Intermediate
Lesson 3 of 5 · ~9 min

Authentication and Groups

Wiring Printix to a customer's identity provider, the global-admin requirement for group sync, the nested-group gotcha, and using groups to control printer access.

A Printix tenant has two identity surfaces: who can sign in (Authentication) and who can do what once signed in (Groups for printer access, Roles for admin scope). This lesson is the design and rollout of both for a customer who’s federating with Microsoft Entra ID, Google Workspace, Okta, OneLogin, or a generic OIDC IdP.

The seven sign-in methods

Seven, including email-and-password as the one to remove deliberately. From the Authentication page:

MethodWhen to useNotes
Microsoft Entra IDDefault for M365 customersAuto-enabled if the tenant signed up via Microsoft AppSource / Azure Marketplace. Supports multiple Entra directories per Printix Home.
Google WorkspaceDefault for Workspace-anchored customersWorkspace, not gmail.com. Multiple Google domains per Printix Home.
OIDCGeneric OpenID Connect IdPs (custom, JumpCloud, Auth0, etc.)Requires the IdP’s metadata; Printix is the relying party.
OktaCustomers using Okta as their primary IdPMultiple Okta domains supported.
OneLoginCustomers on OneLoginSame shape as Okta.
Active DirectoryOn-prem AD federation, no cloud IdPNiche these days; pre-cloud customers.
Sign in with emailDefault but optionalEnabled by default. Remove it once the cloud IdP is wired up to avoid drift.

For a Microsoft 365 customer the default and right answer is Microsoft Entra ID with email sign-in removed. “Passwords are handled entirely by Microsoft Entra ID.” Printix doesn’t store the password; it trusts the IdP’s token.

The global-admin gotcha

The most-missed prerequisite during onboarding is also the most documented:

A Microsoft Entra ID account with the global administrator role is required to enable groups.

Same applies to Google: a Google Workspace administrator account is needed for group sync. Until group sync is enabled, you can authenticate users through the IdP, but you can’t use Microsoft Entra or Google groups to control printer access. The Synchronize groups consent step on the Authentication tab pops a Microsoft sign-in dialog; it must be a global admin signing in there.

This is also where customers with split admin roles (the M365 admin can’t get global, only User Administrator) hit a wall. Resolution is always the same: global admin signs in once, grants the consent, and never has to do it again. The site’s authentication state then survives.

Nested groups are not supported

Printix’s documentation is explicit: “Nested groups are not supported.” If a customer’s Microsoft Entra group “All Sydney” contains “Sydney Reception” and “Sydney Sales” rather than direct user membership, only the direct members of “All Sydney” itself will sync. Flatten the membership or use the leaf groups directly.

Wiring up Microsoft Entra group sync, end to end

The five-step shape of the consent flow:

  1. Open Authentication, Microsoft Entra tab

    Administrator, Authentication, then the Microsoft Entra ID tab. Confirm the directory you’re connecting matches the customer’s primary tenant. Multiple Entra directories are supported, each gets added separately.

    Printix Administrator Authentication page Microsoft Entra tab showing connected directory and group sync controls
  2. Click Connect, sign in as global admin

    Click Connect under Synchronize groups. The Microsoft sign-in dialog appears. The signing-in account must hold the Global Administrator role on the customer’s tenant; User Administrator and other lower roles produce a “Could not verify group synchronization” error.

    Microsoft sign-in consent dialog requesting permissions for Printix to read groups and group memberships
  3. Wait for the first sync

    Groups synchronise automatically at roughly 20-minute intervals. The first sync after consent can take a similar window. Don’t troubleshoot a missing group inside the first 30 minutes; check again after the next sync cycle.

  4. Verify groups appear in the Groups page

    Administrator, Users, Groups. The Microsoft Entra groups now appear with member counts. If a group is empty when it shouldn’t be, check whether it has nested groups (Printix doesn’t traverse them) or has fewer than the expected direct members in Entra.

Groups, what they actually control

Once group sync is on, two operational levers open:

LeverWhat it doesWhere it lives
Add print queue automaticallyWhen a user in the group signs in, the queue installs without self-servicePrint queue properties, Groups tab
Exclusive accessOnly users in the listed groups can use that print queue (other users don’t see it)Print queue properties, Groups tab
Set as default printerThe queue becomes the default for users in the group on their computersPrinter properties
Site manager groupUsers in this group get the Site manager role on a Site or FolderSites, Site setup, Site manager groups
Workflow accessA Capture workflow is available to users in the groupCapture workflows, Workflow properties

The pattern that scales: build groups around print-relevant boundaries, not org-chart boundaries. “Sydney-Reception-Printers” is more useful than “Marketing Department” because the printer-use rights map directly. Resist the temptation to bend M365’s general-purpose security groups; create dedicated Printix-naming-scheme groups instead.

A worked rollout: Able Moose three-office identity wiring

flowchart LR
    M[Microsoft Entra<br/>ablemoose.com.au] -->|consent + group sync| H[Printix Home<br/>ablemoose.printix.net]
    M --> G1[Group: Printix-Sydney-Users]
    M --> G2[Group: Printix-Melbourne-Users]
    M --> G3[Group: Printix-SiteManagers-Brisbane]
    G1 -->|access| Q1[Sydney print queues]
    G2 -->|access| Q2[Melbourne print queues]
    G3 -->|delegated to| S1[Brisbane site]

The naming scheme:

  • Printix-<office>-Users for printer access
  • Printix-SiteManagers-<office> for delegated admin

Conventions like this aren’t pretty but they survive personnel changes. A new MSP technician in five years can read the group name and know the purpose without context.

Loading quiz…

What this is NOT

  • Not the role/RBAC matrix. Printix’s roles (System manager, Site manager, User, Guest, Kiosk user) are about what a user can do in the Administrator. Authentication is how they sign in; Roles is what they’re allowed to do once signed in. The next lesson covers delegated management via the Site manager role.
  • Not MFA configuration. MFA is configured in the IdP (Microsoft Entra ID, Google Workspace, Okta, OneLogin), not in Printix. Printix trusts whichever assurance the IdP gives it. If the customer needs MFA-required-for-print, that’s a Conditional Access policy in their IdP.
  • Not the Partner Portal user list. Users in the Partner Portal are MSP staff who can manage tenants. That list is separate from a tenant’s own user list. The Advanced course covers the Partner Portal model.
Next lesson