Stitchflow
SysAid logo

SysAid User Management Guide

Manual workflow

How to add, remove, and manage users with operational caveats that matter in production.

UpdatedMar 16, 2026

Summary and recommendation

SysAid user management can be run manually, but complexity usually increases with role models, licensing gates, and offboarding dependencies. This guide gives the exact mechanics and where automation has the biggest impact.

SysAid organizes users into two distinct populations: admin/agent accounts, which consume paid license seats and operate the service desk, and end users, who access only the Self-Service Portal and do not consume agent seats.

Permissions for admins are inherited from admin groups, not set per individual - changing a group's permission profile affects every member of that group.

SCIM-based provisioning is available but gated behind the Enterprise plan and requires SSO to be fully configured first.

Quick facts

Admin console pathSettings (gear icon) > Administrator > User Management
Admin console URLOfficial docs
SCIM availableYes
SCIM tier requiredEnterprise
SSO prerequisiteYes

User types and roles

Role Permissions Cannot do Plan required Seat cost Watch out for
Administrator (Admin) Full access to SysAid configuration, service desk operations, user management, reporting, and all modules enabled on the account. Can create and manage other admins and end users. Cannot exceed the number of licensed admin seats purchased. Reported at $79/user/month (Help Desk) or $108/user/month (ITSM); exact per-seat cost depends on contracted plan. Admin seats are the primary licensed seat type; adding admins consumes a paid license seat.
End User (Service User) Can submit and track service requests via the Self-Service Portal. No access to the admin/agent interface. Cannot manage tickets on behalf of others, access admin settings, or run reports. End users are typically not counted as paid agent seats; licensing is based on admin/agent count and managed assets. End-user accounts can be created manually, imported via LDAP/AD, or auto-created on first login via SSO. Large end-user populations do not directly consume agent license seats.
Admin Group Member Subset of admin permissions defined by the admin group's permission profile. Can be scoped to specific modules, categories, or service desk functions. Cannot perform actions outside the permission profile assigned to their admin group. Consumes an admin/agent license seat. Permissions are inherited from the admin group, not set individually per user. Changing a group's profile affects all members.

Permission model

  • Model type: role-based
  • Description: SysAid uses admin groups with associated permission profiles to control what administrators can access and do. Each admin is assigned to one or more admin groups; the group's permission profile determines module access, ticket visibility, and configuration rights. End users have a fixed, non-configurable permission set limited to the Self-Service Portal.
  • Custom roles: Yes
  • Custom roles plan: Not documented
  • Granularity: Module-level and category-level scoping within admin groups. Permissions can be set per module (e.g., Incidents, Problems, Changes, Assets) and per service category routing.

How to add users

  1. Log in as an administrator and navigate to Settings > Administrator > Administrators (for admin users) or Settings > End Users > End Users (for end users).
  2. Click 'New' or the add button to open the user creation form.
  3. Enter required fields (username, display name, email address, password or authentication method).
  4. Assign the user to an admin group (for admin users) to apply the appropriate permission profile.
  5. Save the record. The user can now log in with the configured credentials or SSO.

Required fields: Username, First name, Last name, Email address, Password (if not using SSO/LDAP authentication)

Watch out for:

  • Admin users must be assigned to at least one admin group; without a group assignment, permissions may be undefined.
  • If LDAP sync is active, manually created users may be overwritten or duplicated if the same username exists in the directory.
  • SSO-only environments may require the user to exist in the IdP before they can authenticate; SysAid does not auto-provision admin accounts from IdP without SCIM or LDAP sync.
  • SCIM provisioning (for automated IdP-driven user creation) requires the Enterprise plan and an SSO prerequisite.
Bulk option Availability Notes
CSV import Yes Settings > End Users > Import Users (CSV import available for end users); admin bulk import via LDAP sync.
Domain whitelisting No Automatic domain-based user add
IdP provisioning Yes Enterprise (SCIM via Okta or Azure AD requires Enterprise tier and SSO add-on)

How to remove or deactivate users

  • Can delete users: Yes
  • Delete/deactivate behavior: SysAid documentation indicates that both admin and end-user accounts can be deleted from the user management interface. Admins can also be deactivated (disabled) without deletion, which prevents login while preserving the account record and associated history. The specific UI path is the user record's status field or a delete action in the user list.
  1. Navigate to Settings > Administrator > Administrators (for admin users) or Settings > End Users > End Users (for end users).
  2. Open the user record.
  3. Set the account status to inactive/disabled, or use the delete option to remove the account entirely.
  4. Save changes.
Data impact Behavior
Owned records Service records (tickets, incidents, changes) previously assigned to or submitted by the user remain in the system and retain their historical assignment data.
Shared content Shared views, filters, or reports created by the user may remain accessible to other admins depending on sharing settings.
Integrations If the user was mapped in an LDAP or SSO integration, deactivating in SysAid does not automatically disable the IdP account; IdP-side deprovisioning must be handled separately unless SCIM is configured.
License freed Deactivating or deleting an admin user frees the consumed admin/agent license seat, making it available for reassignment.

Watch out for:

  • Deactivating a user in SysAid does not revoke their IdP session or disable their IdP account; SSO users may still be able to authenticate if the IdP account remains active.
  • If LDAP sync is scheduled, a deactivated user whose AD account is still active may be re-enabled on the next sync cycle depending on sync configuration.
  • Deleting a user is generally irreversible; associated ticket history is retained but the user profile record is removed.

License and seat management

Seat type Includes Cost
Admin / Agent seat Full access to the SysAid admin interface, service desk, and configured modules. Required for IT staff managing tickets and system configuration. Reported at $79/user/month (Help Desk plan) or $108/user/month (ITSM plan); Enterprise pricing is custom.
End User (Self-Service Portal) Access to the Self-Service Portal for submitting and tracking requests only. Not counted as a paid agent seat. Included; end users do not consume agent license seats.
  • Where to check usage: Settings > General Settings > License Information (displays current licensed seat count and active admin/agent usage).
  • How to identify unused seats: Review the Administrators list (Settings > Administrator > Administrators) and filter by last login date or inactive status to identify admin accounts that have not been used recently.
  • Billing notes: SysAid pricing is based on the number of admin/agent seats and the number of managed assets. End users are not separately licensed. Pricing is not publicly listed for all tiers; Enterprise pricing requires contacting sales. The SSO Connector and SCIM provisioning are add-on or Enterprise-tier features.

The cost of manual management

Every app with manually managed user accounts carries a compounding operational cost: stale admin accounts that were never deactivated, LDAP sync conflicts from accounts created outside the directory, and re-enabled users when AD sync runs against a deactivated SysAid record.

In SysAid, admin seats are the primary licensed unit - each active admin account consumes a paid seat regardless of how frequently that person logs in. Identifying unused seats requires manually filtering the Administrators list by last login date, a process that does not scale for larger IT teams.

What IT admins are saying

Community evidence is not specific enough to quote or summarize yet for this app.

The decision

Use manual user management in SysAid if your team is small, your IdP is not Okta or Azure AD, or you are not on the Enterprise plan.

For any environment where admin turnover is frequent or end-user populations are large, LDAP sync or SCIM provisioning will reduce the overhead of keeping every app's user state accurate.

Be aware that neither LDAP sync nor SCIM eliminates the need for a parallel IdP deprovisioning step - SysAid account deactivation and IdP session revocation are independent actions.

Bottom line

SysAid's manual user management is functional for small, stable teams but introduces real operational risk at scale: LDAP sync conflicts, orphaned admin seats, and the absence of automatic IdP propagation on deactivation mean that every app connected through SysAid's identity chain requires its own deprovisioning verification.

Teams that need reliable lifecycle automation should treat SCIM via Okta or Azure AD as a prerequisite, not an enhancement - and should budget for the Enterprise plan and SSO configuration work that unlocks it.

Automate SysAid workflows without one-off scripts

Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.

Every app coverage, including apps without APIs
60+ app integrations plus browser automation for apps without APIs
IT graph reconciliation across apps and your IdP
Less than a week to launch, maintained as APIs and admin consoles change
SOC 2 Type II. ~2 hours of your team's time

UpdatedMar 16, 2026

* Details sourced from official product documentation and admin references.

Keep exploring

Related apps

15Five logo

15Five

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

15Five uses a fixed role-based permission model with six predefined roles: Account Admin, HR Admin, Billing Admin, Group Admin, Manager, and Employee. No custom roles can be constructed. User management lives at Settings gear → People → Manage people p

1Password logo

1Password

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

1Password's admin console at my.1password.com covers the full user lifecycle — invitations, group assignments, vault access, suspension, and deletion — without any third-party tooling. Like every app that mixes role-based and resource-level permissions

8x8 logo

8x8

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

8x8 Admin Console supports full lifecycle user management — create, deactivate, and delete — across its X Series unified communications platform. Every app a user can access (8x8 Work desktop, mobile, web, Agent Workspace) is gated by license assignmen