Summary and recommendation
Sentry user management can be run manually, but complexity usually increases with role models, licensing gates, and offboarding dependencies. This guide gives the exact mechanics and where automation has the biggest impact.
Sentry's member management lives at Settings → Members (organization-level). Access is role-based across five fixed organization roles - Billing, Member, Admin, Manager, and Owner - layered with per-team roles (Contributor, Team Admin) that gate project visibility. There are no custom roles on any plan, and no attribute-level permission granularity is available.
Without automated provisioning, every app that engineers touch requires its own manual invite, role assignment, and removal workflow.
Quick facts
| Admin console path | Settings → Members (organization-level) |
| Admin console URL | Official docs |
| SCIM available | Yes |
| SCIM tier required | Business or Enterprise |
| SSO prerequisite | Yes |
User types and roles
| Role | Permissions | Cannot do | Plan required | Seat cost | Watch out for |
|---|---|---|---|---|---|
| Billing | Can manage billing and subscription settings only. No access to projects or issues. | Cannot view or manage projects, issues, alerts, or team members. | All plans | Counts as a member seat | Useful for finance contacts who should not have product access, but still consumes a seat. |
| Member | Can view and interact with projects they are assigned to. Can create and resolve issues. | Cannot manage organization settings, invite members, or access billing. | All plans | Counts as a member seat | Project access is controlled by team membership; a Member with no team assignments has very limited visibility. |
| Admin | Can manage teams and projects they belong to. Can invite members. Can configure project-level settings and alerts. | Cannot manage organization-wide settings or billing. Cannot promote members to Manager or Owner. | All plans | Counts as a member seat | Admin scope is limited to teams/projects the Admin is a member of, not the entire organization. |
| Manager | Can manage all teams and projects across the organization. Can invite and remove members. Can manage organization-level integrations. | Cannot transfer organization ownership or manage billing. | All plans | Counts as a member seat | Manager is the highest non-Owner role and is appropriate for engineering leads who need broad access without ownership transfer rights. |
| Owner | Full access to all organization settings, billing, member management, and project configuration. Can delete the organization. | No restrictions within the organization. | All plans | Counts as a member seat | Only Owners can promote other members to Owner. There must always be at least one Owner. Owner role cannot be assigned via SCIM; it must be set manually in the UI. |
Permission model
- Model type: role-based
- Description: Sentry uses a two-level role system: organization-level roles (Billing, Member, Admin, Manager, Owner) and team-level roles (Contributor, Team Admin). Organization roles control what a user can do across the org; team roles control what they can do within a specific team. Project access is gated by team membership.
- Custom roles: No
- Custom roles plan: Not documented
- Granularity: Organization-level roles are fixed and cannot be customized. Team-level roles (Contributor vs. Team Admin) provide a secondary layer of access control within teams. No attribute-level or resource-level permission customization is available.
How to add users
- Navigate to Settings → Members in the Sentry organization dashboard.
- Click 'Invite Members'.
- Enter the email address(es) of the user(s) to invite.
- Select the organization-level role to assign (Billing, Member, Admin, Manager, or Owner).
- Optionally assign the invitee to one or more teams.
- Click 'Send Invite'. The invitee receives an email with an invitation link.
- The user accepts the invite and creates or logs into their Sentry account.
Required fields: Email address, Organization role
Watch out for:
- Only Owners and Managers can invite new members by default. Admins can invite members only if the organization setting 'Let Admins invite new members' is enabled.
- Invitations expire after 48 hours if not accepted.
- If SSO is enforced, invited users must authenticate via SSO on first login; email/password login is blocked.
- JIT (Just-in-Time) provisioning via SSO creates a user account on first SSO login without a prior invitation, but the user is assigned the default Member role unless SCIM is used to pre-assign roles.
- Inviting a user to a team at invite time is optional; team membership can be managed separately after the user joins.
| Bulk option | Availability | Notes |
|---|---|---|
| CSV import | No | Not documented |
| Domain whitelisting | Yes | Automatic domain-based user add |
| IdP provisioning | Yes | Business or Enterprise |
How to remove or deactivate users
- Can delete users: Yes
- Delete/deactivate behavior: Sentry allows removing (revoking) a member from the organization. This removes their access entirely. There is no 'deactivate' or 'suspend' state in the Sentry UI - removal is the only option for revoking access manually. When SCIM is enabled, deprovisioning via the IdP removes the user from the Sentry organization. Removed users' Sentry accounts still exist but they lose all access to the organization.
- Navigate to Settings → Members.
- Locate the member to remove using the search field.
- Click the three-dot menu (⋮) or 'Remove' button next to the member's name.
- Confirm the removal in the dialog prompt.
- The member is immediately removed from the organization and loses all access.
| Data impact | Behavior |
|---|---|
| Owned records | Issues, comments, and assignments previously made by the removed user remain in the system and are not deleted. Assigned issues stay assigned to the removed user's name but can be reassigned. |
| Shared content | Alerts, dashboards, and saved searches created by the removed user persist and remain accessible to other members. |
| Integrations | Any personal API tokens or OAuth connections belonging to the removed user are invalidated upon removal. Organization-level integrations are unaffected. |
| License freed | Removing a member frees the seat immediately. Billing adjusts at the next billing cycle according to Sentry's billing terms. |
Watch out for:
- Only Owners and Managers can remove members. Admins cannot remove members from the organization.
- If the organization has SSO enforced, removing a user from Sentry does not automatically deprovision them in the IdP. The IdP must also be updated to prevent re-provisioning on next login.
- If SCIM is configured, deprovisioning should be done via the IdP to ensure consistent state; manual removal in Sentry UI and IdP deprovisioning should not conflict but dual-management can cause sync issues.
- The last Owner cannot be removed. At least one Owner must remain in the organization at all times.
- Removed users can be re-invited; their historical data (issues, comments) remains associated with their account.
License and seat management
| Seat type | Includes | Cost |
|---|---|---|
| Member seat | All organization roles (Billing, Member, Admin, Manager, Owner) consume one member seat each. There is no distinction between read-only and full seats in standard plans. | Seat cost is bundled into plan pricing; Sentry's pricing is primarily event-volume-based, not per-seat. Team plan starts at $29/mo base; Business plan starts at $89/mo base. Additional members do not have a fixed per-seat line item in published pricing - costs scale with event volume. |
- Where to check usage: Settings → Members (shows current member count and roles). Billing details at Settings → Billing.
- How to identify unused seats: Sentry does not provide a native 'last login' or 'inactive member' report in the UI as of early 2025. Admins must manually review member lists or use the Sentry API endpoint GET /api/0/organizations/{organization_slug}/members/ to audit membership. SCIM-enabled organizations can cross-reference IdP activity logs.
- Billing notes: Sentry's billing model is primarily based on event volume (errors, transactions, replays, etc.), not per-seat fees. All plan tiers allow unlimited members on paid plans, though the Developer (free) plan is limited to 1 user. Business plan ($89/mo base) is required for SSO and SCIM. Enterprise pricing is custom and includes 90-day data retention and advanced features. Non-profit and academic discounts are available upon request.
The cost of manual management
Sentry's pricing is primarily event-volume-based, not per-seat, so adding members does not trigger a direct per-user line item on paid plans. The Developer plan is capped at one user; all paid tiers (Team at $29/mo base, Business at $89/mo base) allow unlimited members.
SCIM and SAML SSO - the tools that make provisioning scalable - are gated behind the Business or Enterprise plan. Without them, every app that onboards engineers requires manual invitations, manual role assignments, and manual removal when staff leave.
What IT admins are saying
Practitioners consistently flag four friction points. First, Google Workspace SCIM does not support group-based role assignment, so roles must still be set manually in Sentry after provisioning.
Second, the Owner role cannot be assigned or managed via SCIM at all - ownership changes always require UI intervention. Third, there is no native inactive-user or last-login report in the Sentry UI, making seat audits dependent on the REST API or IdP activity logs.
Fourth, invitation links expire after 48 hours, creating re-work when invitees are slow to respond.
Common complaints:
- Google Workspace SCIM integration does not support group-based role assignment, requiring manual role management in Sentry after provisioning.
- The Owner role cannot be assigned or managed via SCIM, forcing manual intervention for ownership changes.
- SCIM and SAML SSO require the Business or Enterprise plan, making automated provisioning unavailable on the free Developer or Team plans.
- No native inactive-user report or last-login visibility in the Sentry UI makes it difficult to audit and reclaim unused seats.
- Invitation links expire after 48 hours, causing friction when invitees do not act promptly.
- Admins (as opposed to Managers/Owners) have limited ability to manage members by default, requiring an explicit org-level setting change to allow Admin-initiated invites.
- Removing a user from Sentry does not automatically revoke their IdP session or deprovision them in the IdP, requiring dual management when SSO is enforced without SCIM.
The decision
Manual management is workable for small, stable teams where member turnover is low and the organization has not yet reached the Business plan threshold.
It becomes a liability at scale: Admins cannot remove members by default (only Owners and Managers can), SSO enforcement blocks email-based login without a corresponding IdP update, and removing a user in Sentry does not deprovision them in the IdP - leaving re-provisioning risk on the next SSO login.
Every app in the IdP that pushes group membership to Sentry reduces the manual surface area and closes the offboarding gap that manual removal alone cannot address. Teams with regular onboarding and offboarding cycles should treat SCIM via the IdP as the authoritative provisioning path, not the Sentry UI.
Bottom line
Sentry's manual member management is straightforward for small teams but accumulates operational debt quickly as headcount grows. The absence of a last-login report, the 48-hour invite expiry, and the Owner-only SCIM blind spot each require compensating processes.
Organizations that have reached the Business plan and configured SAML SSO should enable SCIM immediately - every app in the IdP that pushes group membership to Sentry reduces the manual surface area and closes the offboarding gap that manual removal alone cannot address.
Automate Sentry workflows without one-off scripts
Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.