Stitchflow
1Password logo

1Password User Management Guide

Manual workflow

How to add, remove, and manage users with operational caveats that matter in production.

UpdatedFeb 25, 2026

Summary and recommendation

1Password user management can be run manually, but complexity usually increases with role models, licensing gates, and offboarding dependencies. This guide gives the exact mechanics and where automation has the biggest impact.

1Password's admin console at my.1password.com covers the full user lifecycle - invitations, group assignments, vault access, suspension, and deletion - without any third-party tooling.

Like every app that mixes role-based and resource-level permissions, the model takes time to internalize: five fixed built-in groups (Owners, Administrators, Team Members, Security, Provision Managers) plus custom groups on Business and Enterprise plans, with 13 granular permissions enforced at the vault level per user or group.

SCIM provisioning is available on the Business plan but requires deploying and maintaining a self-hosted SCIM Bridge; it is not a cloud-native toggle.

Quick facts

Admin console pathSign in at 1Password.com → sidebar navigation (People, Groups, Vaults, Policies, Reports, Integrations)
Admin console URLOfficial docs
SCIM availableYes
SCIM tier requiredBusiness
SSO prerequisiteYes

User types and roles

Role Permissions Cannot do Plan required Seat cost Watch out for
Owner Full account control: manage all vaults, groups, team members, billing, account recovery, and account deletion. Can access and manage any shared vault in the account, including vaults created by departed members. Cannot be restricted from managing any vault. Cannot have vault access revoked by other group members. Must have at least one Owner at all times. Teams Starter Pack, Business, or Enterprise $7.99/user/month (Business, billed annually); $19.95/month flat for Teams Starter Pack (up to 10 users) Owners can add themselves to any vault at any time with no native alerting or guardrails. This is a documented limitation that cannot be restricted even by vault-level permissions.
Administrator Add and manage vaults, groups, and team members. Recover accounts. Can manage vaults where they have been explicitly granted manage permissions. Cannot change billing settings. Cannot delete the team. Cannot permanently delete user accounts (suspend only); deletion requires an Owner. Teams Starter Pack, Business, or Enterprise $7.99/user/month (Business, billed annually) Admins can manage a vault only if they have been explicitly granted manage access to it. Being in the Administrators group does not automatically grant view access to all vaults.
Team Member Access to shared vaults they have been granted access to, plus their own Employee vault. May create shared vaults by default (permission can be removed). No team-level administrative permissions. Cannot manage other users, groups, or billing. Cannot be removed from the Team Members group. Teams Starter Pack, Business, or Enterprise $7.99/user/month (Business, billed annually) By default, all Team Members can create shared vaults. This permission can be revoked at the group level by an Owner or Administrator.
Guest Access to a single shared vault only. No Employee vault. Cannot access more than one vault at a time. Cannot access multiple vaults simultaneously. Cannot have an Employee vault. Cannot belong to the Team Members group. Teams Starter Pack (5 included), Business (20 included), or Enterprise First 20 included in Business plan. Additional guests billed at the same per-user rate as team members. Guests count as billable seats if they have active, awaiting confirmation, or recovery status. Upgrading a guest to a team member consumes a full paid seat.
Security Group Member Can view security reports and account activity (domain breach report). No vault or user management permissions. Cannot manage users, vaults, or billing. Business (group only appears after domain breach report is configured) No additional cost; role is assigned to existing team member seats. The Security group only appears in the admin console after the domain breach report has been set up.
Provision Managers Group Member Can provision and confirm new team members via SCIM or 1Password CLI. Has access to Employee vaults before users complete signup. Limited to provisioning scope; does not have full administrative access. Business (required for SCIM Bridge or CLI provisioning) No additional cost; role is assigned to existing team member seats. Members of this group can see Employee vaults before users complete signup. Remove yourself from this group if you do not want to see pre-signup Employee vaults.

Permission model

  • Model type: hybrid
  • Description: 1Password uses a hybrid model combining fixed built-in groups (Owners, Administrators, Team Members, Security, Provision Managers) with custom groups available on Business and Enterprise plans. Vault access is controlled at the vault level with 13 granular permissions (e.g., view_items, create_items, edit_items, delete_items, export_items, manage_vault). Team-level permissions (e.g., Invite People, Recover Accounts, Create Vaults, Manage Settings) are assigned to groups. When a user has permissions both individually and via a group, the most permissive set applies.
  • Custom roles: Yes
  • Custom roles plan: Business (custom groups with configurable team-level and vault-level permissions); Enterprise adds further advanced policy controls
  • Granularity: 13 vault-level permissions per user/group per vault. Team-level permissions assignable to custom groups. No item-level permissions (permissions are vault-scoped only).

How to add users

  1. Sign in to 1Password.com as an Owner or Administrator.
  2. Select 'Invitations' in the sidebar.
  3. Select 'Invite by Email' and enter the recipient's email address.
  4. Select user type (Team Member or Guest) and send the invitation.
  5. Invitee receives an email, follows the link to create their account and Secret Key.
  6. Admin receives a notification email; confirm the new account from the Invitations page or via the confirmation link in the email.
  7. After confirmation, assign the user to relevant vaults and groups.

Required fields: Email address, User type (Team Member or Guest)

Watch out for:

  • New team members cannot access shared items until an Owner or Administrator explicitly confirms their account.
  • Email invitations have no built-in expiry for team accounts, but Slack invitations expire after 5 days.
  • Billing is prorated and charged within 48 hours of the invitee accepting the invitation, not when the invite is sent.
  • If SCIM provisioning is active, manually suspending a user who is still in scope in the IdP may be overridden by the next SCIM sync. Temporarily disable SCIM provisioning before manual suspension.
  • Password policies are not retroactively enforced; users who joined before a policy was set only need to comply when they next change their password or undergo account recovery.
  • The Teams Starter Pack only supports email invitations; sign-up links and Slack invitations are not available on that plan.
Bulk option Availability Notes
CSV import No Not documented
Domain whitelisting Yes Automatic domain-based user add
IdP provisioning Yes Business (requires 1Password SCIM Bridge deployment; supported IdPs: Okta, Microsoft Entra ID, Google Workspace, OneLogin, Rippling, JumpCloud)

How to remove or deactivate users

  • Can delete users: Yes
  • Delete/deactivate behavior: 1Password supports both suspension (temporary) and permanent deletion. Suspension immediately logs the user out of all devices and blocks access; suspended users are excluded from billing. Permanent deletion removes the user and all their private data. Only Owners can permanently delete accounts; Administrators can only suspend. A policy setting allows suspended users to be auto-deleted between 1 and 180 days after suspension.
  1. Sign in to 1Password.com as an Owner or Administrator.
  2. Select 'People' in the sidebar.
  3. Select the name of the team member to open their details page.
  4. Select 'More Actions' → 'Suspend'.
  5. Confirm the suspension. The user is immediately logged out of all devices.
  6. To permanently delete: ensure the user is suspended, then select 'More Actions' → 'Delete' (Owner only).
Data impact Behavior
Owned records The deleted user's Employee (private) vault and all items exclusively in it are permanently and irrecoverably deleted. There is no way to recover these items after deletion.
Shared content Items in shared vaults remain accessible to other team members and are not affected by the user's deletion.
Integrations If the user was managed via SCIM, they must be deprovisioned in the IdP before their 1Password account can be deleted. Active item-sharing links created by the user persist until manually revoked via the audit log.
License freed Suspended users are immediately excluded from billing. Deleted users free their seat; billing is prorated to the day of removal.

Watch out for:

  • Do not delete a user's account before ensuring their Employee vault is empty or its contents have been transferred to a shared vault; deletion is permanent and unrecoverable.
  • If the user is managed by SCIM, deprovision them in the IdP first; otherwise the SCIM sync may re-activate the account.
  • If a user is offline when suspended or deleted, their local 1Password data remains accessible until they next attempt to unlock 1Password while online.
  • After deletion, passwords and tokens the user had access to in shared vaults should be rotated, especially if they were in the Owners or Administrators group.
  • A user's free 1Password Families membership (included with Business) becomes read-only when they are suspended or deleted from the team account.
  • Admins cannot complete permanent deletion; an Owner must perform the final delete step.

License and seat management

Seat type Includes Cost
Team Member seat Full access to shared vaults, Employee vault, group membership, all 1Password apps. Business plan includes a free 1Password Families account per seat. $7.99/user/month (Business, billed annually); $19.95/month flat for Teams Starter Pack up to 10 users
Guest seat Access to a single shared vault only. No Employee vault. 20 included in Business plan; 5 included in Teams Starter Pack. First 20 (Business) or 5 (Teams Starter Pack) included in base price. Additional guests billed at the same per-user rate as team members.
  • Where to check usage: 1Password.com → Reports (sidebar) → Team Report or Overview Report. Shows active, suspended, and recovery-status users. Billing seat count visible at 1Password.com → Billing and Seats → Usage tab.
  • How to identify unused seats: Use Reports → Team Report to see each team member's last login date and browser extension status. Filter by extension status to find members who have never activated the extension. Usage reports (Reports → Usage Report per team member) show last item access date within the past 12 months.
  • Billing notes: Billing is prorated daily; a seat is charged from the day the invitee accepts their invitation. Suspended users are not billed. Active user count is calculated daily at 7:00 PM ET. Business plan bills per team member plus charges for guests beyond the 20 included. Annual billing is available; prorated credits are issued when users are removed mid-cycle.

The cost of manual management

Every app in a manually managed environment carries a coordination cost, and 1Password surfaces several that compound over time. New team members cannot access shared items until an Owner or Administrator explicitly confirms their account after invitation acceptance - a two-step flow that is easy to miss at scale.

Suspended users are excluded from billing, but the active seat count is calculated daily at 7:00 PM ET, so timing of suspension relative to billing cycles matters. Identifying unused seats requires navigating to Reports → Team Report and cross-referencing last login dates and browser extension activation status; there is no automated idle-seat alert.

Permanent account deletion is Owner-only - Administrators can only suspend - creating a bottleneck in offboarding workflows. If SCIM is active, manually suspending a user who remains in scope in the IdP may be overridden by the next sync cycle.

What IT admins are saying

The most consistent friction reported by 1Password administrators centers on the Owner role's unrestricted vault access. Owners can add themselves to any vault at any time with no native alerting or guardrails - a documented limitation that cannot be restricted even by vault-level permissions.

Community threads flag this as a separation-of-duties concern, with one post noting that 'due to this lack of permission granularity, our IT teams do not feel comfortable using shared vaults.' A related gap is the absence of native email alerts when users are added to or removed from a vault.

Permissions are vault-scoped only; there are no item-level permissions, so restricting access to individual items within a shared vault is not possible. The SCIM Bridge deployment model also draws consistent complaints for adding operational overhead compared to cloud-native SCIM implementations.

Common complaints:

  • SCIM Bridge deployment adds operational complexity compared to native cloud SCIM; requires self-hosting and ongoing maintenance.
  • Need to maintain and update SCIM Bridge separately from the main 1Password service.
  • SSO and SCIM require separate IdP application configurations.
  • Owners cannot be restricted from accessing or adding themselves to any vault; no native alerting or guardrails exist for this escalation path, which is a documented separation-of-duties concern.
  • No native email alerts notify Owners or Administrators when a user is added to or removed from a vault.
  • Permissions are vault-scoped only; there are no item-level permissions, making it impossible to restrict access to individual items within a shared vault.
  • Administrators must be explicitly added to a vault to view its contents; being in the Administrators group does not grant automatic view access, which surprises new admins.
  • Only Owners can permanently delete user accounts; Administrators can only suspend, creating a dependency on Owner availability during offboarding.
  • If a user is offline when suspended or deleted, their local vault data remains accessible until they reconnect, creating a window of continued access.
  • Manually suspending a SCIM-managed user requires temporarily disabling SCIM provisioning to prevent the IdP from re-activating the account.

Representative quotes (verbatim):

1Password account 'Owners' have full permission to manage ANY vault and their vault access cannot be restricted.

Due to this lack of permission granularity, our IT teams do not feel comfortable using shared vaults.

The decision

Every app in your stack has a provisioning cost, and 1Password's is shaped by two structural constraints: the confirmation-required invitation flow and the Owner-only permanent deletion step. Manual administration is viable for teams under roughly 50 users or organizations that have not yet deployed an IdP.

Above that threshold, those constraints plus the absence of idle-seat alerts create meaningful operational drag. The Business plan's SCIM Bridge requirement - self-hosted, separately maintained, with a paired scimsession file and bearer token - means that even automated provisioning carries infrastructure overhead.

Teams with strict separation-of-duties requirements should note that the Owner role's unrestricted vault access is a documented, unresolvable limitation within the product's current permission model.

Guest seats are billable once a user reaches active, awaiting confirmation, or recovery status, and upgrading a guest to a team member consumes a full paid seat - both worth auditing before headcount changes.

Bottom line

1Password gives administrators a capable console for day-to-day user and vault management, but several structural constraints accumulate at scale: the two-step invitation confirmation, Owner-only permanent deletion, vault-scoped-only permissions with no item-level granularity, and the self-hosted SCIM Bridge requirement on Business plans.

The Owner role's ability to self-add to any vault without alerting is a documented limitation with no native workaround, which is the most frequently cited concern in the admin community.

Organizations that need clean separation of duties, automated idle-seat detection, or a fully cloud-managed provisioning pipeline will find gaps that require process controls or third-party tooling to close.

Automate 1Password workflows without one-off scripts

Stitchflow builds and maintains identity workflows for your exact setup. We cover every app, including the ones without APIs, and run deterministic trigger-to-report workflows with human approvals where they matter.

Every app coverage, including apps without APIs
60+ deep API integrations plus browser automation where needed
Identity graph reconciliation across apps and your IdP
Less than a week to launch, maintained as APIs and admin consoles change
SOC 2 Type II. ~2 hours of your team's time

UpdatedFeb 25, 2026

* Details sourced from official product documentation and admin references.

Keep exploring

Related apps

15Five logo

15Five

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

15Five uses a fixed role-based permission model with six predefined roles: Account Admin, HR Admin, Billing Admin, Group Admin, Manager, and Employee. No custom roles can be constructed. User management lives at Settings gear → People → Manage people p

8x8 logo

8x8

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

8x8 Admin Console supports full lifecycle user management — create, deactivate, and delete — across its X Series unified communications platform. Every app a user can access (8x8 Work desktop, mobile, web, Agent Workspace) is gated by license assignmen

Absorb LMS logo

Absorb LMS

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

Absorb LMS user management is handled through the Admin Experience at https:// .myabsorb.com, under Users menu > Users Report. Admins can create, edit, deactivate, or delete users individually or via CSV import. Every app in your stack that feeds ident