Identity-Aware Proxy User Groups turn access control from a blunt instrument into a precision tool. Instead of a single set of rules for everyone, these groups let you decide exactly who sees what, and when. Every request is checked against identity. Every permission is tied to a real user or a real group, not an IP range or a network zone.
An Identity-Aware Proxy (IAP) sits between your users and your protected resources. It verifies the user’s identity before letting any request through. With User Groups, you can map those identities into logical sets: engineering teams, finance, contractors, specific project crews. This makes it possible to manage policies at scale without drowning in one-off permissions.
When you combine IAP with User Groups, you get fine-grained, centralized control. You define groups once. You write policies once. You apply them to APIs, dashboards, staging environments, production systems—seamlessly. The IAP enforces the same rules no matter where the user comes from or what network they’re on. If someone leaves a team, they lose access everywhere, instantly.