Stitchflow
Stripe logo

Stripe User Management Guide

Manual workflow

How to add, remove, and manage users with operational caveats that matter in production.

UpdatedMar 9, 2026

Summary and recommendation

Stripe user management can be run manually, but complexity usually increases with role models, licensing gates, and offboarding dependencies. This guide gives the exact mechanics and where automation has the biggest impact.

Stripe's team management lives at Dashboard → Settings → Team and security. Access is controlled through six fixed roles - Owner, Administrator, Developer, Analyst, Support Specialist, and View Only - with no custom roles or per-resource permission toggles available on any plan.

Role scope is account-wide, meaning every app and integration tied to a Developer-role holder inherits that role's full API key access until keys are manually rotated.

For SSO-enabled enterprise accounts, roles can be assigned via SAML attribute statements in the identity provider, but the fixed role set itself does not change. SCIM provisioning (private preview) requires both an enterprise agreement and SSO already configured - it is not available on standard pay-as-you-go accounts.

Quick facts

Admin console pathDashboard → Settings → Team and security
Admin console URLOfficial docs
SCIM availableYes
SCIM tier requiredEnterprise / Custom
SSO prerequisiteYes

User types and roles

Role Permissions Cannot do Plan required Seat cost Watch out for
Administrator Full access to all Dashboard features including account settings, banking, payouts, team management, and all financial data. Cannot exceed permissions granted by the account owner; cannot transfer account ownership. All plans No per-seat fee; Stripe charges per transaction, not per user. Administrators can invite and remove other team members, including other Administrators. Carefully limit who holds this role.
Developer Access to API keys, webhooks, logs, and developer tools. Can view most financial data. Cannot manage team members, cannot access banking/payout settings, cannot modify account-level settings. All plans No per-seat fee. API key access means a Developer role holder can programmatically perform actions beyond their Dashboard UI permissions if keys are not rotated after removal.
Analyst Read-only access to payments, customers, reports, and financial data. Can export data. Cannot initiate refunds, cannot manage team, cannot access developer tools or account settings. All plans No per-seat fee. Data export capability means sensitive customer data can be extracted; monitor usage accordingly.
Support Specialist Can view and refund payments, manage disputes, and view customer data. Scoped to customer-facing operations. Cannot access financial reports, cannot manage team, cannot access developer tools or account settings. All plans No per-seat fee. Refund capability is included; ensure this role is only assigned to trusted support staff.
View Only Read-only access to payments, customers, and basic financial data. Cannot take any action; cannot export data, cannot manage team, cannot access settings. All plans No per-seat fee. Useful for auditors or stakeholders who need visibility without operational access.
Owner All Administrator permissions plus exclusive control over account ownership transfer, legal entity details, and certain compliance settings. Ownership cannot be shared; only one Owner per account. All plans No per-seat fee. Ownership transfer requires verification steps and cannot be undone without the new owner's cooperation. Losing access to the owner account can lock out critical settings.

Permission model

  • Model type: role-based
  • Description: Stripe uses a fixed set of predefined roles assigned per team member per account. There are no custom roles or granular permission toggles available in the standard Dashboard. For SSO-enabled enterprise accounts, roles can be assigned via SAML attribute statements in the identity provider, but the role set itself remains fixed.
  • Custom roles: No
  • Custom roles plan: Not documented
  • Granularity: Role-level only; no per-resource or per-feature permission toggles. Role scope is account-wide; there is no object-level or workspace-level permission scoping within a single Stripe account.

How to add users

  1. Log in to the Stripe Dashboard as an Administrator or Owner.
  2. Navigate to Settings → Team and security (https://dashboard.stripe.com/settings/team).
  3. Click 'Invite team member'.
  4. Enter the invitee's email address.
  5. Select the appropriate role from the dropdown (Administrator, Developer, Analyst, Support Specialist, View Only).
  6. Click 'Send invitation'.
  7. The invitee receives an email and must accept the invitation to gain access. If they do not have a Stripe account, they will be prompted to create one.

Required fields: Email address, Role selection

Watch out for:

  • Invitations expire if not accepted; a new invitation must be sent if the original expires.
  • The invitee must create or log in to a personal Stripe account to accept the invitation; Stripe does not support shared credentials.
  • A team member's access is tied to their personal Stripe account email, not a corporate directory entry, unless SSO is configured.
  • For accounts with SSO enabled, new members may be provisioned automatically via SCIM (private preview / enterprise), but roles must still be assigned via SAML attribute statements in the IdP.
  • There is no bulk CSV import for team members; invitations must be sent individually.
Bulk option Availability Notes
CSV import No Not documented
Domain whitelisting No Automatic domain-based user add
IdP provisioning Yes Enterprise (requires SSO agreement; SCIM is in private preview as of early 2025)

How to remove or deactivate users

  • Can delete users: Yes
  • Delete/deactivate behavior: Stripe allows removing (revoking) a team member's access to an account. This removes their access to that specific Stripe account but does not delete their personal Stripe account. The action is labeled 'Remove' in the Dashboard. There is no separate 'deactivate' state; removal is immediate and permanent for that account's access.
  1. Log in to the Stripe Dashboard as an Administrator or Owner.
  2. Navigate to Settings → Team and security (https://dashboard.stripe.com/settings/team).
  3. Locate the team member in the list.
  4. Click the overflow menu (three dots) or 'Edit' next to their name.
  5. Select 'Remove member' (or equivalent removal option).
  6. Confirm the removal. Access is revoked immediately for Dashboard login.
  7. If the removed user had API keys associated with their access, rotate or revoke those API keys separately under Developers → API keys.
Data impact Behavior
Owned records Payments, customers, and other records created by the removed user remain in the account and are not deleted. Records are associated with the account, not the individual team member.
Shared content No shared content model; all data belongs to the Stripe account, not individual users.
Integrations API keys are not automatically revoked when a team member is removed. Any API keys the removed user created or had access to must be manually rotated or deleted to prevent continued programmatic access.
License freed No per-seat licensing; removing a user has no billing impact.

Watch out for:

  • API keys are not invalidated automatically upon team member removal. Failure to rotate API keys after removing a developer-role user is a significant security risk.
  • For SSO-enabled accounts, deprovisioning in the IdP (e.g., Okta) removes Dashboard SSO access, but if the user has a direct Stripe login (non-SSO), that access may persist unless the account enforces SSO-only login.
  • SCIM deprovisioning (where available) handles account suspension but role management remains tied to SAML attributes; verify both IdP deprovisioning and SAML attribute removal.
  • There is no audit log export directly from the team management UI; use the Stripe Dashboard event log or API to audit access history.
  • Removing a team member does not notify them; communication must be handled separately.

License and seat management

Seat type Includes Cost
Team member (all roles) Full Dashboard access per assigned role; no per-seat fee. No additional cost. Stripe pricing is transaction-based (e.g., 2.9% + $0.30 per card charge on standard plan). Team member seats are unlimited and free.
  • Where to check usage: Settings → Team and security (https://dashboard.stripe.com/settings/team) - lists all active team members and their roles.
  • How to identify unused seats: No built-in 'last login' or activity timestamp is displayed in the Team settings UI. Administrators must cross-reference the Dashboard event log or use the Stripe API to identify inactive members. There is no automated unused-seat detection.
  • Billing notes: Stripe does not charge per team member seat. Adding or removing users has no direct billing impact. Costs are driven entirely by payment processing volume and any add-on products (Radar, Billing, etc.).

The cost of manual management

Stripe does not charge per team member seat; adding or removing users has no direct billing impact. Costs are driven entirely by payment processing volume and any add-on products. The absence of granular permissions means roles broader than strictly necessary must be assigned when a narrower scope would suffice.

There is no bulk invitation or CSV import; every team member must be invited individually. There is also no last-login or activity timestamp in the Team settings UI, so identifying and cleaning up inactive accounts requires cross-referencing the Dashboard event log or querying the API separately.

What IT admins are saying

The most consistent friction reported by Stripe teams centers on three gaps: the fixed role set forces over-provisioning when a narrower scope is needed; API keys are not automatically revoked on team member removal, creating a security gap that requires a deliberate separate step; and role management is decoupled from SCIM, requiring SAML attribute configuration in the IdP on top of provisioning setup.

SSO enforcement and SCIM access are gated behind an enterprise agreement, which is not accessible on self-serve plans. Teams that need audit visibility are also limited - there is no last-login display in the Team UI, and no audit log export directly from team management.

Common complaints:

  • No custom roles or granular permissions; users must be given broader access than needed because the fixed role set does not allow fine-grained scoping.
  • API keys are not automatically revoked when a team member is removed, creating a security gap that requires a separate manual step.
  • No bulk invitation or CSV import for team members; large teams must be invited one at a time.
  • No 'last login' or activity visibility in the Team settings UI, making it difficult to identify and clean up inactive accounts.
  • Role management is separate from SCIM provisioning; roles must be assigned via SAML attribute statements in the IdP, not through SCIM, adding IdP configuration complexity.
  • SSO enforcement and SCIM provisioning require an enterprise agreement, which is not available on self-serve plans.
  • Delayed or incomplete access revocation when relying solely on IdP deprovisioning if SSO-only login is not strictly enforced on the Stripe account.
  • No native support for Google Workspace or OneLogin SSO/SCIM; only Okta and Entra (Azure AD) are documented as supported IdPs.

The decision

Stripe's manual team management is straightforward for small teams: invite by email, assign a role, remove when done. The process breaks down at scale or in security-sensitive environments, because every app connected via a Developer-role holder carries residual API key risk after that person is removed - key rotation is a manual, non-negotiable offboarding step.

If your organization requires SSO enforcement, automated provisioning, or deprovisioning guarantees, an enterprise agreement is a prerequisite - not an upgrade option. Teams operating on standard plans should accept that role granularity will not improve without a plan change and should treat API key rotation as a mandatory control.

Bottom line

Stripe's team access model is functional for small, trusted teams but shows clear limits as headcount or compliance requirements grow.

Every app that connects via a Developer-role holder carries residual API key risk after that person is removed - key rotation is a manual, non-negotiable step. The fixed role set, lack of last-login visibility, and one-at-a-time invitation flow add operational overhead that compounds at scale.

SCIM and SSO enforcement are available but require an enterprise agreement and IdP configuration that goes beyond what SCIM alone handles, since roles must be set via SAML attribute statements separately.

Automate Stripe workflows without one-off scripts

Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.

Every app coverage, including apps without APIs
60+ app integrations plus browser automation for apps without APIs
IT graph reconciliation across apps and your IdP
Less than a week to launch, maintained as APIs and admin consoles change
SOC 2 Type II. ~2 hours of your team's time

UpdatedMar 9, 2026

* Details sourced from official product documentation and admin references.

Keep exploring

Related apps

15Five logo

15Five

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

15Five uses a fixed role-based permission model with six predefined roles: Account Admin, HR Admin, Billing Admin, Group Admin, Manager, and Employee. No custom roles can be constructed. User management lives at Settings gear → People → Manage people p

1Password logo

1Password

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

1Password's admin console at my.1password.com covers the full user lifecycle — invitations, group assignments, vault access, suspension, and deletion — without any third-party tooling. Like every app that mixes role-based and resource-level permissions

8x8 logo

8x8

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

8x8 Admin Console supports full lifecycle user management — create, deactivate, and delete — across its X Series unified communications platform. Every app a user can access (8x8 Work desktop, mobile, web, Agent Workspace) is gated by license assignmen