Stitchflow
Dashlane logo

Dashlane User Management Guide

Manual workflow

How to add, remove, and manage users with operational caveats that matter in production.

UpdatedMar 9, 2026

Summary and recommendation

Dashlane user management can be run manually, but complexity usually increases with role models, licensing gates, and offboarding dependencies. This guide gives the exact mechanics and where automation has the biggest impact.

Dashlane's Admin Console (app.dashlane.com/admin) covers the full user lifecycle: invite, manage groups, and revoke access. The permission model is a strict two-role system - Admin or Member - with no granular sub-roles or read-only admin tiers.

Every app in your stack that relies on shared credentials is affected by how cleanly you manage group membership here, since group assignment is the only mechanism for controlling which shared credentials a member can reach.

Quick facts

Admin console pathapp.dashlane.com → Admin Console (left sidebar)
Admin console URLOfficial docs
SCIM availableYes
SCIM tier requiredBusiness/Omnix
SSO prerequisiteYes

User types and roles

Role Permissions Cannot do Plan required Seat cost Watch out for
Admin Full access to Admin Console: invite/remove members, manage groups, configure SSO/SCIM, view activity logs, manage billing, promote/demote other admins, access shared Spaces settings Cannot access individual members' personal vault items (zero-knowledge architecture enforced); cannot recover member master passwords unless account recovery is configured Business or Omnix Consumes a paid seat ($8/user/month on Business, $11/user/month on Omnix, billed annually) Multiple admins can be assigned, but there is no granular sub-admin or read-only admin role; all admins have equivalent full admin permissions
Member (User) Access to personal vault, access to shared collections/groups the admin has granted, use of SSO if configured Cannot access Admin Console, cannot manage other users, cannot view organization-wide settings Business or Omnix Consumes a paid seat ($8/user/month on Business, $11/user/month on Omnix, billed annually) Members on Business plan also receive a personal Dashlane Premium account bundled with their seat; personal vault data is not visible to admins

Permission model

  • Model type: role-based
  • Description: Dashlane uses a two-role model: Admin and Member. Admins have full administrative access; Members have end-user access only. There are no custom roles, permission sets, or granular permission assignments beyond group-level sharing of credentials and secure notes.
  • Custom roles: No
  • Custom roles plan: Not documented
  • Granularity: Coarse: Admin vs. Member only. Group membership controls which shared credentials a member can access, but there are no per-permission toggles within the admin role.

How to add users

  1. Sign in at app.dashlane.com and navigate to Admin Console
  2. Select 'Members' from the left sidebar
  3. Click 'Invite members'
  4. Enter one or more email addresses in the invite field (comma-separated for multiple)
  5. Click 'Send invitations'
  6. Invited users receive an email prompting them to create or link a Dashlane account and join the organization

Required fields: Email address of the invitee

Watch out for:

  • Invitees must accept the email invitation before they appear as active members and consume a seat
  • Pending invitations count toward seat usage on some billing configurations; verify with Dashlane billing
  • If SSO is enforced, users must authenticate via the configured IdP before accessing the vault; inviting a user whose email domain is not covered by SSO may cause login issues
  • Users already on a personal Dashlane plan will be prompted to merge or keep separate their existing vault when joining a Business plan
Bulk option Availability Notes
CSV import Yes Admin Console → Members → Invite members → 'Import CSV' option; CSV must contain one email address per line
Domain whitelisting No Automatic domain-based user add
IdP provisioning Yes Business or Omnix (SSO must be configured as a prerequisite for SCIM)

How to remove or deactivate users

  • Can delete users: Verify in tenant
  • Delete/deactivate behavior: This app exposes delete operations in its API documentation, but the admin-console path may present removal as deactivation, archiving, or deletion depending on tenant configuration. Confirm whether the UI action is reversible before treating removal as recoverable.
  1. Sign in at app.dashlane.com and navigate to Admin Console
  2. Select 'Members' from the left sidebar
  3. Locate the member to remove
  4. Click the three-dot (⋯) menu next to the member's name
  5. Select 'Revoke access'
  6. Confirm the action in the dialog
Data impact Behavior
Owned records Items stored only in the member's personal vault remain with the member's personal account and are not accessible to the organization. Admins cannot retrieve personal vault items.
Shared content The revoked member immediately loses access to all shared credentials, secure notes, and collections in the Business Space. Shared items remain in the organization's shared groups/collections for other members.
Integrations If SCIM is in use, deprovisioning via the IdP triggers automatic revocation in Dashlane. SSO sessions are terminated upon revocation.
License freed The seat is freed immediately upon revocation and becomes available for a new invite.

Watch out for:

  • Admins cannot recover or export a departing member's personal vault items; only items explicitly shared to the Business Space are retained by the organization
  • If the member was the sole admin, another admin must be promoted before revoking that account to avoid losing admin access
  • Revoked members revert to a free Dashlane personal account (or no account if the free plan has been discontinued as of September 2025); they retain their personal vault data
  • There is no 'suspend' or temporary deactivation state; revocation is immediate and permanent from the organization's perspective

License and seat management

Seat type Includes Cost
Business seat Admin Console access (for admins), Business Space vault, shared groups/collections, SSO, SCIM, activity logs, bundled personal Dashlane Premium account for the member $8/user/month billed annually
Omnix seat All Business seat features plus Dashlane's AI-powered Omnix capabilities (credential risk detection, advanced reporting, and additional security features) $11/user/month billed annually
  • Where to check usage: Admin Console → Members tab displays total active members, pending invitations, and seat count; Admin Console → Billing section shows seat allocation vs. usage
  • How to identify unused seats: Filter the Members list by 'Last activity' date in the Admin Console to identify members who have not logged in recently. No dedicated 'inactive seat' report exists natively; admins must sort/filter manually.
  • Billing notes: Seats are billed per active member. Pending invitations may or may not consume a seat depending on contract terms; confirm with Dashlane account management. Starter, Team, and Standard plans are no longer sold. Free plan discontinued September 2025. Annual billing is required for published per-seat pricing; monthly billing options may differ.

The cost of manual management

Identifying unused seats requires manually sorting the Members list by 'Last activity' date; there is no native inactive-seat report. Pending invitations may consume seats depending on contract terms, and Dashlane's documentation does not resolve this definitively - unexpected billing surprises have been reported.

Offboarding is particularly costly: admins cannot export a departing member's personal vault items, so work credentials stored in the personal space rather than the Business Space are unrecoverable by the organization.

What IT admins are saying

The most consistent friction points reported by admins center on three areas. First, the flat admin model means every admin has identical full permissions - there is no way to assign a read-only or scoped admin role.

Second, there is no enforcement mechanism to require members to store credentials in the Business Space, which leads to credential sprawl across personal vaults. Third, the deprecation of self-hosted SSO caused disruption for organizations that had deployed the on-premises connector.

Common complaints:

  • Self-hosted SSO deprecation caused disruption for organizations that had deployed Dashlane's on-premises SSO connector
  • No granular admin roles: all admins have identical full permissions, making it impossible to assign read-only or limited admin access
  • Admins cannot retrieve or export a departing employee's personal vault items, creating offboarding gaps when employees stored work credentials in their personal space rather than the Business Space
  • No native way to enforce that members store credentials in the Business Space rather than personal vault, leading to credential sprawl
  • Pending invitations behavior around seat consumption is unclear and has caused unexpected billing surprises
  • No built-in inactive seat report; identifying unused licenses requires manual sorting by last activity date
  • SCIM requires SSO as a prerequisite, which increases setup complexity for organizations that want automated provisioning without full SSO deployment

The decision

Dashlane fits teams that want a password manager with SSO and SCIM on a single Business or Omnix plan and can accept a coarse admin model.

It is a poor fit if your compliance posture requires granular admin permissions, if you need to audit or recover credentials from departing employees' personal vaults, or if you need to enforce Business Space storage. Every app whose credentials live in Dashlane is only as well-governed as the group structure admins maintain manually.

Bottom line

Dashlane delivers a capable password management platform with solid SSO and SCIM support on Business and Omnix plans, but its flat two-role admin model and lack of a native inactive-seat report create real operational overhead at scale.

Teams with straightforward provisioning needs and disciplined credential hygiene will find it workable; teams that need granular delegation, enforced vault policies, or reliable offboarding of personal vault data will hit structural limits quickly.

Automate Dashlane workflows without one-off scripts

Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.

Every app coverage, including apps without APIs
60+ app integrations plus browser automation for apps without APIs
IT graph reconciliation across apps and your IdP
Less than a week to launch, maintained as APIs and admin consoles change
SOC 2 Type II. ~2 hours of your team's time

UpdatedMar 9, 2026

* Details sourced from official product documentation and admin references.

Keep exploring

Related apps

15Five logo

15Five

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

15Five uses a fixed role-based permission model with six predefined roles: Account Admin, HR Admin, Billing Admin, Group Admin, Manager, and Employee. No custom roles can be constructed. User management lives at Settings gear → People → Manage people p

1Password logo

1Password

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

1Password's admin console at my.1password.com covers the full user lifecycle — invitations, group assignments, vault access, suspension, and deletion — without any third-party tooling. Like every app that mixes role-based and resource-level permissions

8x8 logo

8x8

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

8x8 Admin Console supports full lifecycle user management — create, deactivate, and delete — across its X Series unified communications platform. Every app a user can access (8x8 Work desktop, mobile, web, Agent Workspace) is gated by license assignmen