Stitchflow
SaltStack logo

SaltStack User Management Guide

Manual workflow

How to add, remove, and manage users with operational caveats that matter in production.

UpdatedMar 16, 2026

Summary and recommendation

SaltStack user management can be run manually, but complexity usually increases with role models, licensing gates, and offboarding dependencies. This guide gives the exact mechanics and where automation has the biggest impact.

SaltStack Config - now distributed as VMware Tanzu Salt under Broadcom - is a self-hosted IT automation and configuration management platform.

It does not expose a native SCIM 2.0 endpoint, so user lifecycle management falls entirely on administrators working through the web UI or an upstream identity provider.

Licensing requires direct engagement with Broadcom sales;

no public pricing tiers are listed.

Quick facts

Admin console pathAdministration > Users (within the SaltStack Config / VMware Aria Automation Config web UI)
SCIM availableNo
SCIM tier requiredEnterprise
SSO prerequisiteYes

User types and roles

Role Permissions Cannot do Plan required Seat cost Watch out for
Administrator Full access to all features including user management, system configuration, job execution, target management, and all Salt operations. Administrator role is a built-in role and cannot be deleted or modified.
Operator Can execute jobs, manage minions, and view results. Cannot manage users or system-level configuration. Cannot create or manage users, cannot modify system-level settings.
Read-Only / Viewer Can view jobs, targets, and results but cannot execute jobs or make changes. Cannot execute jobs, cannot modify any configuration, cannot manage users.
Custom Role Permissions are defined by the administrator using granular permission sets across resource types (jobs, targets, minions, files, etc.). Custom roles require careful permission scoping; overly broad permissions can grant unintended access to sensitive Salt operations.

Permission model

  • Model type: hybrid
  • Description: SaltStack Config uses a role-based access control (RBAC) model with built-in roles (Administrator, Operator, etc.) and the ability to create custom roles by combining granular permission sets. Permissions can be scoped to specific resource types including jobs, targets, minions, file server, and configuration items.
  • Custom roles: Yes
  • Custom roles plan: Not documented
  • Granularity: Resource-type level permissions (jobs, targets, minions, file server, pillars, keys, etc.) with create/read/update/delete actions per resource type.

How to add users

  1. Log in to the SaltStack Config / VMware Aria Automation Config web UI as an Administrator.
  2. Navigate to Administration > Users.
  3. Click 'Add User' or the equivalent create button.
  4. Enter the required user details (username, email, password for local users).
  5. Assign one or more roles to the user.
  6. Save the new user record.

Required fields: Username, Email address, Password (for local authentication users), Role assignment

Watch out for:

  • Local user accounts are separate from LDAP/AD-sourced accounts; mixing authentication sources requires careful planning.
  • If SSO/LDAP is configured, users may be provisioned automatically on first login rather than requiring manual creation.
  • Role assignments must be made at creation time or updated afterward; users with no role assigned may have no effective access.
Bulk option Availability Notes
CSV import No Not documented
Domain whitelisting No Automatic domain-based user add
IdP provisioning Yes Enterprise (requires SSO/LDAP configuration, available in enterprise deployments)

How to remove or deactivate users

  • Can delete users: Yes
  • Delete/deactivate behavior: SaltStack Config / VMware Aria Automation Config supports deleting local user accounts through the Administration > Users interface. LDAP/SSO-sourced users are managed at the identity provider level; disabling them in the IdP prevents login but may not remove the user record from the SaltStack Config database.
  1. Log in as an Administrator.
  2. Navigate to Administration > Users.
  3. Select the user to be removed.
  4. Use the delete or deactivate option available in the user record actions.
Data impact Behavior
Owned records Job history and audit logs associated with the deleted user are retained in the system for audit purposes.
Shared content Not documented
Integrations Not documented
License freed Removing a user frees the associated named-user license seat, subject to the terms of the Broadcom/VMware license agreement.

Watch out for:

  • Deleting an LDAP/SSO-sourced user from SaltStack Config does not disable the account in the identity provider; the IdP account must be disabled separately.
  • If a deleted user is re-provisioned via LDAP/SSO on next login, a new user record may be created automatically.

License and seat management

Seat type Includes Cost
Named User Access to SaltStack Config / VMware Tanzu Salt web UI and API for one named individual user. Contact Broadcom for current pricing.
  • Where to check usage: Administration > Users (review active user count in the web UI)
  • How to identify unused seats: Review the last login date column in Administration > Users to identify accounts with no recent activity. No automated unused-seat report is documented in official sources.
  • Billing notes: SaltStack is now part of Broadcom's VMware Tanzu portfolio. Pricing and licensing terms require direct engagement with Broadcom sales. Legacy VMware ELA terms may apply for existing customers.

The cost of manual management

Without automated provisioning, every app in your stack that touches SaltStack requires a manual touchpoint each time a user joins, changes roles, or leaves. Administrators must navigate to Administration > Users for every add, role change, or deletion of local accounts.

LDAP/SSO-sourced accounts reduce creation overhead but still require IdP-side disablement on offboarding - the SaltStack user record is not automatically purged, which creates orphaned entries over time.

Identifying unused seats means manually reviewing the last-login column in Administration > Users; there is no automated unused-seat report documented in official sources. For teams managing infrastructure access at scale, this gap compounds audit and compliance risk.

What IT admins are saying

Community evidence is not specific enough to quote or summarize yet for this app.

The decision

Every app in a modern access management program benefits from automated provisioning, and SaltStack is a notable exception - there is no native SCIM endpoint and no programmatic way to create or remove users outside the web UI or an upstream LDAP/AD backend.

Manual management is viable for small, stable teams where access changes infrequently and a well-configured LDAP backend is already in place.

For organizations with higher user churn, mixed authentication sources, or compliance requirements around access certification, the lack of SCIM and the absence of automated unused-seat reporting create meaningful operational overhead. Role assignment must be handled at creation time or corrected afterward;

users with no role assigned have no effective access, which can cause silent access failures.

Bottom line

SaltStack / VMware Tanzu Salt requires hands-on user administration unless a well-configured LDAP/AD backend is in place. Every app in a modern stack benefits from automated provisioning, and SaltStack's lack of native SCIM means it remains a manual exception.

The multi-brand documentation history adds lookup friction, and offboarding LDAP-sourced users demands a two-step process - IdP disable plus periodic SaltStack record cleanup - to avoid stale account accumulation.

Teams should factor this operational cost into their access management planning, particularly given that Broadcom licensing terms require direct sales engagement to establish seat counts.

Automate SaltStack workflows without one-off scripts

Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.

Every app coverage, including apps without APIs
60+ app integrations plus browser automation for apps without APIs
IT graph reconciliation across apps and your IdP
Less than a week to launch, maintained as APIs and admin consoles change
SOC 2 Type II. ~2 hours of your team's time

UpdatedMar 16, 2026

* Details sourced from official product documentation and admin references.

Keep exploring

Related apps

Abnormal Security logo

Abnormal Security

API Only
AutomationAPI only
Last updatedMar 2026

Abnormal Security is an enterprise email security platform focused on detecting and investigating threats such as phishing, account takeover (ATO), and vendor email compromise. It does not support SCIM provisioning, which means every app in your stack

ActiveCampaign logo

ActiveCampaign

API Only
AutomationAPI only
Last updatedFeb 2026

ActiveCampaign uses a group-based permission model: every user belongs to exactly one group, and all feature-area access (Contacts, Campaigns, Automations, Deals, Reports, Templates) is configured at the group level, not per individual. The default Adm

ADP logo

ADP

API Only
AutomationAPI only
Last updatedFeb 2026

ADP Workforce Now is a mid-market to enterprise HCM platform that serves as the HR source of record for employee data — payroll, benefits, time, and talent. User access is governed by a hybrid permission model: predefined security roles (Security Maste