Stitchflow
Marketo logo

Marketo User Management Guide

Manual workflow

How to add, remove, and manage users with operational caveats that matter in production.

UpdatedFeb 19, 2026

Summary and recommendation

Marketo user management can be run manually, but complexity usually increases with role models, licensing gates, and offboarding dependencies. This guide gives the exact mechanics and where automation has the biggest impact.

Marketo Engage uses a fully custom role-based access model with 80+ granular permission checkboxes. There is no native SCIM endpoint - provisioning via SCIM is only available through Adobe Admin Console using Azure AD or Google Workspace as the IdP. Okta SCIM is not supported.

Instances not yet migrated to Adobe Identity (Adobe IMS) have no automated provisioning path at all. Every user must be invited individually through the UI, and invitation links expire after 3 days.

Quick facts

Admin console pathAdmin > Users & Roles (legacy Marketo identity) OR Adobe Admin Console > Products > Marketo Engage (Adobe IMS-migrated instances)
Admin console URLOfficial docs
SCIM availableNo
SCIM tier requiredEnterprise
SSO prerequisiteNo

User types and roles

Role Permissions Cannot do Plan required Seat cost Watch out for
Admin (built-in) Full access to all Marketo Engage features including user management, integrations, workspace configuration, and all marketing activities. Cannot be restricted; built-in Admin role permissions cannot be edited. All plans Counted as a named user seat The built-in Admin role cannot be modified or deleted. Admins can create additional custom roles with admin-level permissions but the default Admin role itself is immutable.
Standard User (custom role assigned) Permissions are fully determined by the custom role assigned. Can include access to Marketing Activities, Design Studio, Lead Database, Analytics, and/or Admin sub-sections depending on role configuration. Cannot access areas not explicitly granted in their assigned role(s). Cannot manage users unless the Users & Roles admin permission is granted. All plans Counted as a named user seat Users can be assigned multiple roles; permissions are additive across all assigned roles.
API-Only User Designed for system integrations. Can authenticate via REST or SOAP API. Permissions scoped by assigned role. Cannot log into the Marketo UI. Cannot be used for interactive sessions. All plans (API access may vary by tier) Counted as a named user seat; consumes a user license API-only users still consume a user seat license. Must have an API-only role assigned. Credentials are tied to the user account, not a service account abstraction.

Permission model

  • Model type: custom-roles
  • Description: Marketo uses a role-based access control model. Roles are fully customizable collections of granular permissions. Each user is assigned one or more roles; permissions are additive. Roles can be scoped to specific Workspaces in multi-workspace configurations. There are no built-in standard roles other than the immutable Admin role.
  • Custom roles: Yes
  • Custom roles plan: All plans (Workspaces & Partitions for workspace-scoped roles require Select plan or higher)
  • Granularity: Granular - permissions are broken into ~80+ individual permission checkboxes across categories: Access Admin, Access Analytics, Access Calendar, Access Design Studio, Access Lead Database, Access Marketing Activities, and sub-permissions within each (e.g., Approve Assets, Delete Leads, Export Lead, Import List, etc.).

How to add users

  1. Log in to Marketo Engage as an Admin.
  2. Navigate to Admin (gear icon) > Users & Roles.
  3. Click the 'Users' tab.
  4. Click 'Invite New User'.
  5. Enter the user's First Name, Last Name, and Email Address.
  6. Optionally set an Access Expiration date.
  7. Click 'Next'.
  8. Select one or more Roles to assign to the user (and Workspace if applicable).
  9. Click 'Next'.
  10. Review the invitation summary and click 'Send'.
  11. The user receives an email invitation and must click the link to set their password and activate their account (legacy Marketo identity) or accept via Adobe ID (Adobe IMS instances).

Required fields: First Name, Last Name, Email Address, At least one Role assigned

Watch out for:

  • Invitation links expire after 3 days by default; if the user does not accept in time, the admin must resend the invitation.
  • For instances migrated to Adobe Identity Management System (IMS), users must have or create an Adobe ID; the invitation flow goes through Adobe Admin Console instead of the Marketo UI.
  • Email address must be unique across the Marketo instance; duplicate email addresses are not permitted.
  • API-only users must have the 'API Only' checkbox selected during creation and cannot log into the UI.
  • In multi-workspace instances, users must be assigned roles per workspace; a user without a workspace assignment cannot access that workspace.
  • There is no bulk CSV import for users natively in Marketo; users must be invited one at a time through the UI or provisioned via Adobe Admin Console (IMS instances).
Bulk option Availability Notes
CSV import No Not documented
Domain whitelisting No Automatic domain-based user add
IdP provisioning Yes Adobe IMS-migrated instances support SCIM provisioning via Azure AD or Google Workspace through Adobe Admin Console. Okta SSO is supported for authentication but Okta SCIM provisioning to Marketo is not natively supported.

How to remove or deactivate users

  • Can delete users: Yes
  • Delete/deactivate behavior: Marketo supports both deactivation (blocking login without removing the user record) and full deletion of users. Deleted users are permanently removed from the user list. However, assets, campaigns, and records previously owned or created by the deleted user remain in the system and retain attribution to that user's name. Deactivation is achieved by setting an Access Expiration date in the past or by removing all role assignments, effectively preventing login without deleting the account.
  1. Navigate to Admin > Users & Roles > Users tab.
  2. Locate the user to deactivate.
  3. Click 'Edit User'.
  4. Set the 'Access Expiration' date to today or a past date, OR remove all assigned roles.
  5. Click 'Save'.
  6. Alternatively, to fully delete: select the user checkbox, click 'Delete User', and confirm the deletion prompt.
Data impact Behavior
Owned records Assets (emails, landing pages, programs, smart campaigns) created by the deleted user remain in the system with the user's name shown as creator/modifier. Ownership is not automatically reassigned.
Shared content Shared assets and programs remain accessible to other users. No content is deleted when a user is removed.
Integrations API-only users that are deleted will invalidate any API credentials (client ID/secret or SOAP credentials) associated with that user, breaking integrations that rely on those credentials.
License freed Deleting or fully deactivating a user frees up a named user seat license. The seat becomes available for reassignment.

Watch out for:

  • Deleting an API-only user immediately breaks any active API integrations using that user's credentials; rotate credentials to a new API user before deleting.
  • There is no 'suspend' or 'deactivate' toggle - deactivation must be done by expiring access or removing roles, which is less obvious than a simple toggle.
  • For Adobe IMS-migrated instances, user removal must be performed in Adobe Admin Console; removing from Marketo UI alone may not fully revoke access if the user retains an Adobe product profile assignment.
  • Deleted users cannot be recovered; deletion is permanent.
  • Smart list filters referencing a deleted user (e.g., 'Lead Owner is [user]') may behave unexpectedly after deletion.

License and seat management

Seat type Includes Cost
Named User Seat One login-capable or API-only user account within a Marketo Engage subscription. Includes UI access (for non-API users) and/or API access based on role permissions. Bundled into subscription contract; additional seats negotiated with Adobe/Marketo sales. No self-serve seat purchasing available.
  • Where to check usage: Admin > Users & Roles > Users tab - displays all active users. Count of active users visible in the list. No built-in seat utilization dashboard; admins must manually count active users against contracted seat count.
  • How to identify unused seats: Marketo does not provide a native 'last login' timestamp column in the Users & Roles UI as of current documentation. Admins can use the Audit Trail (Admin > Audit Trail) to search for user login activity to identify inactive users. Some admins use the Marketo REST API (GET /rest/v1/users.json) to retrieve user lists and cross-reference with audit logs.
  • Billing notes: Marketo Engage is sold on annual contracts with a fixed number of named user seats negotiated at signing. Seat counts are not dynamically adjustable via self-serve; overages or additions require a contract amendment with Adobe. Pricing is contact-based (number of leads/contacts in the database) in addition to user seats. Tiers (Growth, Select, Prime, Ultimate) determine feature access, not seat count directly.

The cost of manual management

With no bulk import and no Okta SCIM support, every new hire requires a manual invitation, role assignment, and - in multi-workspace setups - per-workspace configuration.

Offboarding is equally manual: there is no deactivation toggle, so admins must either expire access dates or remove all roles, then separately deprovision from Adobe Admin Console if the instance has migrated to Adobe IMS.

Marketo provides no native last-login column in the admin UI, so identifying inactive users means manually combing the Audit Trail or scripting against the REST API. Across every app in your stack, this kind of per-app manual overhead compounds into a real security and compliance liability - particularly when employees leave.

What IT admins are saying

Common complaints:

  • No native Okta SCIM provisioning support - Okta can be used for SSO but not automated user lifecycle management; feature requests have been submitted on Marketo Nation with no committed timeline.
  • No bulk CSV user import - users must be invited one at a time, which is tedious for large team onboarding.
  • No native 'last login' visibility in the admin UI - identifying inactive users requires manual audit trail review or API scripting.
  • Adobe IMS migration is high-impact - migrating from legacy Marketo identity to Adobe IMS changes the admin workflow significantly and has caused confusion about where to manage users (Marketo UI vs. Adobe Admin Console).
  • Invitation links expire in 3 days with no automatic reminder - admins must manually track and resend expired invitations.
  • Deleting an API user immediately breaks integrations with no grace period or credential rotation workflow built in.
  • No self-serve seat purchasing - adding users beyond contracted count requires engaging Adobe sales and a contract amendment, causing delays.

The decision

If your IdP is Azure AD or Google Workspace and your Marketo instance has been migrated to Adobe IMS, you have a limited SCIM path via Adobe Admin Console - but role and workspace assignments still require manual configuration inside Marketo after provisioning.

If your IdP is Okta, or your instance is still on legacy Marketo Identity, there is no automated provisioning path available today.

Teams managing more than a handful of Marketo users will need either a scripted solution against the User Management REST API or a dedicated SaaS layer that handles provisioning, deprovisioning, and role auditing across every app in the stack.

Bottom line

Marketo's user management is functional but deliberately manual: no bulk invite, no Okta SCIM, no last-login visibility in the UI, and a split admin experience between Marketo and Adobe Admin Console for IMS-migrated instances.

For small teams this is manageable; for organizations with frequent onboarding, offboarding, or compliance audit requirements, the manual overhead is significant and the security exposure during offboarding gaps is real.

Automate Marketo workflows without one-off scripts

Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.

Every app coverage, including apps without APIs
60+ app integrations plus browser automation for apps without APIs
IT graph reconciliation across apps and your IdP
Less than a week to launch, maintained as APIs and admin consoles change
SOC 2 Type II. ~2 hours of your team's time

UpdatedFeb 19, 2026

* Details sourced from official product documentation and admin references.

Keep exploring

Related apps

Abnormal Security logo

Abnormal Security

API Only
AutomationAPI only
Last updatedMar 2026

Abnormal Security is an enterprise email security platform focused on detecting and investigating threats such as phishing, account takeover (ATO), and vendor email compromise. It does not support SCIM provisioning, which means every app in your stack

ActiveCampaign logo

ActiveCampaign

API Only
AutomationAPI only
Last updatedFeb 2026

ActiveCampaign uses a group-based permission model: every user belongs to exactly one group, and all feature-area access (Contacts, Campaigns, Automations, Deals, Reports, Templates) is configured at the group level, not per individual. The default Adm

ADP logo

ADP

API Only
AutomationAPI only
Last updatedFeb 2026

ADP Workforce Now is a mid-market to enterprise HCM platform that serves as the HR source of record for employee data — payroll, benefits, time, and talent. User access is governed by a hybrid permission model: predefined security roles (Security Maste