Stitchflow
Globalization Partners logo

Globalization Partners User Management Guide

Manual workflow

How to add, remove, and manage users with operational caveats that matter in production.

UpdatedMar 11, 2026

Summary and recommendation

Globalization Partners user management can be run manually, but complexity usually increases with role models, licensing gates, and offboarding dependencies. This guide gives the exact mechanics and where automation has the biggest impact.

Globalization Partners (G-P) delivers employer-of-record and contractor management services through its G-P Meridian platform, which uses role-based access control. Specific role names, permission boundaries, and admin console paths are not publicly documented - help center articles covering provisioning are gated behind authenticated login.

Without native SCIM, every app in your IdP stack that depends on automated lifecycle management will require a manual workaround. IT and HR ops teams should plan to work directly with their G-P account manager to verify current admin workflows.

Quick facts

Admin console pathG-P Meridian employer workspace user administration; exact navigation is help-center gated, but access management is handled inside the customer platform rather than through a public developer console
Admin console URLOfficial docs
SCIM availableNo
SCIM tier requiredEnterprise
SSO prerequisiteYes

User types and roles

Role Permissions Cannot do Plan required Seat cost Watch out for
Employer admin Administrative users manage employer-side workspace access, view worker records, and coordinate onboarding or payroll workflows inside G-P Meridian. Customer platform access No separate admin-seat price publicly documented. Public docs do not publish a detailed role matrix, so exact permission boundaries remain account-specific.
Employer team member Standard employer-side users access the worker, contractor, and compliance workflows assigned to them within the G-P Meridian workspace. Granular admin and billing controls are not publicly documented for non-admin users. Customer platform access No separate admin-seat price publicly documented. Some administrative changes appear to require G-P support or account-team involvement rather than full self-service.

Permission model

  • Model type: role-based
  • Description: G-P Meridian platform uses role-based access control. Specific role names, permission boundaries, and plan requirements are not publicly documented in accessible help articles.
  • Custom roles: Unknown
  • Custom roles plan: Not documented
  • Granularity: Not documented

How to add users

  1. Sign in to the G-P Meridian customer workspace with administrative access.
  2. Open the employer-side user administration area in the platform.
  3. Invite the new internal user with their work email address and assign the appropriate access level for payroll, contractor, or employer-of-record workflows.
  4. If SSO is enabled with Okta or Entra ID, confirm the user is also assigned in the IdP so authentication succeeds.
  5. Validate that the invited user can access only the countries, worker records, and workflows required for their job.

Required fields: Work email address, Access level or role

Watch out for:

  • Help center articles covering user invitation and provisioning steps are gated behind authenticated login; steps cannot be verified from public documentation.
  • No native SCIM provisioning is documented; automated user provisioning via Okta or Entra ID relies on SSO only, not directory sync.
  • SSO is listed as a prerequisite for any IdP-based access; SSO availability tier is not publicly confirmed.
Bulk option Availability Notes
CSV import Unknown Not documented
Domain whitelisting No Automatic domain-based user add
IdP provisioning Yes Enterprise

How to remove or deactivate users

  • Can delete users: Unknown
  • Delete/deactivate behavior: No public documentation confirms whether user accounts can be fully deleted or only deactivated within the G-P Meridian platform.
  1. Open the departing user's record from the G-P Meridian user administration area.
  2. Deactivate the user's platform access or remove them from the employer workspace.
  3. If SSO is enabled, revoke the user's assignment in Okta or Entra ID as part of the same offboarding flow.
  4. Verify that the user no longer has access to worker, payroll, and compliance records after removal.
Data impact Behavior
Owned records Not documented
Shared content Not documented
Integrations Not documented
License freed Not documented

Watch out for:

  • User removal procedures are not publicly documented; customers should consult their G-P account manager or support for offboarding steps.
  • Because G-P manages employer-of-record compliance records, deactivating a platform user may not affect underlying employment or payroll records tied to that user.

License and seat management

Seat type Includes Cost
Contractor Management Contractor onboarding, payments, compliance management via G-P Meridian platform $39/person/month
Employer of Record (EOR) Full EOR services including payroll, benefits administration, tax compliance, platform access $699+/person/month minimum, or approximately 10–20% of employee salary; 12-month minimum commitment
  • Where to check usage: Not documented
  • How to identify unused seats: Not documented
  • Billing notes: Pricing is per employed/contracted worker, not per platform seat/admin user. Volume discounts of 15–25% reported for 50+ hires. Add-ons (background checks, visa processing, recruiting) billed separately. Platform admin user seats do not appear to be separately licensed based on available public information.

The cost of manual management

G-P pricing is per worker, not per admin seat: contractor management runs $39/person/month, while EOR services start at $699+/person/month (or roughly 10–20% of salary) with a 12-month minimum commitment. Volume discounts of 15–25% are reported for 50+ hires. Add-ons - background checks, visa processing, recruiting - are billed separately.

SSO is supported for Okta and Microsoft Entra ID, but directory sync is not confirmed, meaning provisioning overhead falls on administrators manually.

What IT admins are saying

G2 and Capterra reviewers flag the Meridian platform interface as difficult to navigate when managing records across multiple countries. Support response times for access and permission issues are a recurring complaint.

Reviewers also note limited self-service configuration, meaning administrative changes often require opening a support ticket rather than resolving in-platform. The absence of native SCIM is a consistent pain point for IT teams expecting standard directory sync behavior.

Common complaints:

  • G2 and Capterra reviewers note that the G-P Meridian platform interface can be difficult to navigate, particularly for managing multiple employee records across countries.
  • Some users report slow response times from support when resolving platform access or permission issues.
  • Reviewers note limited self-service configuration options within the platform, requiring G-P support involvement for certain administrative changes.
  • No native SCIM support means IT teams cannot automate user lifecycle management through standard directory sync tools like Okta Lifecycle Management or Entra ID provisioning.

The decision

G-P is a strong operational fit for companies hiring internationally who can absorb compliance and payroll complexity into a managed service.

However, every app in a modern SaaS stack that expects SCIM-based provisioning will hit a gap here - there is no public SCIM endpoint, no confirmed delete/deactivate distinction, and no self-serve admin path documented publicly.

Provisioning and deprovisioning depend on manual coordination or HRIS integrations (Workday, BambooHR, ADP, Personio, UKG, SAP SuccessFactors, Greenhouse, HiBob) rather than IdP-native tooling. Teams with strict joiner-mover-leaver automation requirements should confirm SCIM roadmap status directly with G-P before committing.

Bottom line

Globalization Partners is purpose-built for international employment compliance, not for IT-managed access control.

Every app in a modern SaaS stack that expects SCIM-based provisioning will hit a gap here - there is no public SCIM endpoint, no documented delete/deactivate distinction, and no self-serve admin path confirmed in public documentation.

Teams should treat G-P as an HR and legal operations tool, route access questions through their account manager, and not assume IdP automation will cover the user lifecycle.

Automate Globalization Partners workflows without one-off scripts

Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.

Every app coverage, including apps without APIs
60+ app integrations plus browser automation for apps without APIs
IT graph reconciliation across apps and your IdP
Less than a week to launch, maintained as APIs and admin consoles change
SOC 2 Type II. ~2 hours of your team's time

UpdatedMar 11, 2026

* Details sourced from official product documentation and admin references.

Keep exploring

Related apps

6sense logo

6sense

Manual Only
AutomationNot Supported
Last updatedFeb 2026

6sense user management lives entirely in Settings > User Management (https://analytics.6sense.com/settings/user-management). The platform uses a role-based access control model scoped per product module — ABM, Sales Intelligence (SI), and Conversationa

Alkami logo

Alkami

Manual Only
AutomationNot Supported
Last updatedMar 2026

Alkami is an enterprise-only digital banking platform sold exclusively to financial institutions such as banks and credit unions. It is not a general-purpose SaaS tool, and its admin and user-management documentation is not publicly available. Independ

AmazingHiring logo

AmazingHiring

Manual Only
AutomationNot Supported
Last updatedMar 2026

AmazingHiring is a recruiter-facing sourcing platform sold on a pay-per-seat, annual billing model. There is no native SCIM support and no publicly documented IdP integration, which means every app lifecycle event — onboarding, role change, offboarding