, broken access reviews, and reporting scopes that leadership cannot trust.

Entitlement mapping strategy

1. Trust workforce identity

Use Okta-authenticated identity as the basis for every app session.

2. Ingest org context

Pull team and reporting structure from an approved internal org source.

3. Map to product roles

Convert identity and org signals into Builder Insights roles such as viewer, advocate, manager, and administrator.

4. Audit privileged exceptions

Keep admin overrides explicit and reviewable rather than relying on invisible operational memory.

Stakeholder questions to answer

Identity and security owners

  • what Okta integration pattern is preferred for internal workforce apps?
  • which claims and groups are approved for app entitlement decisions?
  • what is the expected MFA and session-lifetime policy?
  • how should break-glass admin access be handled and reviewed?

Org and HRIS owners

  • which internal system is authoritative for Builder Relations membership?
  • how should manager and leadership hierarchy be consumed by internal apps?
  • how frequently can org membership data be refreshed?
  • how should contractor or temporary-role cases be represented?

Product and ops owners

  • which roles should be assigned automatically versus manually reviewed?
  • which views should be scoped by role only versus by org membership and reporting line?
  • how should entitlement exceptions be requested and approved?

Governance checklist

QA check

Minimum governance baseline

  • document the source of truth for team membership and app roles
  • define who approves admin or privileged access
  • schedule access reviews for privileged roles
  • log role changes and high-sensitivity access events