Stitchflow
UserGuiding logo

UserGuiding User Management API Guide

API workflow

How to automate user lifecycle operations through APIs with caveats that matter in production.

UpdatedMar 16, 2026

Summary and recommendation

UserGuiding exposes a REST API at https://api.userguiding.com/v1, authenticated via a Bearer token scoped to the workspace.

The API is write/upsert-oriented: the primary endpoint is POST /v1/identify, which creates or updates a user profile and optionally associates it with a company via a nested company object in the same payload.

No GET /users listing, filtering, or pagination is documented - treat this API as an identity graph write surface, not a bidirectional sync target.

The API token carries no per-token scope restrictions, so treat it as a high-privilege credential.

API quick reference

Has user APIYes
Auth methodAPI Token (Bearer token passed in Authorization header)
Base URLOfficial docs
SCIM availableNo
SCIM plan requiredEnterprise (Corporate)

Authentication

Auth method: API Token (Bearer token passed in Authorization header)

Setup steps

  1. Log in to your UserGuiding dashboard.
  2. Navigate to Settings → Integrations → API.
  3. Generate or copy your API Token.
  4. Include the token in all requests as: Authorization: Bearer

User object / data model

Field Type Description On create On update Notes
userId string Unique identifier for the user in your system. required required Must match the ID used when initializing the UserGuiding SDK on the frontend.
email string User's email address. optional optional Custom attribute passed as part of user attributes object.
name string User's display name. optional optional Custom attribute.
created_at string (ISO 8601) Timestamp when the user was created in your system. optional optional Custom attribute; used for segmentation.
attributes object Arbitrary key-value pairs for custom user properties. optional optional Supports string, number, boolean values. Used for segmentation and targeting.
company object Company/account object associated with the user. optional optional Contains companyId and company-level attributes.
companyId string Unique identifier for the company/account. optional optional Nested within the company object.

Core endpoints

Identify / Upsert User

  • Method: POST
  • URL: https://api.userguiding.com/v1/identify
  • Watch out for: userId must exactly match the ID used in the frontend SDK initialization; mismatches result in duplicate user profiles.

Request example

POST /v1/identify
Authorization: Bearer <TOKEN>
Content-Type: application/json
{
  "userId": "user_123",
  "attributes": { "email": "user@example.com", "plan": "pro" }
}

Response example

{
  "success": true
}

Identify / Upsert Company

  • Method: POST
  • URL: https://api.userguiding.com/v1/identify
  • Watch out for: Company attributes are passed nested inside the same identify call; there is no separate company endpoint.

Request example

POST /v1/identify
Authorization: Bearer <TOKEN>
Content-Type: application/json
{
  "userId": "user_123",
  "company": { "companyId": "acme", "attributes": { "name": "Acme Corp" } }
}

Response example

{
  "success": true
}

Rate limits, pagination, and events

  • Rate limits: Rate limits are not explicitly documented in official sources.

  • Rate-limit headers: No

  • Retry-After header: No

  • Rate-limit notes: No official rate-limit documentation found. Treat as unknown.

  • Pagination method: none

  • Default page size: 0

  • Max page size: 0

  • Pagination pointer: Not documented

  • Webhooks available: No

  • Webhook notes: No official webhook support documented in UserGuiding's API or help center as of the policy date.

  • Alternative event strategy: Use UserGuiding's native integrations (e.g., Segment, Amplitude, HubSpot) or Zapier to react to guide completion and NPS events.

SCIM API status

  • SCIM available: No
  • SCIM version: Not documented
  • Plan required: Enterprise (Corporate)
  • Endpoint: Not documented

Limitations:

  • No native SCIM provisioning documented.
  • SSO is listed as a Corporate-tier feature but SCIM provisioning is not confirmed in official docs.
  • No IdP connector (Okta, Entra, Google Workspace, OneLogin) officially listed.

Common scenarios

The three documented integration patterns are server-side attribute sync on login, company association via nested identify payload, and bulk attribute backfill via iterated POST calls.

For server-side sync, call POST /v1/identify on successful authentication with userId, relevant attributes (plan, role, created_at), and the Authorization: Bearer header

the frontend SDK picks up updated attributes on next page load, but guide display still requires the SDK to be active client-side.

For company association, include a company object with companyId in the same identify call;

there is no separate company endpoint and no explicit unlink operation is documented, so account switches require a new identify call.

For bulk backfill, there is no batch endpoint

each user requires an individual POST call, and since rate limits are entirely undocumented, implement exponential backoff and monitor for HTTP 429 responses before running at volume.

Server-side user attribute sync on login

  1. On successful authentication in your backend, call POST /v1/identify with the user's userId and relevant attributes (plan, role, created_at).
  2. Include Authorization: Bearer header.
  3. UserGuiding updates the user profile; the frontend SDK will pick up the latest attributes on next page load.

Watch out for: Attributes set server-side are available for segmentation but guide display still requires the frontend SDK to be loaded.

Associate user with a company/account

  1. Include a company object in the identify payload with companyId and desired company attributes.
  2. Send POST /v1/identify with both userId and company fields.
  3. UserGuiding links the user to the company, enabling company-level segmentation.

Watch out for: If companyId changes (e.g., user switches accounts), send a new identify call; there is no explicit unlink operation documented.

Bulk backfill user attributes

  1. Iterate over your user records and send individual POST /v1/identify calls for each user.
  2. Add a delay or rate-limiting mechanism between requests as official rate limits are undocumented.
  3. Verify attribute updates in the UserGuiding dashboard under Users.

Watch out for: No bulk/batch endpoint exists; each user requires a separate API call. Monitor for HTTP 429 responses and implement backoff.

Why building this yourself is a trap

The most common integration failure is a userId mismatch between the server-side API call and the frontend SDK initialization - the match is case-sensitive, and any divergence silently creates duplicate user profiles in the identity graph rather than throwing an error.

Custom attributes written via the API are not retroactively applied to historical sessions, so backfills affect future segmentation only. Webhooks are not supported; to react to guide completion or NPS events, you must route through UserGuiding's native integrations (Segment, Amplitude, HubSpot) or Zapier.

SCIM provisioning is not documented even at the Corporate tier, meaning the identity graph built through the API cannot be managed through a standard IdP connector - automated lifecycle operations require custom tooling against the upsert endpoint.

Automate UserGuiding workflows without one-off scripts

Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.

Every app coverage, including apps without APIs
60+ app integrations plus browser automation for apps without APIs
IT graph reconciliation across apps and your IdP
Less than a week to launch, maintained as APIs and admin consoles change
SOC 2 Type II. ~2 hours of your team's time

UpdatedMar 16, 2026

* Details sourced from official product documentation and admin references.

Keep exploring

Related apps

Abnormal Security logo

Abnormal Security

API Only
AutomationAPI only
Last updatedMar 2026

Abnormal Security is an enterprise email security platform focused on detecting and investigating threats such as phishing, account takeover (ATO), and vendor email compromise. It does not support SCIM provisioning, which means every app in your stack

ActiveCampaign logo

ActiveCampaign

API Only
AutomationAPI only
Last updatedFeb 2026

ActiveCampaign uses a group-based permission model: every user belongs to exactly one group, and all feature-area access (Contacts, Campaigns, Automations, Deals, Reports, Templates) is configured at the group level, not per individual. The default Adm

ADP logo

ADP

API Only
AutomationAPI only
Last updatedFeb 2026

ADP Workforce Now is a mid-market to enterprise HCM platform that serves as the HR source of record for employee data — payroll, benefits, time, and talent. User access is governed by a hybrid permission model: predefined security roles (Security Maste