Summary and recommendation
Cognism user management can be run manually, but complexity usually increases with role models, licensing gates, and offboarding dependencies. This guide gives the exact mechanics and where automation has the biggest impact.
Cognism is a B2B sales intelligence platform where, like every app in a sales stack, access control starts with understanding the role model. Cognism uses two fixed tiers - Admin and User - managed from Settings → Team Management.
Admins hold all provisioning authority: inviting users, setting per-user credit and export limits, and configuring SSO or SCIM. There are no sub-admin or delegated admin tiers documented in official help content.
Quick facts
| Admin console path | Settings → Admin (top-right user menu) → Team Management |
| Admin console URL | Official docs |
| SCIM available | Yes |
| SCIM tier required | Enterprise |
| SSO prerequisite | Yes |
User types and roles
| Role | Permissions | Cannot do | Plan required | Seat cost | Watch out for |
|---|---|---|---|---|---|
| Admin | Full access to all platform features; can invite, deactivate, and assign roles to users; can configure SSO/SCIM, integrations, billing contacts, and team-level settings; can view usage and export data. | Cannot self-delete the account or downgrade plan without contacting Cognism support. | All plans | Counts as a paid seat | Only Admins can manage users; there is no sub-admin or delegated admin tier documented in official help content. |
| User | Access to prospecting, search, list management, and integrations configured by Admin; can export contacts up to their allocated credit limit. | Cannot invite or remove other users; cannot access billing or team settings; cannot modify integration credentials. | All plans | Counts as a paid seat | Credit (export) limits are set per user by the Admin; users cannot self-adjust their own limits. |
Permission model
- Model type: role-based
- Description: Cognism uses a two-tier role model: Admin and User. Admins control all team and billing settings; Users have access only to prospecting and data features. No custom roles or granular permission sets are documented in official help content.
- Custom roles: No
- Custom roles plan: Not documented
- Granularity: Coarse - two fixed roles only. Admins can set per-user credit/export limits, which is the primary lever for differentiating user access within the User role.
How to add users
- Log in as an Admin and navigate to Settings → Team Management.
- Click 'Invite User' or 'Add User'.
- Enter the new user's email address.
- Assign a role (Admin or User).
- Optionally set a credit/export limit for the user.
- Click 'Send Invite'. The invitee receives an email to set their password and activate their account.
Required fields: Email address, Role (Admin or User)
Watch out for:
- Adding a user consumes a paid seat immediately upon invitation acceptance; confirm available seats before inviting.
- If SSO is enforced, new users must authenticate via the configured IdP (Okta) and cannot use password login.
- Cognism does not publicly document a self-service seat-expansion flow; adding users beyond contracted seats may require contacting the account manager.
| Bulk option | Availability | Notes |
|---|---|---|
| CSV import | No | Not documented |
| Domain whitelisting | No | Automatic domain-based user add |
| IdP provisioning | Yes | Enterprise |
How to remove or deactivate users
- Can delete users: No
- Delete/deactivate behavior: Cognism's documented user management supports deactivation (revoking access) rather than permanent deletion of user accounts. Deactivated users cannot log in but their account record and associated data remain in the system. No permanent delete option is documented in official help content.
- Log in as an Admin and navigate to Settings → Team Management.
- Locate the user in the team list.
- Click the options menu (three dots or similar) next to the user.
- Select 'Deactivate' or 'Remove User'.
- Confirm the action when prompted.
| Data impact | Behavior |
|---|---|
| Owned records | Lists and saved searches created by the deactivated user remain accessible to Admins within the platform. |
| Shared content | Shared lists and team lists remain intact and accessible to remaining active users. |
| Integrations | CRM integration mappings tied to the deactivated user's credentials may need to be reconfigured by an Admin. |
| License freed | Deactivating a user frees the seat, making it available for reassignment. Credit allocations associated with the deactivated user are returned to the team pool. |
Watch out for:
- If SCIM provisioning is active via Okta, deprovisioning the user in Okta will automatically deactivate them in Cognism; manual deactivation in Cognism is still possible but may conflict with IdP state.
- Seat release timing after deactivation relative to billing cycle is not explicitly documented; confirm with Cognism account manager for mid-cycle changes.
- No documented self-service account deletion for end users; removal must be performed by an Admin.
License and seat management
| Seat type | Includes | Cost |
|---|---|---|
| Platinum Seat | Access to Cognism's B2B contact database with unverified contact numbers; prospecting, list export, and CRM integration features. | Approximately $1,500/user/year (plus $15,000/year platform access fee); custom pricing applies |
| Diamond Seat | All Platinum features plus phone-verified mobile numbers (Diamond Data) and intent data signals. | Approximately $2,500/user/year (plus $25,000/year platform access fee); custom pricing applies |
- Where to check usage: Settings → Team Management (shows active users and seat count); Settings → Usage or Analytics (shows credit consumption per user, if available to Admin)
- How to identify unused seats: Admins can review last-login dates and export/credit usage per user in the Team Management section to identify inactive seats. No automated idle-seat alerting is documented.
- Billing notes: Annual contracts only; no monthly billing option. Platform access fees are charged separately from per-seat fees. Seat counts and tier (Platinum vs. Diamond) are set at contract time. Mid-contract seat additions may be prorated; reductions typically take effect at renewal. Pricing is custom and negotiated; published figures ($15K/$25K access fee, $1,500/$2,500 per seat) are indicative and subject to change.
The cost of manual management
Cognism's seat structure separates a platform access fee from per-seat fees, and neither Platinum nor Diamond seats can be reduced mid-contract without engaging the account manager. There is no bulk CSV import; each user must be invited individually through the admin console.
Credit limits must be set manually per user - there is no policy-based allocation or automated idle-seat alerting.
What IT admins are saying
Practitioners consistently flag two friction points: SCIM provisioning is limited to Okta as the sole supported IdP, leaving teams on Microsoft Entra ID, Google Workspace, or OneLogin without an automated provisioning path.
The fixed two-role model is also cited as a constraint for larger teams that need more granular access control. Seat cost inflexibility on annual-only contracts rounds out the most common complaints.
Common complaints:
- Limited IdP options for SCIM provisioning - only Okta is officially supported, with no documented support for Microsoft Entra ID, Google Workspace, or OneLogin.
- No bulk CSV import for users; each user must be invited individually through the admin console.
- Only two fixed roles (Admin and User) with no custom or granular role options, limiting access control flexibility for larger teams.
- Seat cost and contract structure (annual only, separate access fee plus per-seat fee) reported as inflexible for teams that need to scale up or down mid-year.
- Credit/export limits must be manually set per user by an Admin; no automated or policy-based allocation documented.
- No self-service account deletion for end users; all user removal must go through an Admin.
The decision
Every app in a provisioning workflow needs a clear answer on IdP compatibility - for Cognism, that answer is Okta only at the Enterprise tier. If your organization needs Entra ID or Google Workspace SCIM, granular permission tiers, or mid-year seat flexibility, the current platform imposes real operational limits.
Admins should audit last-login and per-user credit consumption in Team Management regularly, since no automated alerting exists for inactive seats.
Bottom line
Cognism's user management is functional but deliberately minimal: two roles, Okta-only SCIM, annual contracts, and manual per-user credit configuration. Every app in a sales stack demands some provisioning discipline, but Cognism's constraints make that discipline entirely manual unless Okta is already in place.
Teams without Okta or with complex access-control requirements should factor in the ongoing admin overhead before committing to an Enterprise contract.
Automate Cognism workflows without one-off scripts
Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.