granola-multi-env-setup
Configure Granola across multiple workspaces and teams with SSO/SCIM provisioning. Use when setting up department-level workspaces, configuring user provisioning, or managing enterprise-scale Granola deployments. Trigger: "granola workspaces", "granola multi-team", "granola SSO", "granola SCIM", "granola organization setup".
Allowed Tools
Provided by Plugin
granola-pack
Claude Code skill pack for Granola AI meeting notes (24 skills)
Installation
This skill is included in the granola-pack plugin:
/plugin install granola-pack@claude-code-plugins-plus
Click to copy
Instructions
Granola Multi-Environment Setup
Overview
Configure Granola for multi-workspace enterprise deployments with SSO-based user provisioning, per-workspace integration configuration, and compliance controls. Each workspace operates as an isolated unit with its own folders, integrations, sharing rules, and retention policies.
Prerequisites
- Granola Enterprise plan ($35+/user/month)
- Organization admin access in Granola
- Identity provider configured (Okta, Azure AD, or Google Workspace)
- Team structure and workspace plan documented
Instructions
Step 1 — Plan Workspace Structure
Map your organization to Granola workspaces:
| Workspace | Owner | Members | Purpose |
|---|---|---|---|
| Engineering | VP Engineering | All engineers | Sprint planning, architecture, standups |
| Sales | VP Sales | Sales team + SDRs | Discovery calls, demos, pipeline reviews |
| Product | Head of Product | PMs + designers | Customer feedback, design reviews, PRDs |
| Customer Success | CS Lead | CS managers | Onboarding calls, QBRs, escalations |
| HR | HR Director | HR team | Interviews, 1-on-1s, performance reviews |
| Executive | CEO | C-suite | Board meetings, strategy, M&A |
Step 2 — Create Workspaces
- Navigate to Organization Settings > Workspaces
- For each workspace:
- Name: Department name (e.g., "Engineering")
- Description: Purpose and scope
- Owner: Department lead (Workspace Admin role)
- Privacy: Private (members only) or Internal (org-visible)
- Default sharing: Private for new notes
Step 3 — Configure SSO and User Provisioning
SSO Setup (Okta example):
- Organization Settings > Security > SSO
- Choose SAML 2.0 or OIDC
- Configure in your IdP:
- Entity ID:
https://app.granola.ai/sso/{org-slug} - ACS URL:
https://app.granola.ai/sso/callback - Name ID: Email address
- Test with a pilot user before enforcing org-wide
SCIM Provisioning:
- Organization Settings > Security > SCIM
- Generate SCIM token
- Configure in your IdP:
- SCIM endpoint:
https://api.granola.ai/scim/v2/{org-id} - Bearer token: Generated in step 2
- Map IdP groups to Granola workspaces and roles:
| IdP Group | Granola Workspace | Role |
|---|---|---|
granola-engineering |
Engineering | Member |
granola-engineering-leads |
Engineering | Admin |
granola-sales |
Sales | Member |
granola-hr |
HR | Member |
granola-executives |
Executive | Admin |
Just-in-Time (JIT) Provisioning:
Enable JIT so users are auto-provisioned on first SSO login without manual invitation. Map their IdP groups to workspace membership.
Step 4 — Configure Per-Workspace Integrations
Each workspace can have independent integration configurations:
| Workspace | Slack Channel | CRM | Notion Database | Task Tool |
|---|---|---|---|---|
| Engineering | #eng-meetings | — | Engineering Wiki | Linear |
| Sales | #sales-notes | HubSpot | Sales Playbook | — |
| Product | #product-feedback | — | Product Insights | Linear |
| Customer Success | #cs-updates | Attio | CS Knowledge Base | — |
| HR | (none) | — | (none) | — |
| Executive | (none) | — | Private Board DB | — |
Configure in each workspace: Settings > Integrations. Each workspace's integrations are independent — connecting Slack in Engineering does not affect Sales.
Step 5 — Set Compliance Controls Per Workspace
| Workspace | Data Retention (Notes) | Data Retention (Transcripts) | External Sharing | Audit Logging |
|---|---|---|---|---|
| Engineering | 2 years | 90 days | Allowed (admin approval) | On |
| Sales | 1 year | 90 days | Allowed (for client follow-up) | On |
| Product | 2 years | 90 days | Allowed (admin approval) | On |
| HR | 90 days | 30 days | Prohibited | On |
| Executive | Custom (legal hold) | 30 days | Prohibited | On |
Sensitive workspace hardening (HR, Executive):
Workspace Settings > Security:
External sharing: Disabled
Public links: Disabled
Link expiration: 7 days (if any sharing enabled)
MFA required: Yes (beyond SSO)
Session timeout: 4 hours
AI training opt-out: Enforced
IP allowlist: Enabled (office IPs only)
Step 6 — Role Hierarchy and Permissions
| Role | Create Notes | Share Internally | Share Externally | Manage Members | Manage Settings |
|---|---|---|---|---|---|
| Org Owner | Yes | Yes | Yes | Yes (all workspaces) | Yes (org-level) |
| Workspace Admin | Yes | Yes | Yes (if policy allows) | Yes (own workspace) | Yes (workspace) |
| Team Lead | Yes | Yes | Yes (if policy allows) | View only | No |
| Member | Yes | Yes | No (unless admin approves) | No | No |
| Viewer | No | Read-only | No | No | No |
| Guest | No | Single workspace read | No | No | No |
Step 7 — Validate and Monitor
Validation checklist:
- [ ] All workspaces created with correct owners
- [ ] SSO login tested with users from each IdP group
- [ ] SCIM sync verified (user added to IdP group → appears in workspace)
- [ ] Per-workspace integrations tested with sample meetings
- [ ] Compliance settings verified for sensitive workspaces (HR, Executive)
- [ ] Cross-workspace search working for admin users
- [ ] Audit logs capturing expected events
Ongoing monitoring:
- Monthly: Review workspace membership, deactivate departed users
- Quarterly: Access review across all workspaces (principle of least privilege)
- Annual: Re-certify compliance settings, update retention policies
Output
- Multi-workspace topology deployed and configured
- SSO and SCIM provisioning operational
- Per-workspace integrations connected and tested
- Compliance controls applied with sensitive workspace hardening
- Role hierarchy documented and enforced
Error Handling
| Error | Cause | Fix |
|---|---|---|
| User lands in wrong workspace | SSO group mapping incorrect | Fix IdP group → workspace mapping |
| SCIM sync fails | Token expired or endpoint wrong | Regenerate SCIM token, verify endpoint URL |
| Cross-workspace notes invisible | User not added to target workspace | Add user to workspace or grant Viewer role |
| Integration not syncing in workspace | Connected to different workspace | Reconnect integration within the correct workspace context |
| JIT provisioning creates duplicate users | Multiple IdP groups | Consolidate groups, ensure one user maps to one account |
Resources
Next Steps
Proceed to granola-observability for meeting analytics and monitoring.