Stitchflow
Expel logo

Expel User Management Guide

Manual workflow

How to add, remove, and manage users with operational caveats that matter in production.

UpdatedMar 17, 2026

Summary and recommendation

Expel user management can be run manually, but complexity usually increases with role models, licensing gates, and offboarding dependencies. This guide gives the exact mechanics and where automation has the biggest impact.

Expel is a managed detection and response (MDR) platform built around Expel Workbench (workbench.expel.io).

All user management - adding, editing, locking, and deleting accounts - is handled entirely through the Workbench UI.

There is no native SCIM provisioning, so every app in your stack that relies on automated lifecycle sync will not find that capability here.

Expel supports two built-in roles: Organization Admin and Organization Analyst.

Admins receive full administrative rights;

Analysts are scoped to alert monitoring and investigative work.

There are no publicly documented custom roles or granular permission tiers beyond these two.

Quick facts

Admin console pathAdministration / Settings > Users (exact labels vary by Expel Workbench deployment)
Admin console URLOfficial docs
SCIM availableNo
SCIM tier requiredN/A
SSO prerequisiteNo

User types and roles

Role Permissions Cannot do Plan required Seat cost Watch out for
Administrator Can manage Workbench settings, integrations, and user access. Cannot grant functionality outside the modules and service scope licensed for the Expel tenant. Public docs do not fully enumerate all role variants.
Analyst / Responder Can review alerts, cases, and investigation workflows available to their role. May not be able to change tenant-wide settings or administer other users. Exact permissions can vary by service configuration.

Permission model

  • Model type: role-based
  • Description: Expel Workbench appears to use role-based access controls for tenant access, but the full role matrix is not publicly documented in detail.
  • Custom roles: Unknown
  • Custom roles plan: Not documented
  • Granularity: Expect separation between administrative access and analyst workflows, with tenant-specific scopes.

How to add users

  1. Log in to Expel Workbench as an administrator.
  2. Open the settings or administration area and navigate to users.
  3. Choose the option to add or invite a user.
  4. Enter the user's work email or login identifier and assign the appropriate role.
  5. Save the user and complete any SSO or password onboarding required by the environment.

Required fields: Email address or username, Role

Watch out for:

  • Exact invitation flow and navigation labels may vary by Expel deployment and customer configuration.
  • If SSO is enabled, upstream IdP assignment may still be required.
Bulk option Availability Notes
CSV import Unknown Not documented
Domain whitelisting Unknown Automatic domain-based user add
IdP provisioning Unknown Not documented

How to remove or deactivate users

  • Can delete users: Unknown
  • Delete/deactivate behavior: Public docs do not clearly state whether Expel users are disabled, deleted, or both. Treat the exact lifecycle behavior as tenant-specific unless verified in the product.
  1. Open the users area in Expel Workbench as an administrator.
  2. Locate the user account to offboard.
  3. Disable, revoke, or remove the account using the controls available in that tenant.
  4. Review service integrations and any API credentials associated with the user.
Data impact Behavior
Owned records Alerts, cases, and investigation records remain tenant data; public docs do not describe user-owned content in detail.
Shared content Shared cases, notes, and dashboards remain with the tenant unless separately deleted.
Integrations Review API tokens, case-routing integrations, and service-account ownership during admin offboarding.
License freed Seat reuse behavior is contract-dependent and not publicly documented in detail.

Watch out for:

  • Offboarding should include token and integration review, not just interactive login removal.

License and seat management

Seat type Includes Cost
Named tenant user Administrative or analyst access to Expel Workbench.
  • Where to check usage: Administration / Settings > Users
  • How to identify unused seats: Review the tenant user list and any last-login data visible in Workbench. No public unused-seat report was verified.
  • Billing notes: Expel pricing is service- and contract-based. Public per-seat costs and self-serve license details are not documented.

The cost of manual management

Because Expel has no SCIM or automated provisioning, every joiner, mover, and leaver event requires a manual action in Workbench by an org admin. For SSO-enabled organizations, each new user also requires a separate step: the Workbench app must be assigned to that user in the SSO provider - a two-system touch per user change.

Offboarding carries a hard edge: deleting a user is immediate and permanent, with no deactivation buffer. Admins must be deliberate about timing, since there is no soft-lock-then-delete workflow - only a Lock/Unlock toggle or an outright delete.

Pricing is enterprise/custom with no publicly documented per-seat structure, so license cost tracking cannot be automated from available data.

The decision

Expel Workbench is the right fit for security operations teams that need a managed MDR layer and are comfortable with UI-driven user administration.

It is not suited for organizations that require automated provisioning or deprovisioning across every app via directory sync - the absence of SCIM means offboarding gaps are a real operational risk at scale.

SSO integration (Okta, Azure AD, OneLogin) is supported and reduces per-login friction, but it does not replace the need for manual user creation inside Workbench itself. Teams with high employee turnover or frequent role changes should factor in the admin overhead of maintaining Workbench access in parallel with their IdP.

Bottom line

Expel Workbench delivers strong MDR capabilities but ships with a fully manual user lifecycle model: no SCIM, no automated provisioning, and a permanent-delete-only offboarding path.

Org admins must manage every access change directly in the Workbench UI, and SSO users require a coordinated two-step setup across both Workbench and the SSO provider.

For teams prioritizing access hygiene at scale, this gap warrants a documented manual runbook and a clear offboarding checklist to prevent stale access from persisting after employee departures.

Automate Expel workflows without one-off scripts

Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.

Every app coverage, including apps without APIs
60+ app integrations plus browser automation for apps without APIs
IT graph reconciliation across apps and your IdP
Less than a week to launch, maintained as APIs and admin consoles change
SOC 2 Type II. ~2 hours of your team's time

UpdatedMar 17, 2026

* Details sourced from official product documentation and admin references.

Keep exploring

Related apps

6sense logo

6sense

Manual Only
AutomationNot Supported
Last updatedFeb 2026

6sense user management lives entirely in Settings > User Management (https://analytics.6sense.com/settings/user-management). The platform uses a role-based access control model scoped per product module — ABM, Sales Intelligence (SI), and Conversationa

Alkami logo

Alkami

Manual Only
AutomationNot Supported
Last updatedMar 2026

Alkami is an enterprise-only digital banking platform sold exclusively to financial institutions such as banks and credit unions. It is not a general-purpose SaaS tool, and its admin and user-management documentation is not publicly available. Independ

AmazingHiring logo

AmazingHiring

Manual Only
AutomationNot Supported
Last updatedMar 2026

AmazingHiring is a recruiter-facing sourcing platform sold on a pay-per-seat, annual billing model. There is no native SCIM support and no publicly documented IdP integration, which means every app lifecycle event — onboarding, role change, offboarding