Summary and recommendation
Bullhorn user management can be run manually, but complexity usually increases with role models, licensing gates, and offboarding dependencies. This guide gives the exact mechanics and where automation has the biggest impact.
Bullhorn user management lives under Menu > Admin > User Management and is accessible only to Administrator-role accounts.
Every app in a staffing org that touches recruiter workflows depends on accurate seat and role hygiene here misconfigured roles can silently expose or hide candidate, job, and placement records across departments.
Bullhorn uses a role-based permission model with entity-level and field-level controls, plus an optional department/ownership partitioning layer for data isolation.
Quick facts
| Admin console path | Menu (hamburger icon) > Admin > User Management |
| Admin console URL | Official docs |
| SCIM available | Yes |
| SCIM tier required | Corporate/Enterprise |
| SSO prerequisite | No |
User types and roles
| Role | Permissions | Cannot do | Plan required | Seat cost | Watch out for |
|---|---|---|---|---|---|
| Administrator | Full system access including user management, configuration, field mappings, and all ATS/CRM data. | Administrator role grants access to all records regardless of ownership or department restrictions set on other roles. | |||
| Standard User (Recruiter/Account Manager) | Access to candidate, contact, job, and placement records as defined by assigned user role and department/ownership rules. | Cannot access Admin menu or manage other users unless explicitly granted admin-level permissions. | Record visibility is controlled by a combination of user role permissions and data partitioning (department/ownership) settings; misconfigured roles can expose or hide records unintentionally. | ||
| Read-Only User | View-only access to records; cannot create, edit, or delete records. | Cannot add, edit, or delete any records. | Availability and cost of read-only seats varies by contract; confirm with Bullhorn account manager. |
Permission model
- Model type: role-based
- Description: Bullhorn uses a role-based permission model. Each user is assigned a User Role that defines which entities (candidates, jobs, placements, etc.) they can view, add, edit, or delete. Roles are configured by administrators and can be customized at a granular entity and field level. Data visibility can be further restricted by department and record ownership settings.
- Custom roles: Yes
- Custom roles plan: Not documented
- Granularity: Entity-level (candidate, contact, job, placement, etc.) with field-level visibility and edit controls per role. Ownership and department-based data partitioning available as an additional layer.
How to add users
- Log in as an Administrator.
- Navigate to Menu > Admin > User Management.
- Click 'Add New User' or the equivalent 'New' button.
- Enter required user details: first name, last name, username, email address.
- Assign a User Role from the available role list.
- Set department assignment if applicable.
- Set a temporary password or trigger an email invitation depending on configuration.
- Save the new user record.
Required fields: First name, Last name, Username, Email address, User Role
Watch out for:
- Usernames must be unique across the Bullhorn instance and cannot be changed after creation.
- The user role must be configured before adding users; assigning an incorrect role may grant unintended data access.
- New users may not receive an activation email automatically depending on SSO or password configuration; administrators may need to manually communicate credentials.
- Adding users beyond contracted seat count may trigger billing changes; confirm seat limits with Bullhorn account manager before provisioning.
| Bulk option | Availability | Notes |
|---|---|---|
| CSV import | No | Not documented |
| Domain whitelisting | No | Automatic domain-based user add |
| IdP provisioning | Yes | Corporate/Enterprise (SCIM provisioning requires Enterprise tier per context data) |
How to remove or deactivate users
- Can delete users: No
- Delete/deactivate behavior: Bullhorn does not delete user accounts. Users are deactivated (marked as inactive), which prevents login but preserves all associated records, activity history, and ownership data. This is consistent with Bullhorn's audit trail and data integrity requirements.
- Log in as an Administrator.
- Navigate to Menu > Admin > User Management.
- Search for and open the target user record.
- Set the user's status to 'Inactive' or uncheck the 'Active' flag.
- Save the record.
| Data impact | Behavior |
|---|---|
| Owned records | Records owned by the deactivated user remain in the system and retain the original owner attribution. Ownership can be reassigned to an active user by an administrator. |
| Shared content | Shared notes, tasks, and activity history associated with the deactivated user are preserved and remain visible to users with appropriate access. |
| Integrations | API tokens or integration credentials tied to the deactivated user account may stop functioning; review and reassign any service account integrations before deactivating. |
| License freed | Deactivating a user frees the seat for reassignment; confirm with Bullhorn account management whether the seat count is adjusted in billing. |
Watch out for:
- Deactivated users cannot log in but their username cannot be reused for a new user account.
- If the departing user owned active job orders or placements, ownership should be reassigned before deactivation to avoid workflow disruption.
- API integrations or automation rules referencing the deactivated user's credentials will fail after deactivation.
License and seat management
| Seat type | Includes | Cost |
|---|---|---|
| Full User Seat | Full ATS/CRM access per assigned role; includes recruiter, account manager, and administrator personas. | Reported range $99–$315/user/month depending on plan tier; exact pricing determined by contract. |
| Read-Only Seat | View-only access to records; no create/edit/delete capability. |
- Where to check usage: Menu > Admin > User Management - filter by Active status to view all active (billable) users.
- How to identify unused seats: Sort active users by Last Login date in User Management to identify accounts with no recent activity. Bullhorn does not provide a native 'unused seat' report; administrators must manually review last login timestamps.
- Billing notes: Bullhorn is sold on annual contracts with a fixed seat count. Adding users beyond the contracted number requires contacting the Bullhorn account manager. Deactivating users may not automatically reduce the billed seat count mid-contract; verify terms with Bullhorn directly.
The cost of manual management
Bullhorn is sold on annual contracts with a fixed seat count; adding users beyond that count requires contacting your account manager, and deactivating users mid-contract may not automatically reduce your billed seat count. Full user seats are reported in the $99–$315/user/month range depending on plan tier;
read-only seat pricing is not publicly listed and must be confirmed with Bullhorn directly. There is no native bulk-import path - every user must be created individually through the UI, and usernames cannot be changed after creation, which creates friction when employees change names or email addresses.
What IT admins are saying
Community evidence is not specific enough to quote or summarize yet for this app.
The decision
Bullhorn's native SCIM 2.0 support is gated to Corporate/Enterprise plan tiers. If your contract sits below that tier, automated provisioning requires either the REST API or fully manual administration.
For teams managing every app in their stack through a centralized IdP, confirming SCIM availability and the tenant-specific SCIM endpoint with your Bullhorn account team is the right first step before committing to a provisioning architecture.
Bottom line
Bullhorn's user management is functional but deliberately manual by default - no bulk import, no unused-seat reporting, and no automatic record reassignment on deactivation.
Teams on Corporate or Enterprise plans can unlock SCIM 2.0 to reduce that overhead, but the SCIM endpoint is not self-service and must be provisioned by Bullhorn.
For organizations where recruiter headcount changes frequently, the combination of annual seat contracts and manual-only provisioning on lower tiers makes proactive seat auditing a recurring operational necessity.
Automate Bullhorn workflows without one-off scripts
Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.