The four questions a security reviewer asks
Who can sign in. Who can see what. Who provisioned them. What did they do. All four are answered inside the same knowledge base the rest of your team already uses.
Roles and permissions
Every team has owners and members. Owners manage the team, invite people, set defaults, transfer ownership, and read the audit log. Members read, write, and organize the shared folders they have access to. Each folder can also override the team-wide role with its own. Viewer, editor, or admin. The role cascades to every sub-folder unless an inner folder overrides it.
That cascade is what makes it usable on day two. Give the whole team write access to Runbooks. Then tighten Runbooks/Production secrets to a single admin. No rebuilding the folder tree.
Read the teams and sharing docs
SAML single sign-on
Plug Hjarni into any SAML 2.0 identity provider. Okta, Microsoft Entra, Auth0, OneLogin, or your own. Hjarni publishes service-provider metadata at a stable URL. The connector accepts the common attribute name variants for email and name claims. Users are provisioned on first login.
Pin a team to a single email domain if you want. Enforce SSO and password or OAuth logins are refused.
SCIM provisioning
Generate a SCIM 2.0 bearer token from the team settings and hand it to your IdP. Hjarni auto-creates user accounts and adds them to your team when they're assigned the application. Deactivation in the IdP removes the team membership immediately. SCIM Users is fully supported. Filter queries work on userName, externalId, and emails. The token digest is stored, never the token itself. You can rotate it at any time.
Team audit log
Notes and folders read, created, updated, moved, or deleted. Members invited, removed, and role-changed. Ownership transferred. Public links toggled. Folder-level instructions updated. The log captures these actions whether they happened in the web app, the REST API, the built-in MCP server, a public-link read, or SCIM provisioning. Folder paths are snapshotted on the event, so the log stays readable even after a folder is renamed or deleted.
The audit log is owner-only. Team members see a disclosure banner so they know it exists.
How a deployment looks
- You email us and we turn on SSO, SCIM, and the audit log for your team.
- You configure the SAML connection in your IdP using Hjarni's published metadata URL.
- You generate a SCIM token in the team settings and paste it into your IdP.
- You assign the app to the right groups; users land in Hjarni on first login.
- You set team-wide and per-folder roles. The audit log starts recording from day one.
Enabling these features is currently done by us, not a self-serve toggle. Most setups are a single call.
Simple on purpose, even here
- No on-prem or self-hosted. Hjarni runs as a hosted service. If a self-hosted deployment is a hard requirement, talk to us first.
- No bundled AI. Your team brings its own ChatGPT or Claude subscription. No per-message billing, no token caps, no AI surprises on the invoice.
- No SCIM group sync yet. SCIM Users provisioning works today. Group-to-role sync is on the roadmap. For now, roles are set inside Hjarni.
- No enterprise procurement theater. One contract, one invoice, one URL. The product your engineers see is the product your CFO pays for.
One brain. Every teammate. Every AI.
Everything on the small-teams page still applies. Shared folders that ChatGPT and Claude read. Folder-level AI instructions. A decision log your new hires can ask questions of. SSO, SCIM, roles, and the audit log are not a different product. They are the controls IT signs off on, wrapped around the same knowledge base.
Give your team's AI a memory.