Complete these steps when the collaborator should no longer see Plausible data. Proper offboarding ensures security, maintains audit trails, and prevents orphaned configurations.
When to Remove Access
Engagement Completion
- Project or contract ends and access is no longer needed
- Deliverables completed and transition to client-managed analytics
- Temporary support period expires
- Client terminates services or changes providers
Scope Reduction
- Specific sites removed from engagement coverage
- Partial offboarding where some site access continues but others end
- Role consolidation where multiple accounts merge into one
Security Events
- Compromised credentials requiring immediate access revocation
- Unauthorized data access or usage detected
- Compliance violation requiring access suspension
- Security audit findings mandating access removal
Organizational Changes
- Collaborator leaves the organization or changes roles
- Service account decommissioning or consolidation
- Identity provider integration requiring account migration
- Credential rotation requiring removal and re-invitation
Pre-Removal Checklist
Before removing access, prepare for business continuity:
Identify All Access Points
- List every Plausible site where the collaborator has access.
- Document the role (Administrator or Viewer) for each site.
- Check for API keys generated by or associated with the account.
- Review email subscriptions, Slack integrations, and custom alerts tied to the account.
Transfer Ownership
- Goals and Custom Events: Ensure client administrators can manage configurations the collaborator created.
- Email Reports: Reassign or cancel scheduled reports sent from the collaborator's account.
- Shared Dashboards: If custom views were saved, document configurations for recreation if needed.
- API Integrations: Migrate automations to client-owned or alternative service accounts before revoking credentials.
Document Current State
- Capture screenshots of the Team page showing the collaborator's current access.
- Export or record the list of goals, custom properties, and integrations managed by the account.
- Note any active projects, debugging sessions, or configurations in progress.
Removal Steps
Remove from Individual Sites
- Sign in to Plausible and open the first site dashboard where the collaborator has access.
- Navigate to Settings → Team.
- Locate the collaborator's account in the member list.
- Click the Remove button (trash icon) next to their email address.
- Confirm the removal in the dialog box.
- Repeat steps 1-5 for each Plausible site where the collaborator had access.
Verify Complete Removal
After removing from all sites:
- Confirm the account no longer appears in any site's Team list.
- Check your master site-to-user access tracking spreadsheet and mark all sites as "Removed."
- Verify pending invitations are canceled if the collaborator was invited but never accepted.
Self-Hosted Plausible Considerations
If you manage a self-hosted instance:
- Site-level access removal in the UI is sufficient for web access.
- Separately revoke any SSH keys or server-level credentials granted for infrastructure access.
- Review database access, backup systems, and log files for residual permissions.
- Rotate PostgreSQL passwords if the collaborator previously had database access.
- Check Docker container access and remove from any relevant user groups.
Revoke API Access
Plausible API keys are separate from site team membership:
- Navigate to Settings → API Keys for each site.
- Review the list of API keys and identify any created by or shared with the collaborator.
- Delete or regenerate API keys to ensure the collaborator can no longer access data programmatically.
- Update any automation scripts, dashboards, or integrations using those keys.
- Document the API key rotation in your security log with the date and reason.
Cancel Pending Invitations
If invitations were sent but not yet accepted:
- Go to Settings → Team and scroll to the Pending Invitations section.
- Click Cancel on any outstanding invitations for the collaborator.
- Document the cancellation to avoid confusion if the invitation email is later discovered.
Documentation and Evidence
Capture Audit Trail
- Screenshot or export the Team list after removal showing the collaborator no longer appears.
- Archive screenshots from before removal for comparison.
- Export Plausible audit logs if available (self-hosted instances may have server logs).
- Record the removal timestamp and performing administrator's name.
Update Access Records
Log the removal in your IAM tracker with:
- Removal request ticket ID or reference number
- Approver name and approval date
- Actual removal date and time
- List of all sites where access was revoked
- API keys rotated or deleted
- Transition or handoff notes
Communicate Removal
- Notify the collaborator's engagement lead that access has been fully revoked.
- Send formal confirmation email documenting the removal.
- Update your contracts or SOW documentation to reflect the offboarding.
- Inform client stakeholders if the collaborator was known to them.
Post-Removal Clean-Up
Integration and Notification Management
- Email Reports: Cancel or reassign any scheduled email reports that were sent to the collaborator or configured by their account.
- Slack Notifications: Remove the collaborator from Plausible Slack integrations and channels.
- Webhook Configurations: Update or remove webhooks pointing to systems managed by the collaborator.
- Google Search Console: Verify integrations aren't tied to the collaborator's Google account.
Configuration Ownership
- Custom Properties and Goals: Ensure ownership transfers to client or alternative accounts.
- Funnels and Segments: Document configurations created by the collaborator for client reference.
- Shared Reports: Migrate or recreate any reports that were account-specific.
Credential and Secret Rotation
- Rotate any API tokens, webhook secrets, or integration credentials the collaborator may have accessed.
- Update shared passwords or secrets if Plausible credentials were stored in shared vaults.
- Review exported data files or reports shared with the collaborator and reclassify if necessary.
Downstream Systems
- Remove the collaborator's account from BI tools, data warehouses, or reporting platforms that consume Plausible data.
- Update access controls for any data exports, BigQuery datasets, or analytics pipelines.
- Revoke access to documentation, runbooks, or internal wikis describing Plausible configurations.
Compliance and Audit
Regulatory Requirements
- If GDPR, HIPAA, or other data protection regulations apply, document the removal as part of your data access audit.
- Retain evidence of removal for the duration required by your compliance framework (typically 3-7 years).
- Update data processing agreements or DPAs to reflect the collaborator's removal.
Client Notifications
- For client-facing engagements, notify the client that the collaborator no longer has access to their data.
- Provide removal confirmation in writing if requested by the client.
- Update any data access disclosures or privacy notices if the collaborator was explicitly mentioned.
Internal Audit Trail
- Archive removal evidence in your IAM system or document repository.
- Include the removal in quarterly access reviews and recertification reports.
- Track offboarding completion in your project management or ticketing system.
Emergency Removal Procedures
For immediate access revocation due to security incidents:
- Act Immediately: Remove from all sites without waiting for formal approvals.
- Revoke API Keys: Delete or regenerate all API keys the account could access.
- Document the Incident: Record the reason, timestamp, and actions taken.
- Notify Security Team: Alert your information security team for investigation.
- Monitor for Anomalies: Review recent activity logs for unauthorized access or data exports.
- Follow-Up Formally: Complete standard offboarding documentation after the emergency response.
Troubleshooting Removal Issues
Can't find the collaborator in Team list
- Verify you're viewing the correct site - they may have access to different sites.
- Check pending invitations in case they never accepted.
- Confirm the email address or account identifier is correct.
- For self-hosted, query the database directly if the UI doesn't show the account.
Remove button grayed out or unavailable
- Ensure you have Administrator privileges for the site.
- You cannot remove yourself - ask another administrator to perform the removal.
- Site owner restrictions may prevent removal - contact the account owner.
API access continues after removal
- API keys are separate from team membership - remove keys explicitly.
- Check for additional API keys or service accounts with access.
- Verify API key deletion by testing with the old credentials.
- Review API logs to confirm access ceased after key removal.
Collaborator reports still seeing data
- Confirm they're logged out and have cleared browser cache.
- They may have access through a different email or personal account - verify account identity.
- Check if they still have access to other sites you haven't removed them from.
- For self-hosted, verify the database update completed successfully.
Self-hosted removal not working
- Check PostgreSQL database for user record and permissions.
- Review application logs for errors during removal.
- Verify the web UI changes persist after page reload.
- Test with a different browser or incognito mode to rule out caching.
Best Practices for Offboarding
- Remove access immediately upon engagement completion - don't leave expired accounts active.
- Perform offboarding during business hours when support is available if issues arise.
- Use a checklist to ensure all sites, API keys, and integrations are addressed.
- Archive removal evidence systematically for audit and compliance purposes.
- Schedule quarterly reviews to identify and remove any overlooked accounts.
- Maintain a runbook template for consistent offboarding across team members.
Related Procedures
After removal, consider:
- Updating internal documentation removing references to the collaborator's access.
- Reviewing other analytics platforms where the collaborator may have had access.
- Conducting access recertification for remaining active accounts.
- Updating onboarding documentation if the collaborator's removal reveals process gaps.