Stitchflow
mParticle logo

mParticle User Management Guide

Manual workflow

How to add, remove, and manage users with operational caveats that matter in production.

UpdatedMar 11, 2026

Summary and recommendation

mParticle user management can be run manually, but complexity usually increases with role models, licensing gates, and offboarding dependencies. This guide gives the exact mechanics and where automation has the biggest impact.

mParticle user management is handled entirely through the dashboard at app.mparticle.com → Settings → Users. There is no SCIM provisioning documented, so every app in your stack that relies on automated IdP-driven lifecycle management will not get that from mParticle natively.

SAML SSO is supported with Okta, OneLogin, and Azure AD, but deprovisioning remains a manual step regardless of IdP configuration.

Quick facts

Admin console pathApp.mparticle.com → Settings → Users
Admin console URLOfficial docs
SCIM availableNo
SCIM tier requiredEnterprise
SSO prerequisiteNo

User types and roles

Role Permissions Cannot do Plan required Seat cost Watch out for
Admin Full access to all workspaces and account settings; can invite, edit, and remove users; can manage integrations, API credentials, and billing settings. No per-seat cost; pricing is volume/event-based. Admin role is account-wide; there is no workspace-scoped admin role documented.
User Access to workspaces they are assigned to; can create and edit data plans, audiences, and connections depending on workspace permissions. Cannot manage account-level settings, billing, or invite/remove other users. No per-seat cost; pricing is volume/event-based. Workspace-level access is controlled separately; a user may have different access levels across workspaces.
Read-Only Can view dashboards, data plans, audiences, and connections within assigned workspaces. Cannot create or modify any resources. Cannot create, edit, or delete any configurations, audiences, or integrations. No per-seat cost; pricing is volume/event-based.

Permission model

  • Model type: role-based
  • Description: mParticle uses a role-based access control model with predefined roles (Admin, User, Read-Only) applied at the account and workspace level. Workspace-level role assignments allow different permissions per workspace for the same user. No custom role creation is documented.
  • Custom roles: No
  • Custom roles plan: Not documented
  • Granularity: Role assignments are per-workspace; roles are predefined and not customizable. Admins can assign users to specific workspaces with specific roles.

How to add users

  1. Log in to app.mparticle.com as an Admin.
  2. Navigate to Settings (gear icon) → Users.
  3. Click 'Invite User'.
  4. Enter the user's email address.
  5. Select the role (Admin, User, or Read-Only) for the account level.
  6. Optionally assign the user to specific workspaces and set workspace-level roles.
  7. Click 'Send Invitation'.
  8. The invited user receives an email and must accept the invitation to activate their account.

Required fields: Email address, Account-level role

Watch out for:

  • Users must accept the email invitation before they can log in; there is no way to force-activate an account.
  • If SSO is enforced, users must authenticate via the configured IdP; password-based login may be disabled.
  • Workspace assignments are optional at invite time but must be configured for the user to access any workspace data.
Bulk option Availability Notes
CSV import No Not documented
Domain whitelisting No Automatic domain-based user add
IdP provisioning Yes Enterprise (SAML SSO supported with Okta, OneLogin, Azure AD; no SCIM automated provisioning documented)

How to remove or deactivate users

  • Can delete users: Yes
  • Delete/deactivate behavior: Admins can remove users from the account via Settings → Users. The official docs use 'remove' rather than 'deactivate'; removed users lose access immediately. It is not documented whether user records are soft-deleted or permanently purged.
  1. Log in to app.mparticle.com as an Admin.
  2. Navigate to Settings → Users.
  3. Locate the user to be removed.
  4. Click the options menu (ellipsis or similar) next to the user.
  5. Select 'Remove User' or equivalent action.
  6. Confirm the removal.
Data impact Behavior
Owned records Not documented. Audiences, data plans, and configurations created by the removed user remain in the account.
Shared content Shared workspaces, audiences, and connections persist after user removal.
Integrations API credentials (user-level API keys, if any) associated with the removed user should be audited and rotated; account-level API keys are unaffected.
License freed No per-seat licensing; removing a user does not reduce billing costs. Pricing is based on data volume/events.

Watch out for:

  • No documented 'deactivate without delete' option; removal appears to be permanent account-level action.
  • If the removed user was the sole Admin, the account may lose admin access - ensure at least one other Admin exists before removing.
  • SSO-provisioned users removed from the IdP may still appear in mParticle until manually removed from the mParticle Users settings, as there is no SCIM deprovisioning.

License and seat management

Seat type Includes Cost
Platform User Access to mParticle dashboard, workspaces, and features per assigned role. No per-seat fee. Included; no per-seat pricing. Overall platform cost is based on event/data volume credits.
  • Where to check usage: Settings → Usage (data volume and event consumption); user count visible at Settings → Users.
  • How to identify unused seats: No documented automated inactive-user detection. Admins must manually review the Users list and cross-reference last login activity if available.
  • Billing notes: mParticle uses value-based, volume-based credit pricing. There is no per-seat or per-user charge. Adding or removing users does not directly affect the invoice. Contract costs are based on pre-purchased event/data credits, typically negotiated annually. Average reported contract cost is approximately $156,000/year.

The cost of manual management

mParticle uses volume-based credit pricing with no per-seat charge, so adding or removing users does not directly affect your invoice. That said, the absence of SCIM means offboarding requires a manual admin action in the mParticle Users settings every time an employee leaves - IdP removal alone is not sufficient.

Without last-login visibility or automated inactive-user detection, access reviews require admins to manually audit the Users list, which compounds the operational burden at scale.

What IT admins are saying

Practitioners consistently flag two friction points: the permission model lacks the granularity needed to restrict specific actions (such as preventing modification of live connections) without dropping a user to full Read-Only, and workspace-level role configuration is non-intuitive for large teams.

The absence of an audit log or last-login timestamp makes it difficult to identify stale accounts during periodic access reviews. SSO-provisioned users removed from the IdP continue to appear in mParticle until manually deleted, which is a documented offboarding risk raised across G2 reviews.

Common complaints:

  • Users report that the permission model lacks granularity - there is no way to restrict access to specific features (e.g., prevent a user from modifying live connections) without giving full User or Read-Only access.
  • Reviewers on G2 and similar platforms note that removing SSO-provisioned users requires manual cleanup in mParticle because there is no SCIM deprovisioning, creating offboarding risk.
  • Some users note that workspace-level role management is not intuitive and requires multiple steps to configure correctly for large teams.
  • Lack of an audit log or last-login visibility makes it difficult to identify inactive users for access reviews.

The decision

mParticle is appropriate for teams that can accept manual provisioning and deprovisioning workflows. The role model - Admin, User, and Read-Only - covers standard access tiers, and workspace-scoped assignments give per-project flexibility.

Teams that require automated lifecycle management across every app in their environment, or that operate under strict access-review compliance requirements, should plan for a custom integration layer to compensate for the missing SCIM support.

Bottom line

mParticle's user management is functional but entirely manual: no SCIM, no automated deprovisioning, and no native inactive-user detection.

The platform's value-based pricing means user count is not a cost lever, but the operational overhead of manual offboarding and access reviews is real - particularly for organizations managing large or frequently changing teams across multiple workspaces.

Teams that need IdP-driven lifecycle automation will need to build or procure a custom integration against the Platform API.

Automate mParticle workflows without one-off scripts

Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.

Every app coverage, including apps without APIs
60+ app integrations plus browser automation for apps without APIs
IT graph reconciliation across apps and your IdP
Less than a week to launch, maintained as APIs and admin consoles change
SOC 2 Type II. ~2 hours of your team's time

UpdatedMar 11, 2026

* Details sourced from official product documentation and admin references.

Keep exploring

Related apps

Abnormal Security logo

Abnormal Security

API Only
AutomationAPI only
Last updatedMar 2026

Abnormal Security is an enterprise email security platform focused on detecting and investigating threats such as phishing, account takeover (ATO), and vendor email compromise. It does not support SCIM provisioning, which means every app in your stack

ActiveCampaign logo

ActiveCampaign

API Only
AutomationAPI only
Last updatedFeb 2026

ActiveCampaign uses a group-based permission model: every user belongs to exactly one group, and all feature-area access (Contacts, Campaigns, Automations, Deals, Reports, Templates) is configured at the group level, not per individual. The default Adm

ADP logo

ADP

API Only
AutomationAPI only
Last updatedFeb 2026

ADP Workforce Now is a mid-market to enterprise HCM platform that serves as the HR source of record for employee data — payroll, benefits, time, and talent. User access is governed by a hybrid permission model: predefined security roles (Security Maste