Modify the collaborator's Segment permissions whenever project scope or security policies shift. Segment's layered permission model requires updates at both workspace and source/destination levels when requirements evolve.
Understanding Permission Updates
Segment access modifications can involve:
Workspace Role Changes
- Elevation (Read-only → Member → Admin): When responsibilities expand to include configuration, tracking plan management, or team oversight
- Reduction (Admin → Member → Read-only): When implementation phases complete and only monitoring or reporting remains
- Lateral Movement: Adjusting source/destination access without changing workspace-level role
Source and Destination Access
- Adding access to new sources as additional properties or platforms are instrumented
- Removing access to specific sources when engagement scope narrows
- Granting destination configuration rights for new integration work
- Restricting destination access when handoff to client teams occurs
Integration and Tooling
- API token generation rights for automation and programmatic access
- Tracking plan edit permissions for governance and schema management
- Personas and audience access for CDP and activation workflows
- Functions and data warehousing access for advanced transformations
When to Update
Engagement Scope Evolution
- New sources or destinations are added and the collaborator needs oversight or configuration rights
- Engagement scope narrows and the collaborator should reduce permissions to specific sources only
- Project phases transition (implementation → maintenance, QA → production support)
- Additional workspaces (staging, development) come under engagement coverage
- Client acquires new properties requiring Segment instrumentation
Security and Compliance Changes
- SCIM/SSO group mappings change and require role alignment with identity provider
- Quarterly access reviews identify over-privileged accounts requiring reduction
- Audit findings mandate documentation of Admin access with potential downgrade
- Data processing agreements change requiring restricted access to PII-containing sources
- Security incidents trigger access revalidation and modification
Operational and Organizational Shifts
- Token or warehouse access credentials require rotation with permission updates
- Team member changes roles or responsibilities within the organization
- Temporary elevated access expires after specific implementation tasks
- Automation tools transition from manual user accounts to dedicated service accounts
- Service account consolidation initiatives combine multiple accounts into one
Update Workflow
Changing Workspace Roles
- Navigate to Settings → Team Members in the relevant Segment workspace.
- Locate the collaborator's account in the member list.
- Click the role dropdown or Edit button next to their name.
- Change the Workspace Role to match the new requirements:
- Owner for full administrative control (rarely needed for collaborators)
- Admin for workspace configuration and team management
- Member for standard daily operations and implementation support
- Read-only for reporting and analysis without modification capability
- Review the change summary if provided by the interface.
- Click Save or Update to apply the change.
- Document the modification in your IAM tracker with the date, ticket reference, old role, new role, and justification.
Adjusting Source and Destination Permissions
If granular controls are enabled in your workspace:
- Navigate to Settings → Team Members and select the collaborator's account.
- Click Manage Access or Edit Permissions to view source/destination assignments.
- Under Source Access, adjust the list:
- Add new sources by checking additional boxes
- Remove sources by unchecking them
- Toggle "All Sources" if comprehensive access is appropriate
- Under Destination Access, similarly adjust:
- Grant access to specific destinations needed for integration work
- Revoke access to destinations outside engagement scope
- Review destination lists to ensure alignment with current responsibilities
- Save the changes and verify the permission summary reflects the updates.
- Document specific source and destination changes in your access tracker.
Adding Access to New Workspaces
When the collaborator needs access to additional Segment workspaces (e.g., adding staging after having production access):
- Switch to the new workspace in Segment.
- Follow the standard invitation process documented in the Add User Access guide.
- Maintain consistent role assignments across workspaces unless specific differences are justified.
- Update your workspace-to-user access matrix with the new assignment.
SCIM and SSO Environments
For identity-provider-managed access:
- Update the user's group memberships in your IdP (Okta, Azure AD, etc.).
- Verify the SCIM group-to-Segment-role mapping aligns with your intended change.
- Wait for the SCIM sync to propagate (usually within minutes, but can take up to an hour).
- Verify the change appeared in Segment's Team Members list.
- Manual changes in Segment may be overridden by SCIM - always update the IdP as the source of truth.
- Document the IdP group change alongside the Segment access modification.
Communication and Coordination
Notify the Collaborator
Inform the collaborator's engagement lead about:
- Which workspace(s) had permissions modified
- The new workspace role assigned
- Sources and destinations added or removed
- Effective date and time of the change
- Reason for the modification (if appropriate to share)
- Any impact on their current workflows or automation
- Expected timeline for validation and testing
Internal Documentation
Update your access records with:
- Request ticket or approval reference number
- Date and time of the modification
- Workspace(s) affected (production, staging, development)
- Previous workspace role and new workspace role
- Source/destination changes (added, removed, all access granted)
- Requester and approver names
- Business justification for the change
Stakeholder Notification
- Inform client contacts if the change affects deliverables or reporting
- Update project documentation to reflect new responsibilities
- Notify downstream teams relying on Segment data if destination access changes
- Coordinate with security team if the update resolves audit findings
Validation
Immediate Verification
- Review the Team Members list to ensure the role change is reflected.
- Check the Audit Trail under Settings → Audit Log to confirm the change is logged.
- Verify source and destination permissions show correctly in the Access Management views.
- Confirm any SCIM-synced changes match expectations from IdP group updates.
Collaborator Testing
- Ask the collaborator to log in and verify visibility aligns with expectations.
- Have them confirm which sources and destinations are visible in their workspace view.
- Test that configuration capabilities match the new role (can/cannot modify settings).
- Verify they can (or cannot) access tracking plans, schemas, and debugging tools as intended.
Functional Testing
For role elevations:
- Confirm the collaborator can now access previously restricted features.
- Test that new source or destination access is visible and configurable.
- Verify tracking plan edit capabilities if granted.
- Check API token generation permissions if Admin access was granted.
For role reductions:
- Confirm previously accessible configuration pages are now restricted.
- Verify source or destination access was properly removed.
- Test that read-only access still allows data viewing and export.
- Ensure tracking plan editing is disabled if permissions were reduced.
Documentation Review
- Update your IAM tracker with the modification details, approvals, and effective date.
- Archive screenshots showing before and after role states if required for compliance.
- Log any API token rotations or credential changes that accompanied the role update.
- Update workspace access matrices and role assignment spreadsheets.
Related Tasks
API and Authentication Management
- Rotate any API tokens or workspace keys managed by the collaborator's account if privilege levels changed.
- If downgrading from Admin to Member, verify any tokens they created are transferred to client or alternative accounts.
- Update API documentation to reflect new token ownership.
- Test automations using the collaborator's credentials to ensure continuity after changes.
Downstream System Updates
- Update downstream tools (e.g., reverse ETL platforms, CDPs, BI tools) that rely on the Segment user for authentication or data access.
- Modify database credentials or data warehouse access if tied to Segment user permissions.
- Adjust Slack, email, or webhook integrations if notification settings were user-specific.
- Review scheduled reports or exports that may have been tied to the collaborator's account.
Identity Provider Synchronization
- Confirm identity provider groups mirror the new access model if SCIM is active.
- Verify IdP role mappings still align with Segment workspace roles after updates.
- Test SSO login after changes to ensure authentication still works correctly.
- Document any manual overrides or exceptions to automated provisioning.
Tracking Plan and Schema Management
- If tracking plan permissions changed, update governance workflows accordingly.
- Transfer ownership of schemas or event specifications if the collaborator no longer has edit rights.
- Notify data governance teams of permission changes affecting tracking plan approvals.
- Review protocol configurations if destination access was modified.
Common Update Scenarios
Implementation Phase Completion
- Initial State: Member or Admin with full source and destination access
- Updated State: Read-only with view-only access to production sources
- Rationale: Implementation complete, ongoing reporting support only
- Additional Actions: Transfer API tokens to client, document configurations
Scope Expansion
- Initial State: Member with access to web source only
- Updated State: Member with access to web, mobile, and server sources
- Rationale: Engagement expanded to include mobile app instrumentation
- Additional Actions: Add mobile-specific documentation, update billing if seat limits apply
Temporary Elevation
- Initial State: Member with standard access
- Updated State: Admin for 2-week implementation sprint
- Rationale: Specific project requires tracking plan configuration and destination setup
- Additional Actions: Set calendar reminder to revert to Member after sprint, document temporary elevation approval
Security Review Downgrade
- Initial State: Admin with all-workspace access
- Updated State: Member with source-specific access only
- Rationale: Quarterly review found over-privileged account, engagement scope limited
- Additional Actions: Rotate API tokens, transfer ownership of configurations, document compliance remediation
Troubleshooting Permission Updates
Role change doesn't take effect immediately
- Refresh the Team Members page to confirm the save completed.
- Ask the collaborator to log out and back in to pick up new permissions.
- Clear browser cache or try incognito mode to rule out caching issues.
- For SCIM-managed accounts, wait for sync cycle (up to 60 minutes) before escalating.
- Check Audit Log to verify the change was recorded successfully.
Can't modify role (option grayed out)
- Ensure you have Admin or Owner rights in the workspace.
- Owners can only be modified by other Owners.
- SCIM-provisioned users may require changes via IdP, not Segment directly.
- Workspace limits may prevent role elevation - check subscription details.
SCIM sync overrides manual changes
- SCIM-enabled workspaces treat the IdP as the source of truth.
- Manual changes in Segment will be reverted on next sync.
- Always update user group memberships in the IdP for SCIM workspaces.
- Document any temporary manual overrides and expected reversion timeline.
Collaborator reports access doesn't match expectations
- Verify they're logged into the correct workspace (production vs. staging).
- Confirm they're using the service account email, not a personal account.
- Check that source/destination filters aren't hiding resources they expect to see.
- Review the Audit Log to confirm all changes were applied correctly.
- Test with a different browser or device to rule out client-side issues.
Source or destination access not updating
- Ensure fine-grained permissions are enabled for your workspace (Business Tier feature).
- Verify you saved changes after adjusting checkboxes.
- Refresh the workspace or have the user reload to pick up permission changes.
- Check that the source or destination still exists and wasn't deleted.
API tokens stop working after role change
- Downgrading from Admin may revoke token generation rights.
- Tokens created by a user may become invalid if their role changes significantly.
- Regenerate tokens from an account with appropriate permissions.
- Update all automations and integrations using affected tokens.
Security Best Practices
- Apply the principle of least privilege - grant only the minimum workspace role and source access necessary.
- Review role assignments quarterly even if engagement scope hasn't officially changed.
- Require re-approval for Admin access renewals or extensions beyond initial authorization.
- Document business justification when maintaining Admin access long-term.
- Set calendar reminders to review and revert temporary elevated access.
- Use dedicated service accounts rather than personal emails to simplify role tracking and rotation.
- Implement approval workflows for role elevation requests.
- Audit source and destination access periodically to ensure alignment with current engagement scope.
Compliance and Audit Considerations
- Log all permission changes in the Audit Trail and your external IAM tracker.
- Capture before and after screenshots for significant role changes.
- Maintain documentation of approval chains for Admin access grants or renewals.
- Include permission updates in quarterly access certification reports.
- Document data access implications if sources containing PII were added or removed.
- Ensure updates comply with data processing agreements and customer contracts.
- Retain change records for the duration required by your compliance framework (typically 3-7 years).