Stitchflow
Atlassian Statuspage logo

Atlassian Statuspage User Management Guide

Manual workflow

How to add, remove, and manage users with operational caveats that matter in production.

UpdatedFeb 27, 2026

Summary and recommendation

Atlassian Statuspage user management can be run manually, but complexity usually increases with role models, licensing gates, and offboarding dependencies. This guide gives the exact mechanics and where automation has the biggest impact.

Atlassian Statuspage uses a two-layer permission model: product-level roles (Site Admin, Product Admin, Product User, Billing Admin) managed in admin.atlassian.com, and page-level permissions managed in manage.statuspage.io. On Business plans and above, per-page RBAC sub-roles (Incident Manager, Maintenance Manager, Viewer) add a third layer of granularity. No custom roles are supported at any tier.

Team member seats are plan-level allocations, not per-seat charges - the plan price is fixed per subscriber tier. Seat caps range from 2 (Free) to 50 (Enterprise), with additional slots available as add-ons via Atlassian support.

SCIM provisioning requires an Atlassian Guard subscription. SSO must be configured before SCIM can be enabled, and SCIM API keys expire after one year with no automated renewal.

Quick facts

Admin console pathAvatar (top-right) → Users (within manage.statuspage.io); broader org-level user management at admin.atlassian.com → Products → Statuspage → Manage access
Admin console URLOfficial docs
SCIM availableYes
SCIM tier requiredAtlassian Guard subscription
SSO prerequisiteYes

User types and roles

Role Permissions Cannot do Plan required Seat cost Watch out for
Site Admin (Organization Admin) Full control over all Statuspage settings, pages, and users. Can invite new team members, change user access levels, remove or suspend users, and manage product access groups in admin.atlassian.com. Has access to all pages by default. Cannot revoke access from 'Trusted Users' directly; must downgrade them to basic user role or elevate to site admin first. All plans Counts toward team member seat allocation Site admins are included in the Statuspage product access group by default. If this is not intentional, the site-admins group must be manually removed from Statuspage product access in admin.atlassian.com.
Product Admin Can grant and manage role permissions for other users. Has access to all pages by default. Can create incidents, update component statuses, configure pages, and manage team member page permissions. Cannot change a user's product role level (that requires a site admin acting through admin.atlassian.com). Cannot remove team members from the organization. All plans Counts toward team member seat allocation Users invited via admin.atlassian.com are granted all page and role permissions by default, bypassing any page-level restrictions set in manage.statuspage.io.
Product User (Team Member) Default role for users invited through manage.statuspage.io. Can create incidents, update component statuses, and manage pages they have been granted access to. Access can be scoped to specific pages via page permissions. Cannot remove other team members. Cannot change user access levels. Cannot access pages they have not been explicitly granted access to (when page permissions are configured). All plans Counts toward team member seat allocation When invited through Statuspage directly, users receive the Product user role by default. When invited through admin.atlassian.com, the inviter can optionally assign Product admin access.
Billing Admin Receives all Statuspage invoices and manages billing. Not strictly linked to product roles; any user can be granted billing admin permissions through the billing console. Billing admin role alone does not grant access to manage incidents or page content. All plans Does not independently consume a seat unless the user also holds a product role Added as a distinct role in June 2024. The person who signs up for a new Statuspage automatically receives the Billing admin role for all Statuspage entitlements.
RBAC Sub-roles (per page): Incident Manager, Maintenance Manager, Viewer Three additional per-page roles assignable within RBAC. Incident Manager can create/manage incidents. Maintenance Manager can create/manage scheduled maintenance. Viewer has read-only access to the management interface for assigned pages. Sub-roles are scoped per page; a user with only a Viewer sub-role cannot create incidents or modify components on that page. Business, Corporate, Enterprise, or Audience Specific plans only Counts toward team member seat allocation Only Statuspage product admins can grant and manage RBAC role permissions. Users invited via admin.atlassian.com receive all page and role permissions by default, bypassing RBAC scoping.
Trusted User Atlassian-level designation that automatically grants access to all products in the organization, including Statuspage. Trusted user product access cannot be revoked directly. All plans Counts toward Statuspage user/seat allocation To remove a Trusted User from the Statuspage license count, they must be downgraded to a basic user role, or elevated to site admin so their access can then be revoked.

Permission model

  • Model type: role-based
  • Description: Statuspage uses a two-layer permission model. The first layer is product-level roles (Site Admin, Product Admin, Product User, Billing Admin) managed in admin.atlassian.com. The second layer is page-level permissions (which pages a user can access) and, on Business/Corporate/Enterprise/Audience Specific plans, RBAC sub-roles (Incident Manager, Maintenance Manager, Viewer) scoped per page. Page permissions are managed within manage.statuspage.io by product admins. Only site admins can change product-level roles.
  • Custom roles: No
  • Custom roles plan: Not documented
  • Granularity: Page-level scoping available on all plans with 2+ pages. Per-page RBAC sub-roles (3 roles) available on Business, Corporate, Enterprise, and Audience Specific plans only. No custom role creation is supported.

How to add users

  1. Log in to manage.statuspage.io.
  2. Click your avatar in the top-right corner.
  3. Select 'Users' from the menu.
  4. Click 'Add user'.
  5. Enter the new team member's email address.
  6. Click 'Create'.
  7. The new team member receives an email invitation.
  8. Alternatively, site admins can add users via admin.atlassian.com → Products → Statuspage → Manage access → Add groups or users directly.

Required fields: Email address

Watch out for:

  • Only site admins can directly invite new team members. Non-site-admin team members can submit an invite request, but a site admin must approve it in Atlassian admin > Access requests under User management.
  • Users invited through manage.statuspage.io receive the 'Product user' role by default.
  • Users invited through admin.atlassian.com receive all page and role permissions by default, bypassing any page-level restrictions.
  • The number of team members that can be added is capped by the plan's team member allocation. Free: 2, Hobby: 5, Startup: 10, Business: 25, Enterprise: 50.
  • Current team member usage is visible under 'User management' in the profile menu at manage.statuspage.io.
  • Additional team member slots can be purchased as add-ons by contacting Atlassian support.
Bulk option Availability Notes
CSV import No Not documented
Domain whitelisting No Automatic domain-based user add
IdP provisioning Yes Atlassian Guard subscription (SCIM 2.0). SSO via Guard Standard is included at no extra charge for Statuspage users on Startup, Business, and Enterprise plans. Guard Standard is required for SAML SSO. Group sync is not available for Statuspage via SCIM.

How to remove or deactivate users

  • Can delete users: Yes
  • Delete/deactivate behavior: Two options exist, both managed via admin.atlassian.com (not manage.statuspage.io directly). 'Remove' revokes the user's access to the Statuspage site immediately; they are not billed for that site after removal, but their Atlassian account is not permanently deleted and they retain access to other sites/organizations. 'Suspend' temporarily removes access and stops billing for that user on the site; roles and group memberships are restored when access is reinstated. Permanent account deletion is only possible for managed accounts and must be done separately via admin.atlassian.com.
  1. Go to admin.atlassian.com.
  2. Select your organization (if more than one).
  3. Navigate to User management.
  4. Find the user to remove or suspend.
  5. To remove: select 'Remove user' - this revokes site access immediately and stops billing for that user on that site.
  6. To suspend: select 'Suspend access' - this temporarily removes access and stops billing; roles and group memberships are restored on reinstatement.
  7. Alternatively, to remove a user's Statuspage product access specifically: go to admin.atlassian.com → Products → Statuspage → Manage access, then remove the user or their group from Product access.
Data impact Behavior
Owned records Incidents, components, and maintenance records created by the removed user remain on the Statuspage; they are not deleted when the user is removed.
Shared content Page content, subscriber lists, and integrations are unaffected by team member removal.
Integrations API keys and integrations configured by the removed user remain active; they must be manually reviewed and rotated if the user had access to API credentials.
License freed Billing stops for the removed or suspended user on that site immediately upon removal or suspension.

Watch out for:

  • There is no option to remove users directly from manage.statuspage.io; removal must be performed in admin.atlassian.com.
  • Removing a user from a Statuspage site does not remove them from other sites in the organization or permanently delete their Atlassian account.
  • Trusted User product access cannot be revoked directly; the user must be downgraded to a basic user role or elevated to site admin before access can be removed.
  • Only organization admins can deactivate or delete a user across the organization; site admins can remove users from their specific site.
  • If the original account owner/site admin has left the company, Atlassian support must be contacted to reassign ownership.
  • Removing a user and re-inviting them requires reassigning all roles and group memberships from scratch.

License and seat management

Seat type Includes Cost
Team Member (Public Page - Free) 2 team members, 100 subscribers, 25 components, 2 metrics Free
Team Member (Public Page - Hobby) 5 team members, 250 subscribers, 5 metrics $29/month
Team Member (Public Page - Startup) 10 team members, 1,000 subscribers, 10 metrics; SSO via Atlassian Guard Standard included for Statuspage users $99/month
Team Member (Public Page - Business) 25 team members, 5,000 subscribers, 25 metrics; RBAC; SSO via Guard Standard included for Statuspage users $399/month
Team Member (Public Page - Enterprise) 50 team members, 25,000 subscribers, 50 metrics; RBAC; SSO via Guard Standard included for Statuspage users $1,499+/month
Team Member (Private Page - Starter) 5 team members, 50 authenticated page users $79/month
Team Member (Audience Specific Page) Team member allocation varies; audience-specific user groups and components From $300/month (10 groups, 500 users)
  • Where to check usage: manage.statuspage.io → Avatar (top-right) → User management (shows current team member count vs. plan allocation). Billing details at admin.atlassian.com → Billing → Manage subscriptions.
  • How to identify unused seats: No built-in last-login or activity report is available in Statuspage. The activity log (manage.statuspage.io → Activity log) shows recent actions but does not provide a per-user inactivity report. Admins must manually cross-reference the Users list against the activity log to identify inactive team members.
  • Billing notes: Team member seats are plan-level allocations, not per-seat charges; the plan price is fixed per subscriber tier. Additional team member slots can be purchased as add-ons by contacting Atlassian support. Statuspage users on Startup, Business, and Enterprise plans receive Atlassian Guard Standard (SSO) at no extra charge for Statuspage-only users; users who also access other Atlassian products (e.g., Jira) will incur a separate Guard Standard charge for those products. SCIM provisioning requires an Atlassian Guard subscription. SCIM API keys expire after 1 year and must be rotated. Group sync is not supported for Statuspage via SCIM.

The cost of manual management

Every app has an offboarding edge case, and Statuspage's is the Trusted User designation: access cannot be revoked directly. Admins must first downgrade the user to a basic role or elevate them to site admin before removal is possible - a non-obvious workaround that is easy to miss under time pressure.

User removal itself cannot be performed from manage.statuspage.io. Admins must navigate to admin.atlassian.com, creating a split-console workflow that adds friction to every offboarding action.

Identifying inactive seats compounds the problem. Statuspage has no built-in last-login report or per-user inactivity view. Admins must manually cross-reference the Users list against the activity log - a process that does not scale as team size grows.

What IT admins are saying

The most consistent friction point reported by admins is the split between manage.statuspage.io and admin.atlassian.com. User removal, role changes, and suspension all require leaving the Statuspage console entirely, which creates confusion and increases the chance of incomplete offboarding.

A second recurring issue is the invitation path side effect: users added via admin.atlassian.com receive all page and RBAC permissions by default, bypassing any page-level restrictions already configured in manage.statuspage.io.

Teams that rely on page scoping for least-privilege access must audit every invite made through the Atlassian admin path.

The SCIM API key expiry (one year, mandatory rotation as of January 2025) is flagged as an operational risk. There is no automated warning, and a lapsed key silently breaks provisioning until manually rotated.

Common complaints:

  • No option to remove users directly from manage.statuspage.io; admins must navigate to admin.atlassian.com, creating a confusing split UX between the two consoles.
  • Trusted User access cannot be revoked without a workaround (downgrade to basic role or elevate to site admin first), which is non-obvious and underdocumented.
  • Users invited via admin.atlassian.com receive all page and RBAC permissions by default, bypassing any page-level restrictions configured in manage.statuspage.io.
  • RBAC sub-roles (Incident Manager, Maintenance Manager, Viewer) are only available on Business, Corporate, Enterprise, and Audience Specific plans, locking granular access control behind higher-cost tiers.
  • No built-in inactive user report or last-login visibility; identifying unused seats requires manual cross-referencing of the Users list and activity log.
  • SCIM API key expires after 1 year and must be manually rotated; no automated renewal or warning system is prominently documented.
  • Group sync is not available for Statuspage via SCIM/Atlassian Guard, requiring manual group and role assignment after provisioning.
  • Additional Guard Standard cost applies if Statuspage team members also use other Atlassian products (e.g., Jira), making cost estimation complex for mixed-product organizations.
  • If the original account owner leaves the company, ownership transfer requires contacting Atlassian support; there is no self-service ownership transfer.
  • Community reports of confusion between 'site admin' and 'account owner' roles, with site admins unable to see the delete-user option that the documentation describes as available to owners.

The decision

Manual management is viable for small teams on Hobby or Startup plans where seat counts are low and turnover is infrequent. The two-console workflow is manageable at that scale, and the lack of an inactive-user report is a minor inconvenience rather than a real risk.

At Business plan and above - where RBAC sub-roles, larger seat allocations, and stricter compliance requirements apply - the absence of automated provisioning and activity reporting becomes a meaningful gap. Every app in a mid-size or enterprise stack that lacks automated deprovisioning is a potential audit finding.

Teams already running an IdP (Okta, Entra ID, Google Workspace) should evaluate the Guard SCIM path. The key constraints to weigh: group sync is not available for Statuspage, page permissions still require manual configuration, and Guard adds a per-user cost across the entire Atlassian organization.

Bottom line

Atlassian Statuspage's manual user management is functional but split across two consoles, with no inactive-user reporting and a non-obvious Trusted User offboarding workaround. For small teams with low churn, the overhead is manageable.

For teams on Business plans or above - where RBAC, larger seat caps, and compliance expectations apply - the manual process introduces real operational risk: every app without automated deprovisioning is a liability when auditors ask for access evidence.

The Guard SCIM path closes the provisioning gap but does not eliminate the need for manual page-permission management, and the one-year API key expiry requires a standing operational reminder to avoid silent provisioning failures.

Automate Atlassian Statuspage workflows without one-off scripts

Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.

Every app coverage, including apps without APIs
60+ app integrations plus browser automation for apps without APIs
IT graph reconciliation across apps and your IdP
Less than a week to launch, maintained as APIs and admin consoles change
SOC 2 Type II. ~2 hours of your team's time

UpdatedFeb 27, 2026

* Details sourced from official product documentation and admin references.

Keep exploring

Related apps

15Five logo

15Five

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

15Five uses a fixed role-based permission model with six predefined roles: Account Admin, HR Admin, Billing Admin, Group Admin, Manager, and Employee. No custom roles can be constructed. User management lives at Settings gear → People → Manage people p

1Password logo

1Password

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

1Password's admin console at my.1password.com covers the full user lifecycle — invitations, group assignments, vault access, suspension, and deletion — without any third-party tooling. Like every app that mixes role-based and resource-level permissions

8x8 logo

8x8

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

8x8 Admin Console supports full lifecycle user management — create, deactivate, and delete — across its X Series unified communications platform. Every app a user can access (8x8 Work desktop, mobile, web, Agent Workspace) is gated by license assignmen