Stitchflow
Segment logo

Segment User Management Guide

Manual workflow

How to add, remove, and manage users with operational caveats that matter in production.

UpdatedMar 16, 2026

Summary and recommendation

Segment user management can be run manually, but complexity usually increases with role models, licensing gates, and offboarding dependencies. This guide gives the exact mechanics and where automation has the biggest impact.

Segment's access management lives under Workspace Settings > Access Management and follows a two-level RBAC model: workspace-level roles (Workspace Owner, Workspace Member) and resource-level roles scoped to specific sources, destinations, Tracking Plans, or Engage spaces.

Users can hold multiple roles simultaneously, but there are no fully custom roles - every app integration and permission assignment draws from a predefined set.

SCIM provisioning is available, but only on the Business tier and only after SSO is fully configured.

Quick facts

Admin console pathWorkspace Settings > Access Management
Admin console URLOfficial docs
SCIM availableYes
SCIM tier requiredBusiness
SSO prerequisiteYes

User types and roles

Role Permissions Cannot do Plan required Seat cost Watch out for
Workspace Owner Full administrative access to the workspace: manage users, billing, integrations, sources, destinations, and all workspace settings. All plans At least one Workspace Owner must exist at all times; the last owner cannot be removed.
Workspace Member Base role assigned to all invited users. Actual capabilities depend on additional resource-level roles granted. Cannot manage billing, SSO, SCIM, or workspace-level settings without additional roles. All plans Users invited via SSO JIT provisioning receive read-only access by default unless roles are explicitly mapped.
Source Admin Create, edit, and delete sources; manage source settings and connected integrations. Cannot manage workspace-level settings or billing. All plans Role is scoped to specific sources, not the entire workspace, unless granted globally.
Source Read-only View source data, settings, and connected integrations. Cannot make changes. Cannot edit or delete sources, destinations, or any settings. All plans Default role assigned to JIT-provisioned SSO users.
Tracking Plan Admin Create, edit, and delete Tracking Plans. Cannot manage sources, destinations, or workspace settings. Plans that include Protocols/Tracking Plans
Tracking Plan Read-only View Tracking Plans only. Cannot edit Tracking Plans or any other workspace resources. Plans that include Protocols/Tracking Plans
Personas/Engage Admin Full access to Engage (formerly Personas) spaces: create and manage audiences, computed traits, and journeys. Cannot manage workspace-level settings or billing. Plans that include Engage Engage access is scoped to specific Engage spaces.
Personas/Engage Read-only View Engage spaces, audiences, and computed traits. Cannot create or edit audiences, traits, or journeys. Plans that include Engage

Permission model

  • Model type: role-based
  • Description: Segment uses a role-based access control (RBAC) model with built-in roles applied at two levels: workspace-level (global) and resource-level (scoped to specific sources, destinations, Tracking Plans, or Engage spaces). Users can hold multiple roles simultaneously. There are no fully custom roles; permissions are assigned by selecting from predefined role options per resource.
  • Custom roles: No
  • Custom roles plan: Not documented
  • Granularity: Roles can be scoped globally to the workspace or individually to specific resources (e.g., a single source or a single Engage space), allowing fine-grained access control without custom role creation.

How to add users

  1. Navigate to Workspace Settings > Access Management in the Segment app.
  2. Click 'Invite Team Member'.
  3. Enter the invitee's email address.
  4. Select workspace-level role(s) to assign (e.g., Workspace Member, Workspace Owner).
  5. Optionally assign resource-level roles for specific sources, destinations, Tracking Plans, or Engage spaces.
  6. Click 'Send Invite'.
  7. Invitee receives an email and must accept the invitation to gain access.

Required fields: Email address, At least one workspace-level role

Watch out for:

  • Invitations expire if not accepted; a new invite must be sent.
  • Users provisioned via SSO JIT receive read-only (Source Read-only) access by default unless role mappings are configured in the IdP.
  • SCIM provisioning requires SSO to be configured first and is only available on the Business tier.
  • A user must accept the invite before they appear as an active member; pending invites are listed separately.
Bulk option Availability Notes
CSV import No Not documented
Domain whitelisting No Automatic domain-based user add
IdP provisioning Yes Business

How to remove or deactivate users

  • Can delete users: Yes
  • Delete/deactivate behavior: Segment allows workspace owners to remove (delete) a user from the workspace via the Access Management settings page. Removing a user revokes their access immediately. When provisioned via SCIM, deprovisioning in the IdP removes the user from the Segment workspace.
  1. Navigate to Workspace Settings > Access Management.
  2. Locate the user in the members list.
  3. Click the options menu (three dots or 'Remove') next to the user.
  4. Confirm removal.
Data impact Behavior
Owned records Sources, destinations, and Tracking Plans created by the removed user remain in the workspace and are not deleted.
Shared content Shared resources (sources, destinations, audiences) are unaffected by user removal.
Integrations Connected integrations and API keys associated with the workspace remain active after user removal.
License freed Segment does not publicly document per-seat billing; removing a user may affect seat counts on plans with user limits, but specific license-freeing behavior is not explicitly documented.

Watch out for:

  • The last Workspace Owner cannot be removed; another owner must be assigned first.
  • Removing a user via the UI does not automatically deprovision them in a connected IdP; SCIM deprovision must be initiated from the IdP side.
  • Pending invitations can be cancelled from the Access Management page before the user accepts.

License and seat management

Seat type Includes Cost
Workspace Member Access to the Segment workspace with roles as assigned. All invited users occupy a seat.
  • Where to check usage: Workspace Settings > Access Management (lists all active members and pending invites)
  • How to identify unused seats: Review the Access Management member list for users with no recent activity. Segment does not natively surface last-login timestamps in the UI per official docs; admins must cross-reference with IdP logs or audit events.
  • Billing notes: Segment's pricing is primarily based on Monthly Tracked Users (MTUs) and events, not per-seat user counts. The number of workspace members does not directly drive per-seat billing charges on standard plans. Business tier pricing is custom and negotiated. SCIM and SSO are included in the Business tier.

The cost of manual management

Without SCIM, every invite cycle requires navigating to Access Management, entering an email, selecting roles, sending, and waiting for acceptance. Invitations expire if not accepted, and there is no CSV bulk-import path - each user must be invited individually.

Identifying inactive members is also manual, since Segment does not surface last-login timestamps in the Access Management UI; admins must cross-reference IdP logs or audit events to find stale seats.

What IT admins are saying

Community evidence is not specific enough to quote or summarize yet for this app.

The decision

Manual management is workable for small, stable teams where invite volume is low and role changes are infrequent. Once headcount grows or offboarding speed matters, the absence of bulk invite tooling and native activity reporting creates compounding overhead across every app a departing employee touched in the workspace.

SCIM via Okta, Microsoft Entra ID, or OneLogin resolves provisioning and deprovisioning at scale, but the Business tier cost and the SSO prerequisite are real gates - confirm both are in place before planning an automated workflow. Domain-based auto-join is not supported; every user must be explicitly invited or provisioned regardless of email domain.

Bottom line

Segment's RBAC model is well-structured for teams that need granular, resource-scoped permissions without building custom roles.

The manual path is straightforward for low-volume access changes but does not scale cleanly - no bulk invite, no native activity reporting, and no domain whitelisting mean every app access event requires deliberate action.

SCIM closes the automation gap effectively, but it is gated behind Business tier pricing and a working SSO configuration, so teams should validate both prerequisites before committing to an automated provisioning design.

Automate Segment workflows without one-off scripts

Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.

Every app coverage, including apps without APIs
60+ app integrations plus browser automation for apps without APIs
IT graph reconciliation across apps and your IdP
Less than a week to launch, maintained as APIs and admin consoles change
SOC 2 Type II. ~2 hours of your team's time

UpdatedMar 16, 2026

* Details sourced from official product documentation and admin references.

Keep exploring

Related apps

15Five logo

15Five

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

15Five uses a fixed role-based permission model with six predefined roles: Account Admin, HR Admin, Billing Admin, Group Admin, Manager, and Employee. No custom roles can be constructed. User management lives at Settings gear → People → Manage people p

1Password logo

1Password

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

1Password's admin console at my.1password.com covers the full user lifecycle — invitations, group assignments, vault access, suspension, and deletion — without any third-party tooling. Like every app that mixes role-based and resource-level permissions

8x8 logo

8x8

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

8x8 Admin Console supports full lifecycle user management — create, deactivate, and delete — across its X Series unified communications platform. Every app a user can access (8x8 Work desktop, mobile, web, Agent Workspace) is gated by license assignmen