From grammarly-pack
Configure Grammarly enterprise role-based access control. Use when managing team access, configuring organization settings, or implementing Grammarly enterprise governance. Trigger with phrases like "grammarly enterprise", "grammarly teams", "grammarly rbac", "grammarly organization", "grammarly admin".
npx claudepluginhub flight505/skill-forge --plugin grammarly-packThis skill is limited to using the following tools:
Grammarly enterprise deployments manage writing quality across teams with different access levels. Organization admins control style guides, tone profiles, and brand rules. Team admins assign seats and configure suggestion types (clarity, engagement, delivery). Members write with team defaults while guests get read-only access to shared documents. HIPAA and SOC 2 compliance in regulated industr...
Guides Next.js Cache Components and Partial Prerendering (PPR): 'use cache' directives, cacheLife(), cacheTag(), revalidateTag() for caching, invalidation, static/dynamic optimization. Auto-activates on cacheComponents: true.
Guides building MCP servers enabling LLMs to interact with external services via tools. Covers best practices, TypeScript/Node (MCP SDK), Python (FastMCP).
Share bugs, ideas, or general feedback.
Grammarly enterprise deployments manage writing quality across teams with different access levels. Organization admins control style guides, tone profiles, and brand rules. Team admins assign seats and configure suggestion types (clarity, engagement, delivery). Members write with team defaults while guests get read-only access to shared documents. HIPAA and SOC 2 compliance in regulated industries require audit trails on who accessed which writing suggestions and AI detection results.
| Role | Permissions | Scope |
|---|---|---|
| Org Admin | Manage billing, SSO config, all style guides, API credentials | Organization-wide |
| Team Admin | Assign seats, configure suggestion settings, manage style guides | Own team |
| Member | Write with team settings, access scoring and AI detection APIs | Own team |
| Guest | View shared documents, read-only style guide access | Invited documents only |
| API Service | OAuth-scoped access to scoring, AI detection, plagiarism APIs | Per-credential scope |
async function checkGrammarlyAccess(userId: string, team: string, scope: string): Promise<boolean> {
const response = await fetch(`${GRAMMARLY_API}/organizations/${ORG_ID}/permissions`, {
headers: { Authorization: `Bearer ${GRAMMARLY_OAUTH_TOKEN}`, 'Content-Type': 'application/json' },
});
const perms = await response.json();
const userPerms = perms.members.find((m: any) => m.id === userId);
if (!userPerms) return false;
return userPerms.team === team && userPerms.scopes.includes(scope);
}
async function assignTeamRole(email: string, team: string, role: 'admin' | 'member' | 'guest'): Promise<void> {
await fetch(`${GRAMMARLY_API}/organizations/${ORG_ID}/teams/${team}/members`, {
method: 'POST',
headers: { Authorization: `Bearer ${GRAMMARLY_OAUTH_TOKEN}`, 'Content-Type': 'application/json' },
body: JSON.stringify({ email, role }),
});
}
async function revokeTeamAccess(email: string, team: string): Promise<void> {
await fetch(`${GRAMMARLY_API}/organizations/${ORG_ID}/teams/${team}/members/${email}`, {
method: 'DELETE',
headers: { Authorization: `Bearer ${GRAMMARLY_OAUTH_TOKEN}` },
});
}
interface GrammarlyAuditEntry {
timestamp: string; userId: string; team: string;
action: 'score_check' | 'ai_detection' | 'plagiarism_scan' | 'style_guide_edit' | 'seat_change';
scope: string; documentId?: string; result: 'allowed' | 'denied';
}
function logAccess(entry: GrammarlyAuditEntry): void {
console.log(JSON.stringify({ ...entry, orgId: process.env.GRAMMARLY_ORG_ID }));
}
| Issue | Cause | Fix |
|---|---|---|
401 Unauthorized on API call | Expired OAuth token | Refresh token or regenerate credentials |
| User cannot access AI detection | Team lacks ai-detection:read scope | Add scope to team's OAuth client |
| Style guide edits not saving | User has member role, not admin | Promote to team admin or request admin to edit |
| Guest sees full suggestion set | Role not properly scoped on invite | Re-invite with explicit guest role |
| Seat limit reached | All team licenses assigned | Remove inactive members or purchase additional seats |
See grammarly-security-basics.