Configure Sentry's Organization-Team-Project hierarchy, role assignments, SSO/SAML2 federation, SCIM automated provisioning, API token governance, and audit logging. Covers the full enterprise access control lifecycle from initial setup through ongoing compliance monitoring.
export SENTRY_AUTH_TOKEN="sntrys_..." # Auth token with org:admin, member:admin, team:admin scopes
export SENTRY_ORG="your-org-slug" # Organization slug from sentry.io/settings/
Sentry's access model flows top-down: Organization > Teams > Projects. Members inherit permissions from their org-level role, then gain project access through team membership.
Organization-level roles define the ceiling of what a member can do:
| Role | Capabilities | Typical Use |
|---|---|---|
| Owner | Full control: billing, auth, members, all settings. Irremovable. | Founding eng, CTO |
| Manager | Manage all teams, projects, and members. No billing access. | Engineering managers |
| Admin | Manage integrations, projects, teams. No member management. | Tech leads, DevOps |
| Member | View data, act on issues, join/leave teams. Default for new users. | Individual contributors |
| Billing | Payment and subscription management only. No technical access. | Finance team |
Team-level roles (Business/Enterprise only) add granularity within teams:
| Team Role | Additional Capabilities |
|---|---|
| Team Admin | Manage team membership, add/remove projects from the team |
| Contributor | View and act on issues in the team's projects |
A member's effective permissions are the union of their org-level role and all team-level roles they hold. A Member with Team Admin on "payments-team" can manage that team but cannot touch org-wide settings.
Create the team structure:
# Create a team
curl -s -X POST \
-H "Authorization: Bearer $SENTRY_AUTH_TOKEN" \
-H "Content-Type: application/json" \
-d '{"slug": "backend-eng", "name": "Backend Engineering"}' \
"https://sentry.io/api/0/organizations/$SENTRY_ORG/teams/" | jq '{slug, name, dateCreated}'
# List all teams with member counts
curl -s -H "Authorization: Bearer $SENTRY_AUTH_TOKEN" \
"https://sentry.io/api/0/organizations/$SENTRY_ORG/teams/" \
| jq '.[] | {slug, memberCount, hasAccess}'
# Assign a project to a team (grants team members access to that project)
curl -s -X POST \
-H "Authorization: Bearer $SENTRY_AUTH_TOKEN" \
"https://sentry.io/api/0/projects/$SENTRY_ORG/payment-api/teams/backend-eng/"
# Remove a team's access to a project
curl -s -X DELETE \
-H "Authorization: Bearer $SENTRY_AUTH_TOKEN" \
"https://sentry.io/api/0/projects/$SENTRY_ORG/payment-api/teams/backend-eng/"
# List which teams have access to a project
curl -s -H "Authorization: Bearer $SENTRY_AUTH_TOKEN" \
"https://sentry.io/api/0/projects/$SENTRY_ORG/payment-api/teams/" \
| jq '.[].slug'
Manage team membership:
# List organization members (get MEMBER_ID values)
curl -s -H "Authorization: Bearer $SENTRY_AUTH_TOKEN" \
"https://sentry.io/api/0/organizations/$SENTRY_ORG/members/" \
| jq '.[] | {id, email, role, expired}'
# Add a member to a team
curl -s -X POST \
-H "Authorization: Bearer $SENTRY_AUTH_TOKEN" \
"https://sentry.io/api/0/organizations/$SENTRY_ORG/members/$MEMBER_ID/teams/backend-eng/"
# Remove a member from a team
curl -s -X DELETE \
-H "Authorization: Bearer $SENTRY_AUTH_TOKEN" \
"https://sentry.io/api/0/organizations/$SENTRY_ORG/members/$MEMBER_ID/teams/backend-eng/"
# Update a member's organization role
curl -s -X PUT \
-H "Authorization: Bearer $SENTRY_AUTH_TOKEN" \
-H "Content-Type: application/json" \
-d '{"role": "admin"}' \
"https://sentry.io/api/0/organizations/$SENTRY_ORG/members/$MEMBER_ID/"
SSO centralizes authentication; SCIM automates the user lifecycle. Configure SSO first, then layer SCIM on top.
SSO/SAML2 setup — Okta example:
https://sentry.io/saml/acs/{org_slug}/
https://sentry.io/saml/metadata/{org_slug}/
| Name | Value |
|---|---|
email |
user.email |
firstName |
user.firstName |
lastName |
user.lastName |
SSO/SAML2 setup — Azure AD:
https://sentry.io/saml/acs/{org_slug}/
https://sentry.io/saml/metadata/{org_slug}/
emailaddress, givenname, surname
SSO/SAML2 setup — Google Workspace:
https://sentry.io/saml/acs/{org_slug}/
https://sentry.io/saml/metadata/{org_slug}/
email, firstName, lastName attributesActivate in Sentry:
SCIM provisioning automates user creation, deactivation, and group sync:
SCIM Base URL: https://sentry.io/api/0/organizations/{org_slug}/scim/v2/
Authentication: Bearer token (generated in Sentry's SCIM settings page)
# Provision a new user via SCIM
curl -s -X POST \
-H "Authorization: Bearer $SCIM_TOKEN" \
-H "Content-Type: application/scim+json" \
-d '{
"schemas": ["urn:ietf:params:scim:schemas:core:2.0:User"],
"userName": "engineer@company.com",
"name": {"givenName": "Jane", "familyName": "Doe"},
"emails": [{"primary": true, "value": "engineer@company.com", "type": "work"}],
"active": true
}' \
"https://sentry.io/api/0/organizations/$SENTRY_ORG/scim/v2/Users"
# List SCIM-provisioned users
curl -s -H "Authorization: Bearer $SCIM_TOKEN" \
"https://sentry.io/api/0/organizations/$SENTRY_ORG/scim/v2/Users?count=100" \
| jq '.Resources[] | {id, userName, active}'
# Deactivate a user via SCIM (sets active to false)
curl -s -X PATCH \
-H "Authorization: Bearer $SCIM_TOKEN" \
-H "Content-Type: application/scim+json" \
-d '{
"schemas": ["urn:ietf:params:scim:api:messages:2.0:PatchOp"],
"Operations": [{"op": "replace", "value": {"active": false}}]
}' \
"https://sentry.io/api/0/organizations/$SENTRY_ORG/scim/v2/Users/$SCIM_USER_ID"
# Sync IdP groups to Sentry teams via SCIM Groups
curl -s -X POST \
-H "Authorization: Bearer $SCIM_TOKEN" \
-H "Content-Type: application/scim+json" \
-d '{
"schemas": ["urn:ietf:params:scim:schemas:core:2.0:Group"],
"displayName": "backend-eng",
"members": []
}' \
"https://sentry.io/api/0/organizations/$SENTRY_ORG/scim/v2/Groups"
SCIM capabilities once connected:
API token scopes — always apply the principle of least privilege:
| Scope | Access Level | Typical Use Case |
|---|---|---|
project:read |
Read project settings and stats | Monitoring dashboards |
project:write |
Update project settings | Automation scripts |
project:releases |
Create releases, upload source maps | CI/CD pipelines |
event:read |
Read error/transaction events | Alerting integrations |
event:write |
Update/resolve events | Automated triage bots |
org:read |
Read organization data | Reporting tools |
org:write |
Update organization settings | Admin automation |
member:read |
List organization members | Directory sync |
member:write |
Manage members and invites | Onboarding automation |
team:read |
List teams | Discovery scripts |
team:write |
Create/update/delete teams | Team provisioning |
Create and manage API tokens:
# Create a new auth token via API
curl -s -X POST \
-H "Authorization: Bearer $SENTRY_AUTH_TOKEN" \
-H "Content-Type: application/json" \
-d '{
"scopes": ["project:read", "project:releases", "org:read"],
"name": "ci-cd-pipeline-prod"
}' \
"https://sentry.io/api/0/api-tokens/"
# List all active auth tokens
curl -s -H "Authorization: Bearer $SENTRY_AUTH_TOKEN" \
"https://sentry.io/api/0/api-tokens/" \
| jq '.[] | {id, name, scopes, dateCreated}'
# Delete a token by ID
curl -s -X DELETE \
-H "Authorization: Bearer $SENTRY_AUTH_TOKEN" \
"https://sentry.io/api/0/api-tokens/$TOKEN_ID/"
Token hygiene best practices:
project:releases + org:read only — the minimum for deploysevent:read + project:read — read-only for dashboards{purpose}-{environment} (e.g., ci-cd-pipeline-prod, grafana-monitoring-read)Audit log — track all access control changes (Business/Enterprise):
# Query the audit log
curl -s -H "Authorization: Bearer $SENTRY_AUTH_TOKEN" \
"https://sentry.io/api/0/organizations/$SENTRY_ORG/audit-logs/" \
| jq '.rows[] | {dateCreated, event, actor: .actor.name, targetObject, ipAddress}'
# Filter audit logs by event type
curl -s -H "Authorization: Bearer $SENTRY_AUTH_TOKEN" \
"https://sentry.io/api/0/organizations/$SENTRY_ORG/audit-logs/?event=member.invite" \
| jq '.rows[] | {dateCreated, actor: .actor.name, data}'
Tracked audit events include:
member.invite / member.accept / member.remove / member.edit — membership changesteam.create / team.edit / team.remove — team lifecycleproject.create / project.remove / project.edit — project changesorg.edit — organization setting modificationssso.enable / sso.disable / sso-identity.link — SSO configurationapi-token.create / api-token.remove — token lifecycleintegration.add / integration.edit / integration.remove — third-party integrationsIP allowlisting (Enterprise only):
Navigate to Organization Settings > Security > Allowed IP Ranges to restrict API access and dashboard logins to corporate network CIDR blocks. This is enforced at the organization level and applies to all auth tokens and browser sessions.
After completing all three steps, your Sentry organization will have:
| Error | Cause | Solution |
|---|---|---|
403 Forbidden on team/member endpoints |
Auth token missing team:admin or member:admin scope |
Create a new token at sentry.io/settings/auth-tokens/ with the required scopes |
| User cannot see a project | User is not on any team that has access to that project | Add the user to a team via the Members API, then assign that team to the project |
| SSO login redirects but fails | SAML ACS URL or Audience URI mismatch between IdP and Sentry | Verify the URLs match exactly: https://sentry.io/saml/acs/{org_slug}/ and https://sentry.io/saml/metadata/{org_slug}/ |
| SCIM sync creates users but does not assign teams | IdP groups not mapped to SCIM Groups in Sentry | Create SCIM Groups matching your IdP group names, then push group membership from the IdP |
401 Unauthorized on SCIM endpoints |
Using an org auth token instead of the SCIM-specific bearer token | Use the dedicated SCIM token generated in Organization Settings > Auth > SCIM |
| Audit log returns empty results | Organization is on Team or Developer plan | Upgrade to Business or Enterprise plan for audit log access |
429 Too Many Requests on API calls |
Rate limit exceeded (org-level: 100 req/s for Business) | Implement exponential backoff; batch operations where possible |
Example 1 — Microservices team isolation:
# Create teams for each domain
for team in "payments" "identity" "notifications" "platform"; do
curl -s -X POST \
-H "Authorization: Bearer $SENTRY_AUTH_TOKEN" \
-H "Content-Type: application/json" \
-d "{\"slug\": \"$team\", \"name\": \"$(echo $team | sed 's/.*/\u&/') Team\"}" \
"https://sentry.io/api/0/organizations/$SENTRY_ORG/teams/" | jq '.slug'
done
# Assign projects to their owning team
curl -s -X POST -H "Authorization: Bearer $SENTRY_AUTH_TOKEN" \
"https://sentry.io/api/0/projects/$SENTRY_ORG/payment-api/teams/payments/"
curl -s -X POST -H "Authorization: Bearer $SENTRY_AUTH_TOKEN" \
"https://sentry.io/api/0/projects/$SENTRY_ORG/billing-worker/teams/payments/"
curl -s -X POST -H "Authorization: Bearer $SENTRY_AUTH_TOKEN" \
"https://sentry.io/api/0/projects/$SENTRY_ORG/auth-service/teams/identity/"
Example 2 — Contractor access with limited blast radius:
# Create a contractor team with restricted access
curl -s -X POST \
-H "Authorization: Bearer $SENTRY_AUTH_TOKEN" \
-H "Content-Type: application/json" \
-d '{"slug": "contractors-q1", "name": "Q1 Contractors"}' \
"https://sentry.io/api/0/organizations/$SENTRY_ORG/teams/"
# Give contractors access to only their assigned project
curl -s -X POST -H "Authorization: Bearer $SENTRY_AUTH_TOKEN" \
"https://sentry.io/api/0/projects/$SENTRY_ORG/mobile-redesign/teams/contractors-q1/"
# Contractor members get org-level "Member" role (minimum privilege)
# + SSO required (enforced by "Require SSO" org setting)
# + Auto-deactivation via SCIM when removed from IdP group at contract end
Example 3 — Quarterly audit log review:
# Export last 90 days of audit events for compliance review
curl -s -H "Authorization: Bearer $SENTRY_AUTH_TOKEN" \
"https://sentry.io/api/0/organizations/$SENTRY_ORG/audit-logs/" \
| jq '[.rows[] | {
date: .dateCreated,
event: .event,
actor: .actor.name,
target: .targetObject,
ip: .ipAddress
}]' > sentry-audit-q1-2026.json
echo "Exported $(jq length sentry-audit-q1-2026.json) audit entries"