Use this runbook to deprovision the collaborator from Mixpanel. Timely access removal is critical for data security, compliance, and preventing unauthorized access after engagement completion.
When to Remove Access
Remove access in these situations:
Engagement-Related
- Project completion: Statement of work concludes and services are no longer needed
- Contract termination: Business relationship ends requiring immediate revocation
- Scope change: Engagement continues but Mixpanel work is removed from scope
- Transition: Another agency or internal team assumes Mixpanel responsibilities
Security and Compliance
- Access review findings: Quarterly audits identify inactive or excessive permissions
- Security incident: Credential compromise requires precautionary suspension
- Policy violation: User activity breaches data handling or acceptable use policies
- Regulatory requirement: Legal or compliance teams mandate removal
Organizational Changes
- Staff turnover: Individual using the account left the collaborator's organization
- Role change: Person's responsibilities shifted away from analytics
- Company merger/acquisition: Organizational changes make access obsolete
Understanding Removal Options
Mixpanel provides two methods for revoking access:
Option 1: Complete Member Deletion
- Effect: Permanently removes the account from your organization
- When to use: Account will never be needed again or for permanent offboarding
- Implications: User history in audit logs but account cannot be restored; dashboards/reports remain but show "created by removed user"; API tokens instantly invalidated
- Irreversible: Cannot be undone; requires new invitation to restore
Option 2: Permission Revocation
- Effect: Removes permissions while preserving account record
- When to use: Temporary suspensions or audit trail preservation
- Process: Change organization role to lowest level, clear all project access
- Advantages: Quickly restored; maintains complete audit trail
Most organizations use Option 1 for permanent departures and Option 2 for temporary holds or audit requirements.
Removal Workflow
1. Verify Authorization
- Confirm authorization via email, ticket, or engagement manager request
- Verify you have Organization Admin privileges
- Review user's current role and project assignments
- Check for pending work needing completion or transfer
2. Document Current State
- Navigate to Organization Settings → Members
- Locate collaborator's account and view details
- Screenshot: organization role, project assignments, last activity, creation date
- Export member list as CSV
- Note dashboards, reports, or cohorts user created
3. Transfer Ownership
Before removal, preserve critical work:
- Dashboards/Reports: Duplicate important content to admin account; export critical reports
- Cohorts/Segments: Transfer valuable cohorts; document definitions
- Data Pipelines: Transfer ownership of integrations/exports; document configurations
- API Integrations: Generate replacement tokens under service account; test new credentials
4. Remove Access
For Complete Deletion:
- Go to Organization Settings → Members
- Locate collaborator's account
- Click three-dot menu or Actions
- Select Remove Member or Delete
- Confirm deletion
- Verify account disappears from list
For Permission Revocation:
- Go to Organization Settings → Members
- Click user's name
- Change role to None or lowest level
- Remove all project access
- Add note: "Access revoked [date] per [ticket]"
- Verify zero project assignments
5. Remove SSO/SCIM Access
- Log into IdP console (Okta, Azure AD, etc.)
- Remove user from Mixpanel groups/roles
- Confirm SCIM won't auto-recreate
- Force manual sync if available
- Test SSO login fails
6. Verify Removal
- User not in active member list (or shows zero projects)
- SSO login fails
- API tokens return 401 errors
- Automated reports don't send to user
- Notifications don't mention user
7. Update Documentation
- Update IAM tracker: removal date, administrator, requestor, approver, ticket, justification, method, projects removed
- Store before/after screenshots
- Archive removal confirmation
Evidence and Recordkeeping
Required Documentation
- Access Evidence: Before/after screenshots, CSV exports, audit log entries
- Approval Records: Email approvals, ticket numbers, SOW references
- Communication Logs: Confirmation emails
Audit Log Review
Access via Organization Settings → Activity Log or Audit Log:
- Filter for removed user's email
- Review activity history
- Export entries (logins, actions, changes, exports)
- Archive with engagement docs
Post-Removal Clean-Up
Credential Management
- API Tokens: Invalidate and generate new under service account
- Webhooks: Remove user from Slack integrations; update distribution lists
- Data Export: Revoke Data Warehouse credentials; update scheduled exports
Content Management
- Audit dashboards/cohorts created by removed user
- Duplicate critical content to admin
- Archive/delete obsolete items
- Update ownership descriptions
Communication
To Collaborator:
Subject: Mixpanel Access Removed for [Name]
We have removed Mixpanel access for [email] as of [date]
per [engagement completion/ticket].
Dashboards created have been preserved and transferred
to [new owner if applicable].
If this was done in error, contact [team] within 5 business days.
Internal: Inform security team, update closeout docs, notify project manager
Troubleshooting
User Still Has Access
- Verify changes saved
- Check for multiple similar accounts
- Confirm SSO/SCIM propagated (up to 1 hour)
- Ask user to clear cache and retry
- Check cached credentials
API Tokens Still Work
- Tokens may have grace period (30 minutes)
- Explicitly revoke in Settings → API Tokens
- Verify token not copied to service account
Dashboards Break
- Occurs with user-specific segments
- Recreate under admin before removing
- Use org-wide segments
- Contact Mixpanel Support
SCIM Recreates Account
- Verify removed from all IdP groups
- Check SCIM settings
- Disable auto-provisioning
- Review IdP dynamic rules
Need Quick Restore
- If revoked: reassign role and projects
- If deleted: send new invitation
- For SSO: re-add to IdP groups
Best Practices
Security
- Remove within 24 hours of completion
- Quarterly access reviews
- Use SCIM automated deprovisioning
- Maintain docs for 7+ years
- Separation of duties for granting vs. revoking
Operations
- Standardized offboarding checklist
- Document dashboard dependencies
- Use service accounts for integrations
- Schedule removals during low-activity
- Dry runs with test accounts
Communication
- 2-week notice when appropriate
- Remove first, notify second (security scenarios)
- Professional, neutral notifications
- 5-day dispute window
- Document all communications
Prevention
- Set expiration reminders at invitation
- Role-based access with groups
- Least privilege from start
- Separate contractor projects
- Tag temporary accounts in tracker