Stitchflow
Laika logo

Laika User Management Guide

Manual workflow

How to add, remove, and manage users with operational caveats that matter in production.

UpdatedMar 11, 2026

Summary and recommendation

Laika user management can be run manually, but complexity usually increases with role models, licensing gates, and offboarding dependencies. This guide gives the exact mechanics and where automation has the biggest impact.

Laika - now fully rebranded as Thoropass - is a compliance automation platform covering SOC 2, ISO 27001, HIPAA, HITRUST, and related frameworks. It pairs software with in-house auditors, positioning itself as an end-to-end solution rather than a standalone tool.

User management inside the platform is not automated: there is no native SCIM provisioning on any plan tier, so every app in your joiner/mover/leaver workflow that touches Thoropass must be handled manually or delegated to an upstream identity provider.

Quick facts

Admin console pathThoropass / Laika workspace settings and team-management area inside the customer portal; exact public navigation is help-center gated
Admin console URLOfficial docs
SCIM availableNo
SCIM tier requiredEnterprise
SSO prerequisiteNo

User types and roles

Role Permissions Cannot do Plan required Seat cost Watch out for
Admin Administrative users manage compliance program settings, team access, evidence requests, integrations, and auditor coordination inside the Thoropass workspace. Customer platform access No public admin-seat price documented. The Thoropass rebrand means some legacy Laika references may not match current admin labels.
Contributor / team member Contributors upload evidence, respond to requests, and participate in compliance workflows assigned to them. Granular admin and account-wide configuration permissions are not publicly documented for non-admin users. Customer platform access No public admin-seat price documented. Exact role names and permission boundaries are not publicly accessible without a customer login.

Permission model

  • Model type: role-based
  • Description: Thoropass / Laika uses a role-based workspace model for admins and contributing team members, but the public help center does not expose a complete role matrix.
  • Custom roles: Unknown
  • Custom roles plan: Not documented
  • Granularity: Role-level access to compliance workflows and evidence tasks; finer permission detail is not publicly documented.

How to add users

  1. Sign in to the Thoropass workspace with administrative access.
  2. Open the team or user-management area in the customer portal.
  3. Invite the new user with their work email address and assign the appropriate access level for the compliance program.
  4. If SSO is enabled with Okta or Entra ID, confirm the user is also assigned in the IdP before first login.
  5. Verify the user can access only the evidence requests, tasks, and frameworks required for their role.

Required fields: Work email address, Role or access level

Watch out for:

  • No SCIM provisioning is documented, so user lifecycle management remains manual even when SSO is enabled.
  • Public admin help articles are login-gated, which limits pre-purchase verification of the exact invite flow.
Bulk option Availability Notes
CSV import Unknown Not documented
Domain whitelisting No Automatic domain-based user add
IdP provisioning Yes Enterprise

How to remove or deactivate users

  • Can delete users: Unknown
  • Delete/deactivate behavior: Not documented
  1. Open the departing user's record from the Thoropass team-management area.
  2. Deactivate the user or revoke their access to the workspace.
  3. If SSO is enabled, remove the user from the Okta or Entra ID assignment as part of the same offboarding workflow.
  4. Review any open evidence requests or compliance tasks assigned to the user and reassign them before final removal.
Data impact Behavior
Owned records Not documented
Shared content Not documented
Integrations Not documented
License freed Not documented

License and seat management

Seat type Includes Cost
Standard platform access Core compliance workspace access, evidence collection, and control-management workflows. Custom pricing; public estimates start around $8,700/year.
Platform access with audit package Compliance workspace plus bundled SOC 2 audit or broader compliance services depending on contract. Custom pricing; public estimates around $14,500/year and up.
  • Where to check usage: Not documented
  • How to identify unused seats: Not documented
  • Billing notes: Custom pricing; approximate base ~$8,700/year (Standard), ~$14,500/year (with SOC 2 audit), Enterprise tier custom. Rebranded to Thoropass. Seat-level billing details not publicly documented.

The cost of manual management

Without SCIM, onboarding and offboarding Thoropass users requires direct admin action inside the platform for every personnel change. Thoropass supports just-in-time provisioning via SSO (Okta and Microsoft Entra ID are both documented), meaning a user account is created on first authenticated login - but deprovisioning is not mirrored automatically back from the IdP.

Seat-level billing details are not publicly documented, so the cost of stale or over-provisioned accounts cannot be estimated without a vendor conversation. Admins should treat Thoropass as a manually-managed seat until SCIM support is confirmed in writing from the vendor.

What IT admins are saying

Public documentation on user roles, permissions, and admin workflows sits behind a Thoropass account login, making pre-purchase evaluation of user management capabilities difficult.

The platform rebrand from Laika to Thoropass has produced fragmented third-party documentation; any non-official source referencing "Laika" admin workflows should be treated as potentially outdated.

Community reviewers note the UI can feel cluttered when managing many controls or contributors, which compounds the friction of manual user administration at scale.

Common complaints:

  • Public documentation on user roles, permissions, and admin workflows is not accessible without a Thoropass account login, making pre-purchase evaluation of user management capabilities difficult.
  • No SCIM provisioning is available regardless of plan tier, meaning user lifecycle management must be handled manually or via SSO-only integrations (Okta, Entra ID supported).
  • The platform rebrand from Laika to Thoropass has resulted in fragmented or outdated third-party documentation, reducing the reliability of any non-official sources.

The decision

Thoropass is a strong fit for teams that need bundled compliance automation and audit services across multiple frameworks and are comfortable managing user lifecycle through their IdP (Okta or Entra ID) rather than via SCIM.

It is a poor fit for IT or security ops teams that require automated provisioning and deprovisioning as a hard requirement - no roadmap for native SCIM has been publicly disclosed.

If your organization already runs Okta or Entra ID, configuring SSO with just-in-time provisioning is the most practical path to reducing manual overhead, with the explicit caveat that offboarding still requires a manual step inside Thoropass or IdP-side session termination.

Bottom line

Thoropass (formerly Laika) delivers genuine value as a compliance automation and audit platform, but its user lifecycle story is underdeveloped relative to peers: no SCIM, no public API for provisioning, and admin documentation locked behind a login wall.

Every app in a mature IT environment benefits from automated provisioning; Thoropass currently cannot participate in that automation natively. Teams should plan for manual offboarding steps and validate seat-level billing exposure directly with the vendor before scaling headcount on the platform.

Automate Laika workflows without one-off scripts

Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.

Every app coverage, including apps without APIs
60+ app integrations plus browser automation for apps without APIs
IT graph reconciliation across apps and your IdP
Less than a week to launch, maintained as APIs and admin consoles change
SOC 2 Type II. ~2 hours of your team's time

UpdatedMar 11, 2026

* Details sourced from official product documentation and admin references.

Keep exploring

Related apps

6sense logo

6sense

Manual Only
AutomationNot Supported
Last updatedFeb 2026

6sense user management lives entirely in Settings > User Management (https://analytics.6sense.com/settings/user-management). The platform uses a role-based access control model scoped per product module — ABM, Sales Intelligence (SI), and Conversationa

Alkami logo

Alkami

Manual Only
AutomationNot Supported
Last updatedMar 2026

Alkami is an enterprise-only digital banking platform sold exclusively to financial institutions such as banks and credit unions. It is not a general-purpose SaaS tool, and its admin and user-management documentation is not publicly available. Independ

AmazingHiring logo

AmazingHiring

Manual Only
AutomationNot Supported
Last updatedMar 2026

AmazingHiring is a recruiter-facing sourcing platform sold on a pay-per-seat, annual billing model. There is no native SCIM support and no publicly documented IdP integration, which means every app lifecycle event — onboarding, role change, offboarding