Stitchflow
Absorb LMS logo

Absorb LMS User Management Guide

Manual workflow

How to add, remove, and manage users with operational caveats that matter in production.

UpdatedFeb 25, 2026

Summary and recommendation

Absorb LMS user management can be run manually, but complexity usually increases with role models, licensing gates, and offboarding dependencies. This guide gives the exact mechanics and where automation has the biggest impact.

Absorb LMS user management is handled through the Admin Experience at https://<subdomain>.myabsorb.com, under Users menu > Users Report. Admins can create, edit, deactivate, or delete users individually or via CSV import.

Every app in your stack that feeds identity data into Absorb requires careful field mapping: username is immutable after creation, each user belongs to exactly one department, and a password must be set even for SSO-enabled accounts.

Admin access is not on by default - the Admin or Instructor toggle must be explicitly enabled per user profile, and role scope (All, Department, or Group) must be set separately.

Quick facts

Admin console pathAdmin Experience > Users menu (left-hand navigation) > Users Report
Admin console URLOfficial docs
SCIM availableYes
SCIM tier requiredEnterprise (add-on)
SSO prerequisiteYes

User types and roles

Role Permissions Cannot do Plan required Seat cost Watch out for
System Admin Full access to all LMS settings, portal configuration, user management, roles, and reporting. Includes hidden 'Impersonate Admin Users' permission not available to custom roles. New functionality is automatically granted to this role on release. Cannot impersonate a user's Learner Experience (only Admin Interface). Cannot be fully replicated by a custom role due to hidden permissions. All plans Counts as an active user; no separate seat type documented publicly. Default Admin and System Admin roles automatically receive new permissions when new LMS features are released. Use custom roles if you need to control access to new functionality.
Admin Broad access to manage users, courses, enrollments, and reports within their assigned User Management scope (All, Department, or Group). Scope is set per user profile under Account > Admin > User Management. Cannot exceed their own permission set when acting on other admin profiles. Cannot see users outside their assigned User Management scope. All plans Counts as an active user. To perform actions on another admin's profile, the acting admin must have at least the same set of permissions as the target admin. Even one missing permission blocks the action.
Instructor Default system role not listed in the Roles report. Enabled via a toggle on the User Profile > Account section. Grants access to ILC Activity Report, ILC Grades Report, ILC Waitlist Report, ILC Sessions Report, and Session Approval Report for sessions where they are listed as instructor. Cannot access the full Admin Experience. SAML SSO does not natively support Instructor-only users; SSO requires also enabling the Admin toggle for Instructors. All plans Counts as an active user. The Instructor role has hidden permissions not visible in the Permission Overview and not replicable in custom roles. Enabling the Admin toggle (not Instructor toggle) grants access to all ILC sessions, not just assigned ones.
Reporter Read-only access to reports. Scoped to the user's assigned User Management department or group. Cannot modify users, courses, or settings. All plans Counts as an active user. Must also have 'Generated Reports' permission in their role to export data to CSV or Excel.
Create Editor Access to the Absorb Create course authoring tool. No admin management capabilities beyond course authoring. Requires purchase of the Absorb Create add-on product. Counts as an active user; Create add-on is separately priced. Only available if the Create add-on has been purchased. Not available by default.
Manager Access to the Manager Experience to view team learning data. Permissions configurable via Manager Roles (separate from Admin Roles). Can view enrollments, completions, and learner progress for direct reports. Cannot access the Admin Experience unless also granted Admin toggle. A Manager Role without 'Users – View' permission results in no accessible content in the Manager Experience. All plans Counts as an active user. Manager toggle and Admin toggle are independent. A Manager without the Admin toggle cannot log into the Admin Experience, and an Admin without the Manager toggle cannot log into the Manager Experience.
Reviewer Access to the Reviewer Experience to mark and manage Observation Checklists for on-the-job or mentoring training. Cannot manage users or courses outside of Observation Checklist review. All plans Counts as an active user. If a Reviewer is deleted, any in-progress Observation Checklists they own are lost. Learners must be re-enrolled in the connected course to restart the checklist process.
Learner Access to the Learner Experience only. Can discover, enroll in (if self-enrollment enabled), and complete courses. Default role for all new users. Cannot access Admin, Manager, or Reviewer Experiences. All plans Counts as an active learner for billing purposes. All users default to Learner unless the Admin or Instructor toggle is explicitly enabled on their profile.

Permission model

  • Model type: hybrid
  • Description: Absorb uses a role-based model with four locked default admin roles (System Admin, Admin, Instructor, Reporter) that cannot be edited. System Admins and Admins with Role (View + Modify) permissions can create custom admin roles with granular view/modify permissions per LMS section. A separate Manager Roles system governs the Manager Experience independently. Admin visibility scope (which users an admin can see and manage) is controlled by a User Management setting on each admin's profile (All, Department, or Group), which operates in tandem with role permissions.
  • Custom roles: Yes
  • Custom roles plan: All plans (System Admin or Admin with Role modify permission required to create)
  • Granularity: Per-section View and Modify permissions across Users, Courses, Reports, Enrollments, Departments, Groups, Roles, and add-on modules. Modify always requires View to be enabled. Some permissions have hidden dependencies (e.g., Course Activity report requires View Online Courses). A small number of hidden permissions exist in default roles that cannot be added to custom roles.

How to add users

  1. Log in to the Admin Experience.
  2. Open the Users menu from the left-hand navigation.
  3. Select Users to open the Users Report.
  4. Click the Add User button in the Actions menu on the right-hand side.
  5. Fill in required fields: First Name, Last Name, Username, Department, and Password.
  6. Set Account type (Learner is default; enable Admin or Instructor toggle if needed).
  7. Assign a Role if enabling Admin access (under Account > Admin section).
  8. Set User Management scope for admin users (All, Department, or Group).
  9. Click Save.

Required fields: First Name, Last Name, Username (must be unique across all users, even if Employee ID or External ID is used as the unique identifier), Department (each user must belong to exactly one department), Password (required even if SSO is enabled)

Watch out for:

  • Username cannot be changed after account creation.
  • A password must be set even for SSO users.
  • Users are set to Learner by default; Admin or Instructor access must be explicitly toggled on.
  • Each user can belong to only one Department.
  • CSV import cannot update the Username field for existing users.
  • Email Address and Gender fields are not required but trigger a format validation check if columns are present in a CSV import - blank values will fail validation, potentially requiring the CSV to be split into multiple files.
  • Scheduled data imports (HRIS/FTP-based) are an additional paid service requiring Professional Services engagement.
Bulk option Availability Notes
CSV import Yes Admin Experience > Users menu > Users Report > User Import (Actions menu, right-hand side)
Domain whitelisting No Automatic domain-based user add
IdP provisioning Yes SAML JIT provisioning available on all plans with SSO enabled (SSO is a paid add-on). Full SCIM provisioning requires Enterprise tier plus SSO add-on, and is only supported on 'Absorb 5 - New Learner Experience'. SAML provisioning is one-time only (creates accounts on first login; does not update existing users).

How to remove or deactivate users

  • Can delete users: Yes
  • Delete/deactivate behavior: Absorb supports both deactivation (setting status to Inactive) and permanent deletion. Deactivation preserves all user data and enrollment history; the user cannot log in but remains searchable by filtering for Inactive status. Deletion is permanent and removes the user record. Deactivation is the recommended approach for offboarding to preserve historical training records.
  1. Log in to the Admin Experience.
  2. Open the Users menu from the left-hand navigation and select Users.
  3. The Users Report defaults to Active users only.
  4. Select the user from the report (checkbox).
  5. From the Actions menu on the right-hand side, select the option to deactivate (set Status to Inactive).
  6. Confirm the action.
Data impact Behavior
Owned records When a user is deactivated, all scheduled reports they created will no longer be sent. If deleted, those scheduled reports and saved layouts are permanently lost. Saved layouts must be manually copied to another account before deletion.
Shared content If the deleted user held the Reviewer Admin role, any in-progress Observation Checklists they were assigned as reviewer are lost. Affected learners must be re-enrolled in the connected course to restart the checklist.
Integrations When a user is deleted from Absorb, downstream integrations (e.g., Together mentorship platform) mark the user as terminated. If the user had no data in the integrated system, they may be immediately deleted from it.
License freed Deactivating a user removes them from the active learner count, which may reduce billing depending on the contract's active learner measurement window. Confirm overage thresholds and measurement periods with your Absorb account manager.

Watch out for:

  • Deactivating a user stops all their scheduled reports from sending, even though the user record is preserved.
  • There is no granular permission to allow an admin to only deactivate/activate users without also being able to edit or delete them - the 'Modify' permission grants all three capabilities simultaneously.
  • Delete and Modify user permissions cannot be separated; admins with Modify access can also delete users.
  • Inactive users do not appear in the default Users Report view; admins must filter by Status = Inactive to find them.
  • Username cannot be reused after deletion - it remains reserved in the system.

License and seat management

Seat type Includes Cost
Active Learner Any user who accesses the LMS during the billing measurement window. Pricing is typically based on active learners (monthly active users), not total registered users. Exact definition of 'active' (e.g., login, course launch, completion) should be confirmed in contract. Custom quote; publicly cited range is approximately $6–12/user/month, varying by learner volume, add-on modules, support tier, and implementation scope.
Blended Billing (Internal/External) Some contracts use a blended billing model distinguishing Internal users (employees) from External users (clients, partners, customers). Departments can be tagged with Internal or External billing type. A tooltip in the UI indicates billing type when assigning users to departments. Contract-specific; rates may differ for internal vs. external learners.
  • Where to check usage: Admin Experience > Reports section (User Activity Report, Course Activity Report). Active user counts are not surfaced in a dedicated license dashboard; usage must be derived from reports or confirmed with the Absorb account/CSM team.
  • How to identify unused seats: Run the User Activity Report filtered by last login date or enrollment activity. Filter the Users Report by Status = Active to identify users who have never logged in or have not been active within the billing window. Inactive users do not appear in the default view and must be filtered separately.
  • Billing notes: Pricing is fully custom and quote-based with no public pricing tiers. Billing is typically tied to active learners, not total registered users. SSO is a paid add-on on all plan tiers. SCIM provisioning requires Enterprise tier plus SSO add-on. Scheduled data imports (HRIS/FTP) are billed separately through Professional Services. Add-on modules (Absorb Create, Absorb Analyze, Absorb Skills, Absorb Content, eCommerce, Mentorship) are separately priced SKUs. Seasonal usage spikes or external audience training can trigger overage fees or tier changes - confirm thresholds and measurement windows in the contract.

The cost of manual management

Manual user management in Absorb compounds across every app touchpoint in your environment. Profile changes from an HRIS - department transfers, job title updates, name corrections - must be applied individually in Absorb because SAML JIT provisioning creates accounts on first login only and never syncs subsequent attribute changes.

The deactivate and delete permissions cannot be separated from the general Modify Users permission, so granting any admin the ability to offboard users also grants them edit and delete access. Admins must filter by Status = Inactive to find deactivated users, since they are hidden from the default Users Report view.

Scheduled reports tied to a deactivated user stop sending silently, with no system alert.

What IT admins are saying

Recurring friction points reported by Absorb administrators center on permission granularity and provisioning gaps. The inability to grant deactivation-only access without also granting full edit and delete rights is a documented open feature request.

Reviewers on G2 and Capterra note that role customization flexibility is limited relative to the platform's overall configurability.

SSO being a paid add-on on every plan tier - rather than included at any base tier - is a consistent cost surprise, particularly for teams that assumed SSO was standard.

The automatic expansion of System Admin and default Admin role permissions when new LMS features are released has also been flagged as an unexpected access-control risk.

Common complaints:

  • SSO is a paid add-on on every plan tier, not included in base pricing.
  • SAML provisioning is one-time only - creates accounts on first login but never updates existing user attributes, forcing manual account management for profile changes.
  • Full SCIM provisioning requires both Enterprise tier and SSO add-on, and only works on 'Absorb 5 - New Learner Experience'; older implementations require migration.
  • Hidden costs for feature upgrades (SCIM, SSO, scheduled data imports, Professional Services).
  • Deactivate and delete permissions cannot be separated from the general Modify Users permission, preventing admins from granting narrow offboarding-only access.
  • Default Admin and System Admin roles automatically receive new permissions when new features are released, creating unexpected access expansion.
  • Out-of-box reporting is limited; advanced analytics require the separately priced Absorb Analyze add-on.
  • CSV import cannot update usernames for existing users.
  • CSV imports for new users can only target one Department per file; multi-department imports require splitting files.
  • Common workflows involve many clicks and lack streamlining, which is frustrating for repetitive admin tasks.
  • Admin role customization flexibility is limited in certain edge cases, sometimes forcing admins to either grant too much or too little access.

Representative quotes (verbatim):

We need to be able to allow certain admins to only activate or deactivate users, but not be able to edit or delete users... this is currently not possible.

The flexibility when it comes to the customization of admin and manager roles is quite limited.

The main shortcoming we experienced is that some common workflows could be streamlined. They can involve a lot of clicks.

The decision

Absorb LMS manual user management is workable for organizations with stable, low-churn user populations and a dedicated LMS administrator. It becomes operationally expensive when headcount changes frequently, when users span multiple external audiences (clients, partners) with different billing types, or when compliance requires tight, auditable offboarding workflows.

The permission model's inability to separate deactivation from full user modification is a concrete blocker for teams that need to delegate narrow offboarding tasks.

SCIM provisioning resolves the attribute-sync gap but requires Enterprise tier plus a separately purchased SSO add-on, and only functions on the Absorb 5 New Learner Experience - older portal implementations require migration before SCIM can be enabled.

Bottom line

Absorb LMS gives administrators a functional but manually intensive user lifecycle workflow. Every app or system feeding identity data into Absorb requires a separate update process unless SCIM is in scope, and SCIM itself sits behind two paid prerequisites (Enterprise tier and SSO add-on).

The permission model is hybrid and reasonably granular for most admin delegation needs, but the inability to isolate deactivation rights from broader user modification access is a real constraint for security-conscious teams.

Organizations with high user turnover, external learner audiences, or strict offboarding audit requirements should factor the cost of those add-ons - and the migration effort for older portal versions - into their total ownership calculation before committing to a manual-only approach.

Automate Absorb LMS workflows without one-off scripts

Stitchflow builds and maintains identity workflows for your exact setup. We cover every app, including the ones without APIs, and run deterministic trigger-to-report workflows with human approvals where they matter.

Every app coverage, including apps without APIs
60+ deep API integrations plus browser automation where needed
Identity graph reconciliation across apps and your IdP
Less than a week to launch, maintained as APIs and admin consoles change
SOC 2 Type II. ~2 hours of your team's time

UpdatedFeb 25, 2026

* Details sourced from official product documentation and admin references.

Keep exploring

Related apps

15Five logo

15Five

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

15Five uses a fixed role-based permission model with six predefined roles: Account Admin, HR Admin, Billing Admin, Group Admin, Manager, and Employee. No custom roles can be constructed. User management lives at Settings gear → People → Manage people p

1Password logo

1Password

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

1Password's admin console at my.1password.com covers the full user lifecycle — invitations, group assignments, vault access, suspension, and deletion — without any third-party tooling. Like every app that mixes role-based and resource-level permissions

8x8 logo

8x8

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

8x8 Admin Console supports full lifecycle user management — create, deactivate, and delete — across its X Series unified communications platform. Every app a user can access (8x8 Work desktop, mobile, web, Agent Workspace) is gated by license assignmen