Stitchflow
Cyberhaven logo

Cyberhaven User Management Guide

Manual workflow

How to add, remove, and manage users with operational caveats that matter in production.

UpdatedMar 17, 2026

Summary and recommendation

Cyberhaven user management can be run manually, but complexity usually increases with role models, licensing gates, and offboarding dependencies. This guide gives the exact mechanics and where automation has the biggest impact.

Cyberhaven is an enterprise data security platform sold under custom contracts.

It does not offer native SCIM provisioning, and no publicly documented self-service user management workflow exists.

When every app in your environment needs a consistent provisioning story, Cyberhaven's console-only model stands out as a manual gap that requires direct vendor involvement to close.

Quick facts

Admin console pathAdministration / Settings > Users and Roles (exact labels vary by tenant)
SCIM availableNo
SCIM tier requiredN/A
SSO prerequisiteNo

User types and roles

Role Permissions Cannot do Plan required Seat cost Watch out for
Administrator Can manage tenant settings, policies, integrations, and portal user access. Cannot change the underlying corporate identities outside the Cyberhaven tenant. Detailed built-in role names are not fully documented in public sources.
Analyst / Operator Can work with policies, incidents, and investigative workflows exposed to their role. May not be able to manage tenant configuration or other users. Exact privileges can vary by module and tenant configuration.

Permission model

  • Model type: role-based
  • Description: Cyberhaven appears to use role-based access within the admin console, but the detailed permission matrix is not publicly documented in full.
  • Custom roles: Unknown
  • Custom roles plan: Not documented
  • Granularity: Expect separation between tenant administration and operational workflows, with exact scopes configured in the tenant.

How to add users

  1. Log in to Cyberhaven as an administrator.
  2. Open the administration or settings area and navigate to users.
  3. Choose the add or invite user action.
  4. Enter the user's work email and assign the appropriate role.
  5. Save the user and complete any SSO or activation steps required by the tenant.

Required fields: Work email address, Role

Watch out for:

  • Public docs do not fully document the invite workflow, so exact labels may vary.
  • If SSO is enabled, upstream IdP assignment may still be required.
Bulk option Availability Notes
CSV import Unknown Not documented
Domain whitelisting Unknown Automatic domain-based user add
IdP provisioning Unknown Not documented

How to remove or deactivate users

  • Can delete users: Unknown
  • Delete/deactivate behavior: Public documentation does not clearly state whether Cyberhaven users are disabled, deleted, or both. Treat lifecycle behavior as tenant-specific unless confirmed in-product.
  1. Open the Cyberhaven users area as an administrator.
  2. Locate the user to offboard.
  3. Disable, revoke, or remove the account using the controls available in that tenant.
  4. Review any integrations, policies, or tokens associated with the departing admin.
Data impact Behavior
Owned records Policies, incidents, and tenant data remain in the workspace; public docs do not describe user-owned object semantics in detail.
Shared content Shared dashboards and policy configurations remain tenant assets unless separately changed.
Integrations Review API keys, service accounts, and integration ownership separately during admin offboarding.
License freed Seat reuse behavior is contract-dependent and not publicly documented in detail.

Watch out for:

  • Offboarding should include integration and token review, not just interactive access removal.

License and seat management

Seat type Includes Cost
Named tenant user Administrative or analyst access to the Cyberhaven tenant.
  • Where to check usage: Administration / Settings > Users and Roles
  • How to identify unused seats: Review the user list and any visible activity metadata in the tenant. No public unused-seat report was verified.
  • Billing notes: Cyberhaven is sold as an enterprise product with custom pricing. Public seat-level billing details are not documented.

The cost of manual management

Because Cyberhaven lacks native SCIM or a public provisioning API, onboarding and offboarding require direct console intervention, which compounds access review overhead at scale. Seat-level billing details are not publicly documented, making it difficult to audit unused licenses without vendor involvement. Teams with frequent user changes will absorb that operational cost continuously.

The decision

When every app in your stack is evaluated for automated lifecycle management, Cyberhaven's current feature set introduces a manual gap that carries real access-risk exposure. Teams managing a large or frequently changing user base should raise SCIM roadmap status directly with their Cyberhaven account team before committing to a provisioning workflow.

Pricing is enterprise-only with custom contracts; no self-serve tier exists to test provisioning behavior independently.

Bottom line

Cyberhaven is a capable enterprise data security tool, but its user lifecycle management story is largely undocumented and appears to be console-only with no confirmed SCIM or public API support.

Organizations with strict joiner-mover-leaver requirements should treat manual provisioning as the current baseline and proactively engage Cyberhaven's team to understand what programmatic options, if any, are available under their contract.

Automate Cyberhaven workflows without one-off scripts

Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.

Every app coverage, including apps without APIs
60+ app integrations plus browser automation for apps without APIs
IT graph reconciliation across apps and your IdP
Less than a week to launch, maintained as APIs and admin consoles change
SOC 2 Type II. ~2 hours of your team's time

UpdatedMar 17, 2026

* Details sourced from official product documentation and admin references.

Keep exploring

Related apps

6sense logo

6sense

Manual Only
AutomationNot Supported
Last updatedFeb 2026

6sense user management lives entirely in Settings > User Management (https://analytics.6sense.com/settings/user-management). The platform uses a role-based access control model scoped per product module — ABM, Sales Intelligence (SI), and Conversationa

Alkami logo

Alkami

Manual Only
AutomationNot Supported
Last updatedMar 2026

Alkami is an enterprise-only digital banking platform sold exclusively to financial institutions such as banks and credit unions. It is not a general-purpose SaaS tool, and its admin and user-management documentation is not publicly available. Independ

AmazingHiring logo

AmazingHiring

Manual Only
AutomationNot Supported
Last updatedMar 2026

AmazingHiring is a recruiter-facing sourcing platform sold on a pay-per-seat, annual billing model. There is no native SCIM support and no publicly documented IdP integration, which means every app lifecycle event — onboarding, role change, offboarding