Summary and recommendation
1Password user management can be run manually, but complexity usually increases with role models, licensing gates, and offboarding dependencies. This guide gives the exact mechanics and where automation has the biggest impact.
1Password's admin console at my.1password.com covers the full user lifecycle - invitations, group assignments, vault access, suspension, and deletion - without any third-party tooling.
Like every app that mixes role-based and resource-level permissions, the model takes time to internalize: five fixed built-in groups (Owners, Administrators, Team Members, Security, Provision Managers) plus custom groups on Business and Enterprise plans, with 13 granular permissions enforced at the vault level per user or group.
SCIM provisioning is available on the Business plan but requires deploying and maintaining a self-hosted SCIM Bridge; it is not a cloud-native toggle.
Quick facts
| Admin console path | Sign in at 1Password.com → sidebar navigation (People, Groups, Vaults, Policies, Reports, Integrations) |
| Admin console URL | Official docs |
| SCIM available | Yes |
| SCIM tier required | Business |
| SSO prerequisite | Yes |
User types and roles
| Role | Permissions | Cannot do | Plan required | Seat cost | Watch out for |
|---|---|---|---|---|---|
| Owner | Full account control: manage all vaults, groups, team members, billing, account recovery, and account deletion. Can access and manage any shared vault in the account, including vaults created by departed members. | Cannot be restricted from managing any vault. Cannot have vault access revoked by other group members. Must have at least one Owner at all times. | Teams Starter Pack, Business, or Enterprise | $7.99/user/month (Business, billed annually); $19.95/month flat for Teams Starter Pack (up to 10 users) | Owners can add themselves to any vault at any time with no native alerting or guardrails. This is a documented limitation that cannot be restricted even by vault-level permissions. |
| Administrator | Add and manage vaults, groups, and team members. Recover accounts. Can manage vaults where they have been explicitly granted manage permissions. | Cannot change billing settings. Cannot delete the team. Cannot permanently delete user accounts (suspend only); deletion requires an Owner. | Teams Starter Pack, Business, or Enterprise | $7.99/user/month (Business, billed annually) | Admins can manage a vault only if they have been explicitly granted manage access to it. Being in the Administrators group does not automatically grant view access to all vaults. |
| Team Member | Access to shared vaults they have been granted access to, plus their own Employee vault. May create shared vaults by default (permission can be removed). No team-level administrative permissions. | Cannot manage other users, groups, or billing. Cannot be removed from the Team Members group. | Teams Starter Pack, Business, or Enterprise | $7.99/user/month (Business, billed annually) | By default, all Team Members can create shared vaults. This permission can be revoked at the group level by an Owner or Administrator. |
| Guest | Access to a single shared vault only. No Employee vault. Cannot access more than one vault at a time. | Cannot access multiple vaults simultaneously. Cannot have an Employee vault. Cannot belong to the Team Members group. | Teams Starter Pack (5 included), Business (20 included), or Enterprise | First 20 included in Business plan. Additional guests billed at the same per-user rate as team members. | Guests count as billable seats if they have active, awaiting confirmation, or recovery status. Upgrading a guest to a team member consumes a full paid seat. |
| Security Group Member | Can view security reports and account activity (domain breach report). No vault or user management permissions. | Cannot manage users, vaults, or billing. | Business (group only appears after domain breach report is configured) | No additional cost; role is assigned to existing team member seats. | The Security group only appears in the admin console after the domain breach report has been set up. |
| Provision Managers Group Member | Can provision and confirm new team members via SCIM or 1Password CLI. Has access to Employee vaults before users complete signup. | Limited to provisioning scope; does not have full administrative access. | Business (required for SCIM Bridge or CLI provisioning) | No additional cost; role is assigned to existing team member seats. | Members of this group can see Employee vaults before users complete signup. Remove yourself from this group if you do not want to see pre-signup Employee vaults. |
Permission model
- Model type: hybrid
- Description: 1Password uses a hybrid model combining fixed built-in groups (Owners, Administrators, Team Members, Security, Provision Managers) with custom groups available on Business and Enterprise plans. Vault access is controlled at the vault level with 13 granular permissions (e.g., view_items, create_items, edit_items, delete_items, export_items, manage_vault). Team-level permissions (e.g., Invite People, Recover Accounts, Create Vaults, Manage Settings) are assigned to groups. When a user has permissions both individually and via a group, the most permissive set applies.
- Custom roles: Yes
- Custom roles plan: Business (custom groups with configurable team-level and vault-level permissions); Enterprise adds further advanced policy controls
- Granularity: 13 vault-level permissions per user/group per vault. Team-level permissions assignable to custom groups. No item-level permissions (permissions are vault-scoped only).
How to add users
- Sign in to 1Password.com as an Owner or Administrator.
- Select 'Invitations' in the sidebar.
- Select 'Invite by Email' and enter the recipient's email address.
- Select user type (Team Member or Guest) and send the invitation.
- Invitee receives an email, follows the link to create their account and Secret Key.
- Admin receives a notification email; confirm the new account from the Invitations page or via the confirmation link in the email.
- After confirmation, assign the user to relevant vaults and groups.
Required fields: Email address, User type (Team Member or Guest)
Watch out for:
- New team members cannot access shared items until an Owner or Administrator explicitly confirms their account.
- Email invitations have no built-in expiry for team accounts, but Slack invitations expire after 5 days.
- Billing is prorated and charged within 48 hours of the invitee accepting the invitation, not when the invite is sent.
- If SCIM provisioning is active, manually suspending a user who is still in scope in the IdP may be overridden by the next SCIM sync. Temporarily disable SCIM provisioning before manual suspension.
- Password policies are not retroactively enforced; users who joined before a policy was set only need to comply when they next change their password or undergo account recovery.
- The Teams Starter Pack only supports email invitations; sign-up links and Slack invitations are not available on that plan.
| Bulk option | Availability | Notes |
|---|---|---|
| CSV import | No | Not documented |
| Domain whitelisting | Yes | Automatic domain-based user add |
| IdP provisioning | Yes | Business (requires 1Password SCIM Bridge deployment; supported IdPs: Okta, Microsoft Entra ID, Google Workspace, OneLogin, Rippling, JumpCloud) |
How to remove or deactivate users
- Can delete users: Yes
- Delete/deactivate behavior: 1Password supports both suspension (temporary) and permanent deletion. Suspension immediately logs the user out of all devices and blocks access; suspended users are excluded from billing. Permanent deletion removes the user and all their private data. Only Owners can permanently delete accounts; Administrators can only suspend. A policy setting allows suspended users to be auto-deleted between 1 and 180 days after suspension.
- Sign in to 1Password.com as an Owner or Administrator.
- Select 'People' in the sidebar.
- Select the name of the team member to open their details page.
- Select 'More Actions' → 'Suspend'.
- Confirm the suspension. The user is immediately logged out of all devices.
- To permanently delete: ensure the user is suspended, then select 'More Actions' → 'Delete' (Owner only).
| Data impact | Behavior |
|---|---|
| Owned records | The deleted user's Employee (private) vault and all items exclusively in it are permanently and irrecoverably deleted. There is no way to recover these items after deletion. |
| Shared content | Items in shared vaults remain accessible to other team members and are not affected by the user's deletion. |
| Integrations | If the user was managed via SCIM, they must be deprovisioned in the IdP before their 1Password account can be deleted. Active item-sharing links created by the user persist until manually revoked via the audit log. |
| License freed | Suspended users are immediately excluded from billing. Deleted users free their seat; billing is prorated to the day of removal. |
Watch out for:
- Do not delete a user's account before ensuring their Employee vault is empty or its contents have been transferred to a shared vault; deletion is permanent and unrecoverable.
- If the user is managed by SCIM, deprovision them in the IdP first; otherwise the SCIM sync may re-activate the account.
- If a user is offline when suspended or deleted, their local 1Password data remains accessible until they next attempt to unlock 1Password while online.
- After deletion, passwords and tokens the user had access to in shared vaults should be rotated, especially if they were in the Owners or Administrators group.
- A user's free 1Password Families membership (included with Business) becomes read-only when they are suspended or deleted from the team account.
- Admins cannot complete permanent deletion; an Owner must perform the final delete step.
License and seat management
| Seat type | Includes | Cost |
|---|---|---|
| Team Member seat | Full access to shared vaults, Employee vault, group membership, all 1Password apps. Business plan includes a free 1Password Families account per seat. | $7.99/user/month (Business, billed annually); $19.95/month flat for Teams Starter Pack up to 10 users |
| Guest seat | Access to a single shared vault only. No Employee vault. 20 included in Business plan; 5 included in Teams Starter Pack. | First 20 (Business) or 5 (Teams Starter Pack) included in base price. Additional guests billed at the same per-user rate as team members. |
- Where to check usage: 1Password.com → Reports (sidebar) → Team Report or Overview Report. Shows active, suspended, and recovery-status users. Billing seat count visible at 1Password.com → Billing and Seats → Usage tab.
- How to identify unused seats: Use Reports → Team Report to see each team member's last login date and browser extension status. Filter by extension status to find members who have never activated the extension. Usage reports (Reports → Usage Report per team member) show last item access date within the past 12 months.
- Billing notes: Billing is prorated daily; a seat is charged from the day the invitee accepts their invitation. Suspended users are not billed. Active user count is calculated daily at 7:00 PM ET. Business plan bills per team member plus charges for guests beyond the 20 included. Annual billing is available; prorated credits are issued when users are removed mid-cycle.
The cost of manual management
Every app in a manually managed environment carries a coordination cost, and 1Password surfaces several that compound over time. New team members cannot access shared items until an Owner or Administrator explicitly confirms their account after invitation acceptance - a two-step flow that is easy to miss at scale.
Suspended users are excluded from billing, but the active seat count is calculated daily at 7:00 PM ET, so timing of suspension relative to billing cycles matters. Identifying unused seats requires navigating to Reports → Team Report and cross-referencing last login dates and browser extension activation status; there is no automated idle-seat alert.
Permanent account deletion is Owner-only - Administrators can only suspend - creating a bottleneck in offboarding workflows. If SCIM is active, manually suspending a user who remains in scope in the IdP may be overridden by the next sync cycle.
What IT admins are saying
The most consistent friction reported by 1Password administrators centers on the Owner role's unrestricted vault access. Owners can add themselves to any vault at any time with no native alerting or guardrails - a documented limitation that cannot be restricted even by vault-level permissions.
Community threads flag this as a separation-of-duties concern, with one post noting that 'due to this lack of permission granularity, our IT teams do not feel comfortable using shared vaults.' A related gap is the absence of native email alerts when users are added to or removed from a vault.
Permissions are vault-scoped only; there are no item-level permissions, so restricting access to individual items within a shared vault is not possible. The SCIM Bridge deployment model also draws consistent complaints for adding operational overhead compared to cloud-native SCIM implementations.
Common complaints:
- SCIM Bridge deployment adds operational complexity compared to native cloud SCIM; requires self-hosting and ongoing maintenance.
- Need to maintain and update SCIM Bridge separately from the main 1Password service.
- SSO and SCIM require separate IdP application configurations.
- Owners cannot be restricted from accessing or adding themselves to any vault; no native alerting or guardrails exist for this escalation path, which is a documented separation-of-duties concern.
- No native email alerts notify Owners or Administrators when a user is added to or removed from a vault.
- Permissions are vault-scoped only; there are no item-level permissions, making it impossible to restrict access to individual items within a shared vault.
- Administrators must be explicitly added to a vault to view its contents; being in the Administrators group does not grant automatic view access, which surprises new admins.
- Only Owners can permanently delete user accounts; Administrators can only suspend, creating a dependency on Owner availability during offboarding.
- If a user is offline when suspended or deleted, their local vault data remains accessible until they reconnect, creating a window of continued access.
- Manually suspending a SCIM-managed user requires temporarily disabling SCIM provisioning to prevent the IdP from re-activating the account.
Representative quotes (verbatim):
1Password account 'Owners' have full permission to manage ANY vault and their vault access cannot be restricted.
- 1Password Community forum post, verified community complaint thread (https://www.1password.community/discussions/1password/issue-account-owner-permissions--vaults/151841)
Due to this lack of permission granularity, our IT teams do not feel comfortable using shared vaults.
- 1Password Community forum post, verified community complaint thread (https://www.1password.community/discussions/1password/issue-account-owner-permissions--vaults/151841)
The decision
Every app in your stack has a provisioning cost, and 1Password's is shaped by two structural constraints: the confirmation-required invitation flow and the Owner-only permanent deletion step. Manual administration is viable for teams under roughly 50 users or organizations that have not yet deployed an IdP.
Above that threshold, those constraints plus the absence of idle-seat alerts create meaningful operational drag. The Business plan's SCIM Bridge requirement - self-hosted, separately maintained, with a paired scimsession file and bearer token - means that even automated provisioning carries infrastructure overhead.
Teams with strict separation-of-duties requirements should note that the Owner role's unrestricted vault access is a documented, unresolvable limitation within the product's current permission model.
Guest seats are billable once a user reaches active, awaiting confirmation, or recovery status, and upgrading a guest to a team member consumes a full paid seat - both worth auditing before headcount changes.
Bottom line
1Password gives administrators a capable console for day-to-day user and vault management, but several structural constraints accumulate at scale: the two-step invitation confirmation, Owner-only permanent deletion, vault-scoped-only permissions with no item-level granularity, and the self-hosted SCIM Bridge requirement on Business plans.
The Owner role's ability to self-add to any vault without alerting is a documented limitation with no native workaround, which is the most frequently cited concern in the admin community.
Organizations that need clean separation of duties, automated idle-seat detection, or a fully cloud-managed provisioning pipeline will find gaps that require process controls or third-party tooling to close.
Automate 1Password workflows without one-off scripts
Stitchflow builds and maintains identity workflows for your exact setup. We cover every app, including the ones without APIs, and run deterministic trigger-to-report workflows with human approvals where they matter.