Favicon

You are here: Home > App Distribution > Distribute > User Groups

User Groups

Learn how to use Applivery's group-based access control for app distribution. Combine AND/OR logic, integrate with SSO (LDAP/SAML), and manage user groups effectively.

5 min read

TL;DR

Applivery allows you to control app distribution by granting access based on user group memberships, with support for AND/OR logic and SSO integration.

Applivery lets you control access to your App Store Publications with fine-grained group-based rules, combining AND and OR logic to match any distribution scenario.


Overview

App Distribution supports three access security modes for Publications — Public, Password, and Private. When a publication is set to Private, users must authenticate before accessing it, either via their Applivery account or a custom Single Sign-On (SSO) integration.

Beyond authentication, the Private mode also lets you restrict access to specific user groups. Only users who belong to the configured groups will be granted access after a successful login — everyone else is denied, even with valid credentials.

Note

For a full overview of publication security options, see How to Distribute Your Apps.


Configuring Group-Based Access

You can add as many groups as needed and combine them using AND and OR logic:

  • Groups on the same line are treated as AND: The user must belong to all of them.

  • Each new line is treated as OR: The user must satisfy at least one of the lines.

Example

To grant access to users who belong to both groupOne and groupTwo, or to users who belong to groupThree:

groupOne, groupTwo
groupThree

This reads as: (groupOne AND groupTwo) OR (groupThree).

A user in groupOne alone would not have access. A user in groupThree alone would have access. A user in both groupOne and groupTwo would have access.

groups

Single Sign-On Group Sync (LDAP and SAML)

When your App Store is connected to an SSO provider — via LDAP or SAML — Applivery automatically captures and syncs user group membership from your User Directory, including groups defined as Organisational Units (OUs).

How Syncing Works

Group synchronisation happens every time a user logs in. At that point, Applivery reads the user's current group memberships from your directory and updates them in the platform.

To distinguish SSO-sourced groups from groups created directly in Applivery, synced groups are automatically prefixed:

Source

Prefix

Example

LDAP

ldap:

ldap:engineering, ldap:qa-team

SAML

saml:

saml:developers, saml:beta-testers

Applivery (native)

(none)

groupOne, groupThree

This makes it straightforward to use SSO groups in your access rules alongside native Applivery groups — simply reference them with their prefix, for example:

saml:qa-team, saml:mobile-testers
ldap:contractors

Important behaviour

Warning

Group sync is login-triggered. All group memberships for a user are overwritten on every new login based on the current state of your User Directory. If you add or remove a user from a group in your directory, the change will not be reflected in Applivery until that user logs in to your App Store again.

This means:

  • Removing a user from a group in your directory does not immediately revoke their access in Applivery.

  • Adding a user to a new group in your directory does not immediately grant them access in Applivery.

  • In both cases, the change takes effect on the user's next login.


Best Practices

  • Use SSO-prefixed groups (ldap: / saml:) for access rules that should stay in sync with your corporate directory automatically.

  • Use native Applivery groups for distribution rules that are managed independently from your directory — such as internal beta testers or project-specific access.

  • When revoking access, keep in mind the login-triggered sync behaviour — if immediate revocation is critical, remove the user account from Applivery directly in addition to updating your directory.
    Taking longer than usual. Trying again shortly (attempt 8)

Key Takeaways

  • Applivery provides granular control over app distribution using group-based rules.
  • SSO integration allows automatic synchronization of user groups from LDAP and SAML directories.
  • Use SSO-prefixed groups for access rules that should stay in sync with your corporate directory.
  • Be aware of the login-triggered group sync behavior when revoking or granting access.
  • Combine AND/OR logic to create complex distribution scenarios.