Home
IT Hub
AI

Configuring SaaS Offboarding Workflows the Right Way

Reco Security Experts
Updated
May 18, 2026
May 18, 2026
5 min read

The offboarding email goes out at 5 pm Friday. HR has notified IT. The SSO account is deactivated within the hour, and the offboarding ticket gets closed. Two months later, the former employee's ChatGPT subscription is still active on the corporate card, an n8n agent they built is still pulling data from Salesforce on schedule, and a Drive folder they owned just exposed a customer contract to an external party because nobody ever transferred file ownership.

Deactivating the IdP account does not offboard the user. The IdP account is the smallest surface a departing employee leaves behind. Everything that carries real operational and security risk lives in places the IdP never reached: shadow SaaS, OAuth grants, AI agents, API tokens, and file ownership. These outlast the SSO deactivation by default, because revoking them was never part of the workflow.

This article walks through how to configure an offboarding workflow that actually offboards. The structure is six surfaces, three workflow principles (sequence, verify, document), and one number that belongs in board reporting: time-to-full-offboard.

WHAT YOU'LL LEARN

  • The SSO account is the smallest part of what a departing employee leaves behind
  • Six surfaces require explicit revocation: shadow SaaS, OAuth, API tokens, AI agents, file ownership, audit trail
  • Workflows should sequence revocations, verify each step, and document evidence
  • Reco's identity-to-app map is the source of truth for completeness
  • Track time-to-full-offboard as a security KPI, not just SSO time-to-revoke

Before getting into the workflow, here is the scope of the problem. The diagram below visualizes everything an offboarding workflow actually has to touch. Above the waterline is the SSO account. Almost everything else sits below it.

Illustration of an iceberg showing hidden offboarding risks beyond SSO deactivation, including shadow SaaS, OAuth apps, API tokens, AI agents, and file ownership.

The Six Surfaces a Proper Offboarding Touches

A workflow that revokes one surface and leaves five is not an offboarding workflow. It is an SSO deactivation wearing the name.

1. Shadow SaaS Signups

Most SaaS applications an employee uses were not provisioned through the IdP. Anything they signed up for with their corporate email but outside SSO sits outside the offboarding workflow by default. ChatGPT, Canva, Figma, Typeform, Loom, Calendly: the list is long, the catalog is rarely maintained, and individual subscriptions on the corporate card outlive the SSO deactivation. Reco's App Discovery surfaces these signups by correlating SSO logs, email metadata, and OAuth activity, catching the shadow tools that single-signal monitoring misses. 

2. OAuth Grants and Connected Apps

Every “Sign in with Google” or “Authorize Microsoft” creates a persistent grant. These grants live on the SaaS side, not the IdP side, which is why they survive SSO deactivation. A departed user's OAuth token can still be used by the third-party app that holds it. Reco's Connected AI Apps surface (and the SaaS-to-SaaS view for general OAuth) inventories these per user with grant timestamps and scope classification.

3. API Tokens and Service Accounts

Personal API tokens (GitHub PATs, Slack user tokens, AWS access keys, Salesforce session tokens) survive SSO deactivation entirely. So do service accounts that the user created and bound to their identity. These are often the last items in the offboarding workflow, if they appear at all, which means they linger for months. Reco surfaces tokens and service accounts via App Portfolio and the Identities → Accounts view.

4. AI Agents and Workflows

Agents built in Copilot Studio, n8n, Make, or LangChain continue running on the user's saved credentials and OAuth tokens. They are high-risk specifically because they operate without their owner present. Reco's AI Agents Inventory can be filtered by Owner to surface every agent attached to a departing user, with their connections, model, and authorization status visible.

5. File Ownership and Shared Resources

Files the user owns in Google Drive, Box, or SharePoint. Repositories they own in GitHub. Channels they admin in Slack. These are not deletion targets; they are ownership-transfer targets. If the workflow does not explicitly transfer ownership, these resources persist under an orphaned owner, and their access controls quietly weaken as the system loses the original owner's group memberships.

6. Audit Trail and Compliance Evidence

A timestamped record proving each revocation happened. Required for ISO/IEC 27001:2022 Annex A 5.18 (Access Rights), SOC 2 CC6.2 (User Access Termination), HIPAA, and GDPR Article 32. Most offboarding programs cannot produce this evidence package on demand, which becomes a finding in every annual audit cycle until it is addressed.

Configuring the Workflow

Three principles for a workflow that actually closes the loop: sequence the revocations, verify each step, and document continuously.

Trigger

The workflow fires from the HR system, not the IT ticket queue. Workday or BambooHR signals through SCIM into the IdP, the IdP signals into Reco, and Reco initiates the multi-surface sequence within minutes of the HR event. Waiting for an IT ticket to be assigned, picked up, and worked is where the first 24 hours of orphaned access typically live.

Sequence

  1. Pull the user's full SaaS footprint from Reco (Identities → Users → user detail). This is the source-of-truth checklist for everything that follows.
  2. Lock the SSO account. First step, not the last. Forces re-authentication on every SSO-dependent service that the later steps have not yet reached.
  3. Revoke OAuth grants. Connected AI Apps and SaaS-to-SaaS views, filtered to the departing user.
  4. Disable API tokens and service accounts. App Portfolio and Identities → Accounts.
  5. Reassign or disable AI agents. AI Agents Inventory filtered by Owner. Reassign business-critical agents to a successor; disable everything else.
  6. Transfer file ownership. High-value assets get reassigned to a successor or shared drive; everything else is archived.
  7. Tag the user as Former in Reco. This activates continuous monitoring for activity from the disabled identity.
  8. Generate the evidence package. Timestamped record of every revocation, exported as the audit working paper.

Verification

Reco distinguishes two separate states on the user inventory. Former means the employee has left. Former With Access means the employee has left and still has active accounts, OAuth grants, or agents attached. The first is HR data. The second is the offboarding failure metric, and it is the one the workflow exists to drive to zero.

The user inventory exposes both states directly. Navigate to Identities → Users to see the full population.

Dashboard showing employee accounts, access status, risk levels, connected apps, alerts, and last seen activity.
The user inventory. 268 users in this environment. The summary bar surfaces the breakdown that matters for offboarding accountability: 207 Current, 61 Former, and 9 Former With Access. The last number is the operational scoreboard.

To isolate the offboarding failure state, apply the Former With Access filter in the Employment Status panel.

Admin dashboard filtered to former employees, showing account risk analysis, connected apps, access counts, and activity data.
Apply the Former With Access filter. Of 61 former employees in this environment, 9 still have active access attached. That is the current offboarding failure rate: roughly 15 percent of departures in this environment have left something behind.

The filtered view is the workflow's accountability dashboard. Each row is an open offboarding ticket. The original process never closed.

User management dashboard highlighting former users with active access, risk labels, connected apps, account counts, alerts, and last seen activity.
Nine former employees are still active. Some departed seven hours ago; one has been gone for six months and still has several accounts attached. Departments span Research & Dev, R&D, GTM, and G&A, with FORMER ORG USER and FORMER WITH ACCESS labels on every row. Any post-revocation activity from these identities surfaces as a high-severity alert within 15 minutes, which is the catch for the OAuth grant nobody remembered to revoke, the service account never disabled, and the agent still running on cached credentials.

Documentation

The evidence package generated at step 8 contains: the surfaces touched, the timestamp for each revocation, before-and-after states for each surface, and the assigned successor for any transferred ownership. Stored as an immutable audit working paper. Referenced directly in the next compliance audit cycle.

Common Failure Modes

FAILURE MODE WHY IT HAPPENS HOW TO AVOID
Only deactivating SSO Treating offboarding as an IdP-only task Workflow explicitly covers all six surfaces
Missing OAuth grants OAuth lives on the SaaS side, not the IdP Inventory Connected AI Apps before revoking SSO, not after
Leaving AI agents running Agents are owned by users, not by IT Filter AI Agents by Owner; reassign or disable on offboard
Orphaned files Ownership transfer is rarely a default step Surface user-owned files via Identities -> Users -> detail
No verification Workflow assumes revocation completed Tag user as Former; alert on any Former With Access activity
No audit trail Documentation deferred to a later sprint Generate evidence package as the final workflow step

Time-to-Full-Offboard as a Metric

Most organizations measure SSO time-to-revoke and report it in minutes. Few measure full offboarding completion, which is typically weeks for the lingering surfaces, sometimes never. The gap between the two metrics is the operational definition of former-employee debt.

Reasonable targets for the full metric: 24 hours for high-privilege users (admins, finance, legal), 72 hours for standard users. Report monthly to the security committee. Use Reco's Former With Access view aging report to track the time between an identity being marked Former and the last attached surface being fully revoked. The goal is to keep the Former With Access count permanently in single digits, and ideally at zero for users departed over 30 days.

Note: For high-privilege users, consider a pre-offboarding step: thirty days before a known departure, have Reco generate an early footprint inventory so the actual offboarding day is a verification exercise, not a discovery exercise. Surprise departures are the exception, not the rule.

After the Workflow

Offboarding is a security control, not an HR task, and the IdP account was always its smallest piece. A properly configured workflow turns former-employee debt into something finite: measurable, documented, and closed on a deadline. It moves the question from "did we deactivate the account" to "did we revoke all six surfaces and verify each one." None of that works without a platform that maps every surface a user touches. But the map alone is just a dashboard. The workflow is what turns it into a control.

No items found.
EXPERIENCE RECO 1:1 - BOOK A DEMO

Discover How Reco Can Help You Protect Your AI Environment

“I’ve looked at other tools in this space and Reco is the best choice based on use cases I had and their dedication to success of our program. I always recommend Reco to my friends and associates, and would recommend it to anyone looking to get their arms around shadow IT and implement effective SaaS security.”
Mike D'Arezzo
Executive Director of Security
“We decided to invest in SaaS Security over other more traditional types of security because of the growth of SaaS that empowers our business to be able to operate the way that it does. It’s just something that can’t be ignored anymore or put off.”
Aaron Ansari
CISO
“With Reco, our posture score has gone from 55% to 67% in 30 days and more improvements to come in 7-10 days. We are having a separate internal session with our ServiceNow admin to address these posture checks.”
Jen Langford
Information Security & Compliance Analyst
“That's a huge differentiator compared to the rest of the players in the space. And because most of the time when you ask for integrations for a solution, they'll say we'll add it to our roadmap, maybe next year. Whereas Reco is very adaptable. They add new integrations quickly, including integrations we've requested.”
Kyle Kurdziolek
Head of Security

Explore More

Your agents are already running. Do you know what they're doing?

Request a demo