Stitchflow
Cisco Umbrella logo

Cisco Umbrella User Management Guide

Manual workflow

How to add, remove, and manage users with operational caveats that matter in production.

UpdatedMar 4, 2026

Summary and recommendation

Cisco Umbrella user management can be run manually, but complexity usually increases with role models, licensing gates, and offboarding dependencies. This guide gives the exact mechanics and where automation has the biggest impact.

Cisco Umbrella is a cloud-delivered DNS security and SASE platform that enforces web filtering, threat protection, and identity-based policies across every app and network a user touches.

User identities are not created manually in most deployments - they are synchronized from Active Directory via the Umbrella Virtual Appliance connector or pushed from an IdP via SCIM. Admin accounts (Full Admin or Read-Only) are managed separately from end-user identities and are provisioned by invitation through the dashboard at https://dashboard.umbrella.com.

Quick facts

Admin console pathAdmin > Administrators (for admin account management); Admin > Authentication (for IdP/SCIM); Admin > Licensing (for seat/license review)
Admin console URLOfficial docs
SCIM availableYes
SCIM tier requiredEnterprise
SSO prerequisiteYes

User types and roles

Role Permissions Cannot do Plan required Seat cost Watch out for
Full Admin Full read/write access to all Umbrella dashboard settings, policies, reports, and administrative functions including managing other admins. Cannot exceed the permissions granted by the organization's licensed tier features. All plans No additional cost; admin seats are not separately licensed. Only one account can hold the primary owner/super-admin designation; this is typically the account used to activate the organization.
Read-Only Admin Can view all dashboard sections, reports, and policies but cannot make configuration changes. Cannot create, edit, or delete policies, identities, or other admin accounts. All plans No additional cost. Read-only admins still consume an admin seat but do not consume an end-user license.
End User (Managed Identity) Not a dashboard login role; represents a user identity (from AD, LDAP, or IdP) that policies are applied to. Can access the Umbrella user-facing reporting portal if enabled. Cannot access the administrative dashboard or modify policies. All plans (identity-based policy requires DNS Advantage or higher for full user-level attribution). Consumes a licensed user seat. User identities are typically synchronized from Active Directory via the Umbrella Virtual Appliance or via SCIM from an IdP; they are not manually created one-by-one in most deployments.

Permission model

  • Model type: role-based
  • Description: Cisco Umbrella uses a role-based access control model for dashboard administrators. Built-in roles (Full Admin, Read-Only Admin) are assigned per admin account. There is no support for creating fully custom roles with granular permission sets; admins receive either full or read-only access. End-user identities are managed as policy targets, not as dashboard roles.
  • Custom roles: No
  • Custom roles plan: Not documented
  • Granularity: Coarse - two built-in admin roles (Full and Read-Only). No per-feature or per-policy granular permission assignment for admins.

How to add users

  1. Log in to the Umbrella dashboard at https://dashboard.umbrella.com.
  2. Navigate to Admin > Administrators.
  3. Click Add.
  4. Enter the new admin's email address, first name, and last name.
  5. Select the role: Full Admin or Read-Only Admin.
  6. Click Create. An invitation email is sent to the specified address.
  7. The invitee must accept the email invitation and set a password (or authenticate via SSO if configured) to activate the account.

Required fields: Email address, First name, Last name, Role (Full Admin or Read-Only Admin)

Watch out for:

  • Admin accounts are distinct from end-user identities. Adding an admin does not provision an end-user license.
  • End-user identities for policy enforcement are typically synced from Active Directory via the Umbrella Virtual Appliance (VA) connector, not added manually through the dashboard.
  • SCIM provisioning for end-user identities requires an Enterprise plan and an SSO/IdP integration (Okta, Azure AD/Entra, or OneLogin).
  • If SSO is enforced for the organization, invited admins must authenticate through the configured IdP and cannot use local password login.
  • Cisco ended support for the Roaming Client in April 2025; new deployments must use Cisco Secure Client.
Bulk option Availability Notes
CSV import No Not documented
Domain whitelisting No Automatic domain-based user add
IdP provisioning Yes Enterprise

How to remove or deactivate users

  • Can delete users: Yes
  • Delete/deactivate behavior: This app exposes delete operations in its API documentation, but the admin-console path may present removal as deactivation, archiving, or deletion depending on tenant configuration. Confirm whether the UI action is reversible before treating removal as recoverable.
  1. For admin accounts: Log in to the Umbrella dashboard, navigate to Admin > Administrators, locate the admin account, click the delete/remove icon, and confirm deletion.
  2. For SCIM-provisioned end-user identities: Deprovision or deactivate the user in the connected IdP (Okta, Entra ID, or OneLogin); SCIM will propagate the removal to Umbrella.
  3. For AD-synced identities: Disable or remove the user in Active Directory; the Umbrella Virtual Appliance connector will sync the change on the next polling interval.
Data impact Behavior
Owned records Policies and configurations created by a deleted admin remain in place; they are not automatically removed when the admin account is deleted.
Shared content Reports and policy settings are organization-wide and persist after admin deletion.
Integrations SCIM or AD-synced user identities removed from the source directory are removed from Umbrella identity lists, which may affect policy targeting if those identities were explicitly referenced in policies.
License freed Deleting an end-user identity or deprovisioning via SCIM frees the associated user seat license. Deleting an admin account does not free a user seat (admin accounts are not separately licensed as user seats).

Watch out for:

  • The primary owner/super-admin account cannot be deleted without first transferring ownership.
  • Removing a user identity that is referenced in active policies may cause those policies to fall back to network-level or default policy enforcement.
  • AD sync removal depends on the VA polling interval; removal is not instantaneous.
  • SCIM deprovisioning requires the Enterprise plan and an active IdP integration; without SCIM, manual cleanup in the Umbrella dashboard may be required.

License and seat management

Seat type Includes Cost
DNS Essentials DNS-layer security, basic web filtering, limited reporting. Per-user or per-device licensing. Approximately $2.25–$3.67/user/month (varies by reseller and volume)
DNS Advantage DNS Essentials features plus user-level identity attribution, integration with Cisco SecureX/XDR, enhanced reporting. Approximately $44/user/year on AWS Marketplace; varies by contract
SIG Essentials (formerly Umbrella Pro/Enterprise) DNS + Secure Web Gateway (SWG), cloud-delivered firewall, CASB visibility, remote browser isolation (add-on). Approximately $4–$8/user/month depending on tier and volume
SIG Advantage Full SASE stack including SIG Essentials plus advanced threat intelligence, DLP, and ZTNA capabilities. Custom pricing; requires direct Cisco or reseller quote
  • Where to check usage: Admin > Licensing within the Umbrella dashboard displays current seat consumption, license type, and expiration dates.
  • How to identify unused seats: Compare the list of active identities under Deployments > Core Identities (or the AD Users/Groups sync list) against licensed seat count in Admin > Licensing. Users synced but not associated with any active policy or recent DNS activity can be considered candidates for removal.
  • Billing notes: Licensing is per-user (or per-device for network-only deployments). Cisco Umbrella is sold through Cisco and authorized resellers; pricing is not publicly listed for SIG tiers and requires a quote. The Roaming Client was end-of-support April 2025; organizations must migrate to Cisco Secure Client, which may affect licensing SKUs. SCIM provisioning (for automated seat management) requires the Enterprise/SIG tier.

The cost of manual management

Every app in a security stack carries a hidden cost when offboarding is slow - Umbrella is no exception. AD sync removal is not instantaneous; the Virtual Appliance polling interval introduces a delay that can leave deprovisioned users active in policy enforcement after they have left the organization.

Without SCIM (which requires the Enterprise plan and a fully configured SSO integration), admin cleanup must be done one account at a time - there is no CSV import or bulk removal path for admin accounts. The two-role model (Full Admin vs.

Read-Only) also forces organizations to grant full dashboard access to staff who only need limited scope, increasing blast radius when accounts are not removed promptly.

What IT admins are saying

Practitioners managing Umbrella at scale consistently flag the 200 AD group sync limit as a hard constraint that breaks policy segmentation for large enterprises.

The coarse admin role model - only Full Admin or Read-Only - is a recurring complaint from teams that need delegated administration for helpdesk or regional staff.

The April 2025 end-of-support for the Roaming Client has added redeployment overhead, as organizations must migrate endpoints to Cisco Secure Client, which may affect licensing SKUs.

SCIM provisioning is also noted as unreliable for on-premises AD environments because it requires a direct IdP integration and does not work through the Virtual Appliance connector.

Common complaints:

  • Virtual Appliance SCIM limitation: SCIM provisioning does not work through the Virtual Appliance connector; it requires a direct IdP integration, which limits automation options for on-premises AD environments.
  • 200 group limit: Umbrella enforces a limit on the number of AD groups that can be synchronized, which causes policy management issues for large enterprises.
  • Must migrate from Roaming Client: Cisco ended support for the Umbrella Roaming Client in April 2025, requiring migration to Cisco Secure Client, which involves redeployment effort.
  • Coarse admin roles: Administrators report that the two-role model (Full Admin vs. Read-Only) is insufficient for organizations that need delegated administration with limited scope (e.g., helpdesk staff who should only manage specific policy sets).
  • No bulk admin import: There is no CSV import or bulk creation path for admin accounts; each admin must be invited individually.
  • AD sync latency: User identity removal from Active Directory is not reflected in Umbrella immediately; the VA polling interval introduces a delay that can leave deprovisioned users active in policy enforcement.

The decision

Umbrella is the right choice when DNS-layer security and identity-based policy enforcement are the primary requirements and the organization already operates within the Cisco ecosystem (SecureX/XDR, Secure Client, Meraki). Teams on the Enterprise or SIG tier get SCIM-based lifecycle automation, which meaningfully reduces manual overhead across every app and identity touchpoint.

Organizations on lower tiers, or those running purely on-premises AD without a cloud IdP, will carry more manual provisioning and deprovisioning burden. The coarse admin role model is a real limitation for enterprises that need delegated administration - evaluate whether Full Admin or Read-Only is sufficient before committing.

Bottom line

Cisco Umbrella delivers strong DNS security and SASE capabilities but its identity management story is tiered: automated lifecycle management via SCIM is gated behind the Enterprise plan and requires SSO to be fully configured first.

Manual admin management is invitation-only with no bulk path, and AD sync latency means deprovisioning is never immediate.

For organizations already invested in the Cisco stack with a cloud IdP in place, the automation payoff is real - but teams without those prerequisites should plan for ongoing manual overhead across every app and policy touchpoint.

Automate Cisco Umbrella workflows without one-off scripts

Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.

Every app coverage, including apps without APIs
60+ app integrations plus browser automation for apps without APIs
IT graph reconciliation across apps and your IdP
Less than a week to launch, maintained as APIs and admin consoles change
SOC 2 Type II. ~2 hours of your team's time

UpdatedMar 4, 2026

* Details sourced from official product documentation and admin references.

Keep exploring

Related apps

15Five logo

15Five

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

15Five uses a fixed role-based permission model with six predefined roles: Account Admin, HR Admin, Billing Admin, Group Admin, Manager, and Employee. No custom roles can be constructed. User management lives at Settings gear → People → Manage people p

1Password logo

1Password

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

1Password's admin console at my.1password.com covers the full user lifecycle — invitations, group assignments, vault access, suspension, and deletion — without any third-party tooling. Like every app that mixes role-based and resource-level permissions

8x8 logo

8x8

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

8x8 Admin Console supports full lifecycle user management — create, deactivate, and delete — across its X Series unified communications platform. Every app a user can access (8x8 Work desktop, mobile, web, Agent Workspace) is gated by license assignmen