Stitchflow
Epic logo

Epic User Management Guide

Manual workflow

How to add, remove, and manage users with operational caveats that matter in production.

UpdatedMar 18, 2026

Summary and recommendation

Epic user management can be run manually, but complexity usually increases with role models, licensing gates, and offboarding dependencies. This guide gives the exact mechanics and where automation has the biggest impact.

Epic is a Hyperspace-based electronic health record platform used primarily by hospitals and large health systems.

Unlike most enterprise SaaS tools, it has no web-based admin console - all user management happens inside the Hyperspace client application itself.

Every app or identity system that needs accurate user state from Epic must account for this constraint from the start.

User management documentation is gated behind the Epic UserWeb customer portal and requires customer credentials to access.

Quick facts

Admin console pathSettings / Administration > Users and Roles (exact labels vary by tenant)
SCIM availableNo
SCIM tier requiredEnterprise
SSO prerequisiteNo

User types and roles

Role Permissions Cannot do Plan required Seat cost Watch out for
System Administrator Full access to Epic system configuration, user account management, security class assignment, and audit tools. Epic's user management documentation is gated behind the Epic UserWeb customer portal and is not publicly available. Role names and permissions vary by Epic module and customer configuration.
End User (Clinician/Staff) Access determined by assigned security class and user record configuration within Epic. Cannot modify their own security class or access rights. Permissions are highly granular and configured per-organization by Epic analysts or system administrators. There is no standard universal role set documented publicly.

Permission model

  • Model type: role-based
  • Description: Epic uses a Security Class system where each user is assigned one or more security classes that define access to activities, reports, and data. Security classes are configured per-organization and can be highly customized. This is documented within Epic UserWeb but not in publicly accessible documentation.
  • Custom roles: Yes
  • Custom roles plan: Not documented
  • Granularity: Activity-level and record-level access controls configured via security classes; granularity is high but configuration is organization-specific.

How to add users

  1. Access Epic's user management tools via the Epic hyperspace application (not a web-based admin console).
  2. Navigate to the user record creation screen (typically via a search or admin activity).
  3. Enter required user fields including name, login ID, and security class assignment.
  4. Assign appropriate security classes, user settings, and provider record linkage if applicable.
  5. Save the user record; the user can then log in with their assigned credentials.

Required fields: User name, Login ID, Security class assignment

Watch out for:

  • Epic is a client-server or Hyperspace-based application; user management is performed inside the Epic application itself, not via a standalone web admin console.
  • Exact steps and field names vary by Epic version (e.g., Epic 2023, Epic 2024) and by organization-specific configuration.
  • User creation workflows are documented in Epic UserWeb, which requires customer credentials to access.
  • Provider users typically require linkage to a provider record in addition to a user account.
Bulk option Availability Notes
CSV import Unknown Not documented
Domain whitelisting Unknown Automatic domain-based user add
IdP provisioning Unknown Not documented

How to remove or deactivate users

  • Can delete users: Unknown
  • Delete/deactivate behavior: Epic's official documentation on user deactivation versus deletion is not publicly available. Based on general EHR compliance requirements (audit trail preservation), deactivation rather than deletion is the standard practice, but this cannot be confirmed from publicly accessible sources.
  1. Open the users area as an administrator.
  2. Locate the user to offboard.
  3. Disable, revoke, or remove the account using the controls available in that tenant.
  4. Review any integrations, service accounts, or credentials associated with the departing user.
Data impact Behavior
Owned records Tenant data remains in the workspace; public docs do not describe user-owned content semantics in detail.
Shared content Shared content and workspace records typically remain available unless separately removed or reassigned.
Integrations Review service credentials, workflow ownership, and integrations separately during admin offboarding.
License freed Seat reuse behavior is contract-dependent and not publicly documented in detail.

Watch out for:

  • Epic user management documentation is behind the Epic UserWeb customer portal and is not publicly verifiable.
  • Healthcare regulatory requirements (HIPAA audit trail obligations) typically require that user records and associated audit logs be retained even after a user is deactivated.

License and seat management

Seat type Includes Cost
Named User Access to the tenant features exposed to the assigned role. Seat entitlements are generally tied to the subscription contract. Custom pricing; determined by contract and plan.
  • Where to check usage: Settings / Administration > Users and Roles
  • How to identify unused seats: Review the tenant user list and any visible login or activity metadata. No public unused-seat report was verified.
  • Billing notes: Epic licensing is negotiated directly with Epic Systems on a custom contract basis. Pricing ranges from approximately $1,200 to over $500 million depending on organization size and modules. No public per-seat pricing is available.

The cost of manual management

Epic licensing is negotiated directly with Epic Systems on a custom contract basis, with no public per-seat pricing available. Pricing ranges from approximately $1,200 to over $500 million depending on organization size and modules selected.

Because every app in your stack that touches Epic provisioning requires manual coordination inside Hyperspace, the operational cost scales with headcount and staff turnover - not with any published tier.

The decision

Epic's permission model is role-based via a Security Class system, where each user is assigned one or more security classes that control access at the activity and record level. Security classes are organization-specific and highly configurable, but that configurability comes with maintenance overhead - dedicated Epic-certified analysts are typically required to manage them.

Every app downstream that depends on role accuracy is exposed to drift when security class changes are not applied promptly. Provider users also require linkage to a separate provider record in addition to a standard user account, adding a step that has no equivalent in most SaaS provisioning flows.

Bottom line

Epic is not a tool you provision through a standard IT workflow. Every app or identity system that needs to stay in sync with Epic user state requires either manual Hyperspace administration or a custom integration built on Epic's FHIR API.

The security class model is powerful but demands ongoing analyst attention, and the lack of public documentation means new administrators are dependent on Epic training resources or internal institutional knowledge to operate it effectively.

Automate Epic workflows without one-off scripts

Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.

Every app coverage, including apps without APIs
60+ app integrations plus browser automation for apps without APIs
IT graph reconciliation across apps and your IdP
Less than a week to launch, maintained as APIs and admin consoles change
SOC 2 Type II. ~2 hours of your team's time

UpdatedMar 18, 2026

* Details sourced from official product documentation and admin references.

Keep exploring

Related apps

Abnormal Security logo

Abnormal Security

API Only
AutomationAPI only
Last updatedMar 2026

Abnormal Security is an enterprise email security platform focused on detecting and investigating threats such as phishing, account takeover (ATO), and vendor email compromise. It does not support SCIM provisioning, which means every app in your stack

ActiveCampaign logo

ActiveCampaign

API Only
AutomationAPI only
Last updatedFeb 2026

ActiveCampaign uses a group-based permission model: every user belongs to exactly one group, and all feature-area access (Contacts, Campaigns, Automations, Deals, Reports, Templates) is configured at the group level, not per individual. The default Adm

ADP logo

ADP

API Only
AutomationAPI only
Last updatedFeb 2026

ADP Workforce Now is a mid-market to enterprise HCM platform that serves as the HR source of record for employee data — payroll, benefits, time, and talent. User access is governed by a hybrid permission model: predefined security roles (Security Maste