Stitchflow
Dynatrace logo

Dynatrace User Management Guide

Manual workflow

How to add, remove, and manage users with operational caveats that matter in production.

UpdatedMar 11, 2026

Summary and recommendation

Dynatrace user management can be run manually, but complexity usually increases with role models, licensing gates, and offboarding dependencies. This guide gives the exact mechanics and where automation has the biggest impact.

Dynatrace user management runs through Account Management at myaccount.dynatrace.com, separate from the environment-level console. Access is controlled by a hybrid model: predefined roles (Account Administrator, Environment Administrator, Viewer) combined with a policy-based layer written in Dynatrace's proprietary policy language.

Users are assigned to groups; groups carry the roles and policies that determine what each person can see and do across every app and environment in the account.

Quick facts

Admin console pathDynatrace Account Management → Identity & access management → Users
Admin console URLOfficial docs
SCIM availableYes
SCIM tier requiredEnterprise
SSO prerequisiteYes

User types and roles

Role Permissions Cannot do Plan required Seat cost Watch out for
Account Owner Full account-level control: billing, subscription management, user administration, environment creation, SSO/SCIM configuration. Cannot be removed or demoted via UI by other admins; only the owner can transfer ownership. All plans Included in account; no separate seat charge beyond DPS consumption. Only one Account Owner per account. Ownership transfer requires contacting Dynatrace support.
Account Administrator Manage users, groups, policies, SSO settings, and environments at the account level. Cannot manage billing. Cannot access billing or subscription details; cannot transfer account ownership. All plans No separate seat charge beyond DPS consumption. Account Administrator is an account-level role distinct from environment-level admin roles.
Environment Administrator (predefined role) Full administrative access within a specific Dynatrace environment: settings, integrations, dashboards, user sessions. Cannot manage account-level settings, billing, or other environments unless explicitly granted. All plans No separate seat charge beyond DPS consumption. Role is scoped per environment; must be assigned per environment individually unless using group-level policies.
Viewer (predefined role) Read-only access to dashboards, problems, and monitoring data within assigned environments. Cannot modify settings, create dashboards, or manage integrations. All plans No separate seat charge beyond DPS consumption. Viewer access is environment-scoped; users with no group assignment may see no data at all.
Custom Role (policy-based) Granular permissions defined via Dynatrace policy language; can restrict or grant access to specific entities, settings categories, or API scopes. Cannot exceed the permissions of the assigning administrator (no privilege escalation). Enterprise (SaaS); custom policies require account-level policy management access. No separate seat charge beyond DPS consumption. Policy syntax uses a proprietary Dynatrace policy language; errors in policy statements silently fail to grant access rather than returning errors in all cases.

Permission model

  • Model type: hybrid
  • Description: Dynatrace uses a hybrid model combining predefined roles (e.g., Environment Administrator, Viewer) with a policy-based access control layer. Policies are written in a proprietary policy language and can be applied at account or environment scope. Users are assigned to groups; groups receive roles and policies. Direct user-level role assignment is also supported but group-based assignment is recommended.
  • Custom roles: Yes
  • Custom roles plan: Enterprise (SaaS); policy management available on Enterprise tier with account-level IAM access.
  • Granularity: Environment-level and account-level scoping. Policies can target specific entity types, settings schemas, API token scopes, and management zones. Management zones provide an additional data-access filtering layer on top of roles.

How to add users

  1. Navigate to https://myaccount.dynatrace.com and sign in as Account Owner or Account Administrator.
  2. In the left navigation, select 'Identity & access management' → 'Users'.
  3. Click 'Invite user'.
  4. Enter the user's email address.
  5. Optionally assign the user to one or more groups at invite time.
  6. Click 'Send invitation'. The user receives an email invitation to activate their account.
  7. Once the user accepts the invitation, they appear as 'Active' in the Users list.
  8. To assign environment access, ensure the user is a member of a group that has the appropriate role or policy bound to the target environment.

Required fields: Email address

Watch out for:

  • Users without group membership receive no environment access by default; they can log in but see no data.
  • Invitation emails may be filtered as spam; users should check junk folders.
  • If SSO is enforced, invited users must authenticate via the configured IdP; password-based login is disabled.
  • Domain verification is required before enabling SCIM provisioning; manual invites still work without domain verification.
  • Invited users count toward the account's user list immediately upon invitation, before acceptance.
Bulk option Availability Notes
CSV import No Not documented
Domain whitelisting No Automatic domain-based user add
IdP provisioning Yes Enterprise (SaaS); requires SCIM 2.0 setup with a supported IdP (Okta or Microsoft Entra ID officially documented).

How to remove or deactivate users

  • Can delete users: Yes
  • Delete/deactivate behavior: This app exposes delete operations in its API documentation, but the admin-console path may present removal as deactivation, archiving, or deletion depending on tenant configuration. Confirm whether the UI action is reversible before treating removal as recoverable.
  1. Navigate to https://myaccount.dynatrace.com → 'Identity & access management' → 'Users'.
  2. Locate the user by name or email using the search field.
  3. Click the user's row to open their profile.
  4. To deactivate: click the action menu (three dots) and select 'Deactivate user'. The user's status changes to 'Inactive' and they can no longer log in.
  5. To delete: click the action menu and select 'Delete user'. Confirm the deletion in the dialog. This action is irreversible.
Data impact Behavior
Owned records Dashboards, notebooks, and other content created by the user remain in the environment after deactivation or deletion; ownership is not automatically transferred.
Shared content Shared dashboards and reports remain accessible to other users who have been granted access.
Integrations API tokens created by the deleted user remain active until explicitly revoked; they are not automatically invalidated on user deletion.
License freed Removing or deactivating a user does not directly reduce DPS consumption charges, as Dynatrace billing is consumption-based (host monitoring, log ingestion, etc.) rather than per-seat. However, removing the user eliminates their ability to generate user-session data that could contribute to Digital Experience Monitoring consumption.

Watch out for:

  • API tokens created by a deleted user are NOT automatically revoked; administrators must manually audit and revoke orphaned tokens via Settings → Integration → Dynatrace API → API tokens.
  • Deleting a user is irreversible; the user must be re-invited if access needs to be restored.
  • If SCIM provisioning is active, user deactivation/deletion should be managed in the IdP to avoid sync conflicts; manual deletion in Dynatrace may be overridden on the next SCIM sync cycle.
  • The Account Owner cannot be deleted or deactivated by other administrators.

License and seat management

Seat type Includes Cost
Full-Stack Monitoring (DPS) Infrastructure and application monitoring per 8 GiB host-hour; includes APM, infrastructure, and log analytics consumption. Approximately $0.08/hour per 8 GiB host (consumption-based; actual rates vary by contract).
Infrastructure Monitoring (DPS) Host and infrastructure metrics monitoring without APM. Approximately $0.04/hour per 8 GiB host (consumption-based; actual rates vary by contract).
Log Management and Analytics (DPS) Log ingestion, processing, and querying. Approximately $0.20/GiB ingested (consumption-based; actual rates vary by contract).
Digital Experience Monitoring – Real User Monitoring (DPS) Browser and mobile user session monitoring. Consumption-based per session; rates vary by contract.
  • Where to check usage: Dynatrace Account Management (https://myaccount.dynatrace.com) → 'Subscription' → 'Usage' to view DPS consumption by environment and service type.
  • How to identify unused seats: Review the 'Usage' dashboard in Account Management to identify environments with zero or minimal consumption. Within environments, use Dynatrace's built-in 'License usage' app (Settings → Subscription & licensing → License usage) to see per-host and per-service consumption. Users themselves do not consume a fixed seat license; unused user accounts do not directly incur charges.
  • Billing notes: Dynatrace uses a consumption-based Dynatrace Platform Subscription (DPS) model. There is no per-user seat fee for standard access. Costs are driven by monitored host hours, log volume, session counts, and other metered resources. Enterprise contracts typically include a committed DPS spend with overage rates. A minimum commitment of approximately $2,000/month is typical for enterprise contracts. The 15-day free trial provides limited DPS credits.

The cost of manual management

Dynatrace runs on a consumption-based Dynatrace Platform Subscription (DPS) model - there is no per-user seat fee for standard access. Costs are driven by monitored host hours, log volume ingested, and session counts, not headcount.

That said, SCIM provisioning and account-level IAM controls require the SaaS Enterprise tier; teams on lower tiers must manage users entirely through manual invite and group assignment workflows.

What IT admins are saying

The most consistent friction point reported by administrators is the two-layer access model: a user can hold an Account Administrator role yet see a completely blank environment because no group with environment-level permissions was assigned.

New invitees land in PENDING status and, without group membership, log in successfully but see no data - a silent failure that generates support tickets.

A second recurring issue is orphaned API tokens: deleting a user does not revoke tokens they created, requiring a separate manual audit under Settings → Integration → Dynatrace API → API tokens.

The proprietary policy language for custom roles adds a third layer of complexity; malformed policy statements fail silently rather than returning actionable errors.

Common complaints:

  • Users report that new invitees with no group assignment can log in successfully but see a blank environment with no data, causing confusion about whether the invitation worked correctly.
  • Administrators report difficulty understanding the distinction between account-level roles and environment-level roles, leading to users having account admin access but no environment data access.
  • The proprietary Dynatrace policy language for custom roles has a steep learning curve; errors in policy statements do not always produce clear error messages.
  • API tokens created by deleted users are not automatically revoked, creating a security gap that requires manual auditing.
  • Community members report that SCIM sync conflicts can occur when users are manually modified in Dynatrace while SCIM provisioning is active, requiring re-sync or IdP-side corrections.
  • Some users report that the Account Owner transfer process requires contacting Dynatrace support rather than being self-service, causing delays during organizational changes.
  • The lack of a CSV bulk import for users is noted as a limitation for organizations onboarding large teams without an IdP SCIM setup.

The decision

Manual user management in Dynatrace is workable for small, stable teams but becomes error-prone at scale. Every app and environment requires its own group-policy binding, so onboarding a single user across multiple environments means multiple group assignments - each one a potential miss.

Teams managing more than a handful of environments, or with frequent onboarding and offboarding, should prioritize SCIM provisioning via Okta or Microsoft Entra ID to keep the IdP as the source of truth.

Manual management is a reasonable interim approach only if domain verification and SSO configuration are not yet complete, since both are prerequisites for SCIM.

Bottom line

Dynatrace's access model rewards teams that invest in group structure upfront: get groups, roles, and policies right once, and every subsequent user invite is a single group assignment.

Skip that foundation and every onboarding becomes a multi-step, error-prone process with silent failures when permissions are misconfigured.

The Account Owner transfer limitation - requiring a support ticket rather than a self-service UI action - is a meaningful operational risk worth flagging to IT leadership before an organizational change forces the issue.

Automate Dynatrace workflows without one-off scripts

Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.

Every app coverage, including apps without APIs
60+ app integrations plus browser automation for apps without APIs
IT graph reconciliation across apps and your IdP
Less than a week to launch, maintained as APIs and admin consoles change
SOC 2 Type II. ~2 hours of your team's time

UpdatedMar 11, 2026

* Details sourced from official product documentation and admin references.

Keep exploring

Related apps

15Five logo

15Five

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

15Five uses a fixed role-based permission model with six predefined roles: Account Admin, HR Admin, Billing Admin, Group Admin, Manager, and Employee. No custom roles can be constructed. User management lives at Settings gear → People → Manage people p

1Password logo

1Password

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

1Password's admin console at my.1password.com covers the full user lifecycle — invitations, group assignments, vault access, suspension, and deletion — without any third-party tooling. Like every app that mixes role-based and resource-level permissions

8x8 logo

8x8

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

8x8 Admin Console supports full lifecycle user management — create, deactivate, and delete — across its X Series unified communications platform. Every app a user can access (8x8 Work desktop, mobile, web, Agent Workspace) is gated by license assignmen