Stitchflow
MadKudu logo

MadKudu User Management Guide

Manual workflow

How to add, remove, and manage users with operational caveats that matter in production.

UpdatedMar 17, 2026

Summary and recommendation

MadKudu user management can be run manually, but complexity usually increases with role models, licensing gates, and offboarding dependencies. This guide gives the exact mechanics and where automation has the biggest impact.

MadKudu does not support SCIM provisioning, and the available documentation does not surface a structured admin console path, defined user types, or a documented permission model.

This means every app lifecycle action - adding seats, adjusting roles, removing leavers - must be handled directly inside the MadKudu UI with no automation layer available through standard IdP connectors.

Because no deactivation-vs-deletion distinction is documented, offboarding carries real access risk: without a confirmed deactivation flow, teams cannot assume that removing a user from an IdP group will revoke MadKudu access.

Manual verification inside the product is required at every offboarding event.

Quick facts

Admin console pathSettings / Administration > Users and Roles (exact labels vary by tenant)
SCIM availableNo
SCIM tier requiredN/A
SSO prerequisiteNo

User types and roles

Role Permissions Cannot do Plan required Seat cost Watch out for
Admin Can manage tenant settings, integrations, and user access. Cannot grant capabilities outside the modules or features enabled for the tenant. Detailed built-in role names are not fully documented publicly.
Standard User Can use the core product features exposed to their assigned role. May not be able to manage tenant settings, integrations, or other users. Exact privileges can vary by tenant configuration and contract scope.

Permission model

  • Model type: role-based
  • Description: MadKudu appears to use role-based access for tenant administration and general product use, but the detailed permission matrix is not publicly documented in full.
  • Custom roles: Unknown
  • Custom roles plan: Not documented
  • Granularity: Expect administrative access to be separated from standard user access, with exact scopes configured per tenant.

How to add users

  1. Log in as an administrator.
  2. Open settings or administration and navigate to users.
  3. Choose the add or invite user action.
  4. Enter the user's work email and assign the appropriate role.
  5. Save the user and complete any activation or SSO steps required by the tenant.

Required fields: Work email address, Role

Watch out for:

  • Public documentation for user administration is limited, so exact labels may vary by tenant.
  • If SSO is enabled, upstream IdP assignment may still be required before the user can sign in.
Bulk option Availability Notes
CSV import Unknown Not documented
Domain whitelisting Unknown Automatic domain-based user add
IdP provisioning Unknown Not documented

How to remove or deactivate users

  • Can delete users: Unknown
  • Delete/deactivate behavior: Public docs do not clearly document whether users are disabled, deleted, or both. Treat lifecycle behavior as tenant-specific unless confirmed in-product.
  1. Open the users area as an administrator.
  2. Locate the user to offboard.
  3. Disable, revoke, or remove the account using the controls available in that tenant.
  4. Review any integrations, service accounts, or credentials associated with the departing user.
Data impact Behavior
Owned records Tenant data remains in the workspace; public docs do not describe user-owned content semantics in detail.
Shared content Shared content and workspace records typically remain available unless separately removed or reassigned.
Integrations Review service credentials, workflow ownership, and integrations separately during admin offboarding.
License freed Seat reuse behavior is contract-dependent and not publicly documented in detail.

Watch out for:

  • Offboarding should include token, integration, and service-account review, not just interactive login removal.

License and seat management

Seat type Includes Cost
Named User Access to the tenant features exposed to the assigned role. Seat entitlements are generally tied to the subscription contract. Custom pricing; determined by contract and plan.
  • Where to check usage: Settings / Administration > Users and Roles
  • How to identify unused seats: Review the tenant user list and any visible login or activity metadata. No public unused-seat report was verified.
  • Billing notes: MadKudu is sold primarily through custom or enterprise contracts. Public seat pricing and detailed licensing terms are not broadly disclosed.

The cost of manual management

Every app in a portfolio that lacks SCIM or a user-management API creates a recurring coordination cost - and MadKudu sits firmly in that category. Provisioning and deprovisioning must be triggered manually, which means access reviews, onboarding checklists, and offboarding runbooks all require a human step that cannot be delegated to directory sync.

License visibility is similarly limited: no documented path exists for checking seat usage or identifying unused licenses programmatically. Teams relying on MadKudu at the Growth ($999/mo) or Enterprise ($2,499/mo) tier should account for this overhead when estimating total administration cost.

The decision

MadKudu is appropriate for teams that can absorb fully manual provisioning workflows and do not require IdP-driven lifecycle automation. It is a poor fit for organizations with strict joiner-mover-leaver SLAs or audit requirements that depend on automated deprovisioning evidence.

Before deploying at scale, confirm directly with MadKudu support whether enterprise SSO or any private provisioning capability exists - the public documentation does not resolve this question.

Bottom line

MadKudu has no SCIM support, no documented user-management API, and no surfaced admin console path, making it one of the more operationally opaque tools in a typical GTM stack.

Every app that forces fully manual provisioning adds compounding overhead to IT and RevOps teams, particularly at offboarding where unverified access removal creates compliance exposure.

Teams at the Growth or Enterprise pricing tier should weigh that administration burden explicitly, and should contact MadKudu directly to determine whether any private or enterprise-tier provisioning options exist beyond what public documentation describes.

Automate MadKudu workflows without one-off scripts

Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.

Every app coverage, including apps without APIs
60+ app integrations plus browser automation for apps without APIs
IT graph reconciliation across apps and your IdP
Less than a week to launch, maintained as APIs and admin consoles change
SOC 2 Type II. ~2 hours of your team's time

UpdatedMar 17, 2026

* Details sourced from official product documentation and admin references.

Keep exploring

Related apps

6sense logo

6sense

Manual Only
AutomationNot Supported
Last updatedFeb 2026

6sense user management lives entirely in Settings > User Management (https://analytics.6sense.com/settings/user-management). The platform uses a role-based access control model scoped per product module — ABM, Sales Intelligence (SI), and Conversationa

Alkami logo

Alkami

Manual Only
AutomationNot Supported
Last updatedMar 2026

Alkami is an enterprise-only digital banking platform sold exclusively to financial institutions such as banks and credit unions. It is not a general-purpose SaaS tool, and its admin and user-management documentation is not publicly available. Independ

AmazingHiring logo

AmazingHiring

Manual Only
AutomationNot Supported
Last updatedMar 2026

AmazingHiring is a recruiter-facing sourcing platform sold on a pay-per-seat, annual billing model. There is no native SCIM support and no publicly documented IdP integration, which means every app lifecycle event — onboarding, role change, offboarding