The Offboarding Gap: Why HR Software Won't Revoke Access (and IT Tools Won't Talk to HR)
HR software sends checklists. IT tools need a dedicated IT team. Startups fall in the gap — and former employees keep their access. Here's what's actually happening.
The Offboarding Gap: Why HR Software Won't Revoke Access (and IT Tools Won't Talk to HR)
When an employee leaves your startup, two categories of software claim to handle offboarding: HR platforms (BambooHR, Gusto, Rippling's HR side) and IT access tools (Okta, BetterCloud, Stitchflow). Neither actually solves the problem for a 10–50 person company. HR tools send a notification asking someone to revoke access manually. IT tools automate it beautifully — but require a dedicated IT team and months of enterprise setup. Most startups have neither. This is the offboarding gap, and it's why former employees routinely keep access to Slack, Figma, GitHub, and Notion long after their last day.
Why This Matters for Your Startup
If you're running a 10–50 person company, you probably don't have a dedicated IT person. You have a founder, maybe an ops lead, and a growing stack of SaaS tools that each have their own admin panel, seat count, and permission system. When someone leaves — an engineer, a designer, a contract PM — the question isn't whether their accounts need to be closed. You know they do. The question is: who's actually doing it, and across how many tabs?
The average startup with 20 people uses 25–40 SaaS tools. Most founders or ops leads spend 2–4 hours on manual offboarding per departure. That's before accounting for the tools they forgot — the ones that stay active for weeks or months. The risk isn't hypothetical: a former designer with live Figma access can still read client work; a former developer with a live GitHub seat can still push to forks; a former ops hire with Notion access can still read your entire internal wiki.
What HR Software Actually Does for Offboarding
Let's be precise about what the major HR platforms do — and don't — do when you terminate an employee.
BambooHR has an offboarding workflow feature. When you mark an employee as terminated, BambooHR sends automated notifications to relevant team members (their manager, IT contact, whoever you've configured) reminding them to revoke system access. It also terminates the employee's access to BambooHR itself. That's the complete list. BambooHR does not reach into Slack and deactivate the account. It does not remove the user from your GitHub org. It does not revoke Figma seats, Notion memberships, Vercel team access, or 1Password vaults. It sends an email to a human asking them to do those things.
Gusto follows the same pattern. Strong on payroll finalization, tax forms, and final paychecks. It will terminate the employee's direct deposit and benefits enrollment. Access revocation for third-party tools? An email notification, at best — if you've wired that up manually.
Rippling is the closest HR tool to bridging the gap. Rippling has an IT module that can deprovision SaaS accounts via SCIM and native integrations. But the IT automation features are a separate product tier — you're paying for HR + IT as a bundle, pricing that reflects enterprise scale, and the setup still requires someone who understands identity provisioning. Rippling's sweet spot is 50–500 employees with a dedicated IT function or a technical ops person. For a 12-person seed-stage startup, it's overbuilt.
The pattern is consistent: HR tools know about the employee. They don't know about the tools the employee was using. They were designed to manage the HR record, not the access footprint. That's a deliberate boundary — and it creates the gap.
If you want to understand offboarding from a pure HR process perspective, what is employee offboarding covers the lifecycle basics.
What IT Access Tools Do (and What They Require)
On the IT side, tools like Okta, BetterCloud, Stitchflow, and AccessOwl are genuinely good at the access revocation problem. They can watch your HRIS for a termination event and, when it fires, automatically disable accounts across your app stack — Google Workspace, Slack, GitHub, Salesforce, Figma, and dozens of others. BetterCloud claims to reduce deprovisioning time from an average of 9 hours to under 30 minutes. That's real.
The catch is the setup and operational requirement. These tools are built for companies that have an IT function — a person (or team) who manages identity infrastructure, sets up SCIM connectors, maps workflows, and maintains the integrations as your SaaS stack evolves. The configuration process for Okta + BetterCloud for a mid-sized company is measured in weeks, not hours. There's usually a professional services engagement. The pricing reflects enterprise procurement cycles.
For a 15-person startup, these tools are the wrong abstraction. You don't have an IT admin. You don't have a SCIM strategy. You have a Notion workspace, a Slack workspace, a Figma org, a GitHub org, and a growing pile of monthly subscription line items. The IT tools assume you've already solved the identity layer. Most early-stage startups haven't, and shouldn't have to.
There's also a deeper technical problem even the best IT tools often miss: OAuth token ghost access. When you suspend someone's identity provider account (Okta, Google Workspace SSO), their primary login is blocked. But third-party app permissions — OAuth grants the employee authorized when they connected a tool to their Google or GitHub account — often remain active. A former employee's Zapier automations can still run. Their connected Figma third-party integrations can still pull data. Disabling the IdP account is the first domino, but it's not the last.
Stitchflow and AccessOwl have started addressing this, but the OAuth token revocation layer is still underbuilt across the category — even at the enterprise end of the market.
Here's a sharper breakdown of the IT tool landscape:
- Okta Lifecycle Management: The gold standard for enterprise IdP + SaaS provisioning. Syncs with an HRIS via SCIM or a workflow connector (like Workato). Requires dedicated Okta admin. Starting at ~$6/user/month just for the IdP — before add-ons. Implementation typically takes 2–6 weeks minimum for a clean setup.
- BetterCloud: Sits above the IdP layer to automate the SaaS operations layer. Handles file transfers, account offboarding, alert workflows. Genuinely powerful, but built for IT-led organizations. Pricing is enterprise ($15–25+/user/month) and requires a BetterCloud admin to maintain workflows as the app stack changes.
- Stitchflow: A newer entrant targeting IT teams at mid-market companies (~50–500 employees). App-access discovery plus automated deprovisioning. Better at OAuth token audit than BetterCloud. Still requires an IT or SecOps owner.
- AccessOwl: SaaS access management focused on visibility + automated offboarding. The lightest-weight option in the enterprise IT category. Closer to startup-viable but still assumes someone owns SaaS governance.
The pattern: even the most startup-friendly IT tools assume you have a person who owns identity and access management. For companies under 30 people with no IT function, that's a role that doesn't exist yet.
See tools to automatically revoke employee access for a full breakdown of what's on the market today.
What a Complete Offboarding Access Revocation Looks Like
Before diagnosing what breaks, let's define what "working" looks like. A complete access revocation at offboarding means:
- Trigger from HR record: The termination event in your HRIS fires automatically — no separate manual trigger in an IT tool.
- Identity provider disabled: Google Workspace, Microsoft 365, or your primary SSO account is deactivated, blocking all SSO-dependent logins.
- SaaS apps deprovisioned directly: Tools that don't use SSO (or have their own seat management) are deprovisioned via their own APIs — Figma, Notion, GitHub, 1Password, Linear, Vercel, Slack (for workspaces not on SSO), etc.
- OAuth tokens revoked: Active third-party OAuth grants are invalidated to prevent ghost access via connected apps and automations.
- Shared credentials rotated: Passwords in shared vaults (1Password, Bitwarden) that the employee had access to are flagged for rotation.
- Audit log generated: A timestamped record of every access point closed, for security review or compliance.
Most HR tools handle exactly one of these (triggering the HR record). Most IT tools handle 2–4. The full six-step close is what we mean when we say "access lifecycle" rather than "offboarding checklist."
The Gap in Practice: Three Scenarios That Break in Silence
These aren't hypotheticals. They're the patterns that repeat across startups when the HR/IT gap isn't closed.
Scenario 1: The designer who left with client work intact. A 20-person agency offboards a senior designer. HR is handled — final paycheck processed, benefits terminated. Nobody touches the Figma org. Six weeks later, a client calls asking why a portfolio they found online includes work from their unreleased campaign. The designer's Figma account was still active. They'd downloaded the files on their last day.
Scenario 2: The developer who kept paying for nothing. A startup terminates a contractor. The contractor's personal GitHub account was added to the org during onboarding — the path of least resistance at the time. Eighteen months later, someone notices a $20/month charge on the company card attached to a bot user the contractor had set up. The contractor had left a year before; the bot user was still active, still running.
Scenario 3: The ops hire who could still read everything. A 15-person company lets a junior ops hire go after 3 months. Notion was their main tool — employee directory, financial models, client contracts, hiring pipeline, all in one workspace. Nobody deprovisioned the Notion account. The former employee had guest-level access for months before someone noticed during an audit.
None of these required a sophisticated attack. No phishing, no credential theft. Just the gap — tools that weren't closed because no system owned the closing.
The Evaluation Rubric: Four Questions That Matter
When evaluating any tool that claims to solve offboarding access revocation, ask four questions:
1. Is it HR-aware? Does the tool connect to your HR record — employment status, department, role, manager — not just an identity provider? If a tool only watches the IdP and not the HRIS, it will miss contractors, temporary employees on fixed-date contracts, and role changes that should trigger partial access changes.
2. Is it IT-aware? Does it actually reach into the SaaS apps — Slack, Figma, GitHub, Notion, 1Password, Vercel — and revoke access, or does it send a notification to a human to do it manually?
3. Does it auto-trigger on termination? Not "can a human trigger it from the tool" — but does it fire automatically when the employment status changes, with no manual kick-off required?
4. Does it require a dedicated IT team to set up and maintain? This is the gate most startups can't clear with enterprise IT tools. If the answer is yes, the tool isn't built for your stage.
Comparison: HR Software vs. IT Tools vs. the Gap Category
| Criteria | HR Software (BambooHR, Gusto) | IT Tools (Okta, BetterCloud) | Rippling (HR+IT bundle) | Optserv |
|---|---|---|---|---|
| HR-aware (employee lifecycle) | ✅ Yes | ❌ IdP-only | ✅ Yes | ✅ Yes |
| IT-aware (SaaS revocation) | ❌ Notification only | ✅ Yes | ✅ Yes (IT tier) | ✅ Yes |
| Auto-triggers on termination | ⚠️ Notification triggers | ✅ Yes (HRIS-wired) | ✅ Yes | ✅ Yes |
| No dedicated IT team required | ✅ Yes | ❌ Requires IT | ⚠️ Needs technical ops | ✅ Yes |
| Founder/ops-friendly setup | ✅ Yes | ❌ Enterprise setup | ⚠️ Moderate | ✅ Yes |
| Pricing for 10–50 ppl | $6–12/employee | $15–25/employee+ | $8–35/employee (bundled) | $10–25/employee |
| Built for startup scale | ✅ | ❌ | ⚠️ (over-built at seed) | ✅ |
Reading the table: HR tools score well on HR-awareness and ease of use but don't touch SaaS revocation. IT tools score well on automation but require IT infrastructure. Rippling bridges the gap but is priced and scoped for companies past the gap's worst years (seed/early Series A). Optserv is purpose-built for the gap: HR-aware termination that automatically revokes SaaS access, no IT team required.
This Is the Category We Built Optserv For
The offboarding gap isn't a bug in any specific product. BambooHR is genuinely good at what it was designed to do. Okta is genuinely good at what it was designed to do. The gap exists because the market segmented HR and IT into separate categories, and nobody built the connector for companies that don't have both functions staffed.
Optserv is built on a single premise: the HR record should be the source of truth for access. When employment status changes — new hire, role change, termination — the access footprint should change with it automatically, without a human running through a checklist in 12 different tabs.
The core flow: you mark an employee as offboarded in Optserv. Optserv knows which tools they were connected to — because onboarding wired those connections when they joined. The same event that closes the HR record fires access revocation across every tool in the stack: Slack deactivated, Figma seat removed, GitHub org membership revoked, Notion access removed, 1Password vault offboarded. One action, one flow, no IT team.
This is also why Optserv covers the full lifecycle — not just offboarding. The how to revoke employee access automatically guide covers the technical mechanics in more detail.
Decision Framework: Which Approach Fits Your Stage?
Not every company is in the same situation. Here's an honest map:
Use HR software (BambooHR, Gusto) alone if:
- You're under 10 people, moving slowly, and you have a single technical person who can run through an offboarding checklist manually.
- Your SaaS stack is small (under 8 tools).
- You're hiring and firing rarely (under 5 departures per year).
- You can accept the manual risk in exchange for the simplicity.
Use IT tools (Okta, BetterCloud) if:
- You're 100+ people.
- You have a dedicated IT admin or IT team.
- You're in an industry with compliance requirements (SOC 2, HIPAA, ISO 27001) that mandate auditable access records.
- You've already invested in an identity infrastructure layer (SAML SSO, SCIM provisioning).
Use Rippling if:
- You're 50–500 people and need HR + IT as a unified purchase.
- You have someone technical enough to configure the IT automation workflows.
- You're OK with the pricing that reflects that bundle.
Use Optserv if:
- You're 5–100 people with no dedicated IT team.
- You use the modern startup SaaS stack (Slack, Notion, Figma, GitHub, 1Password, Linear, Vercel) and want access revocation wired into your HR record.
- You hire contractors, freelancers, and part-time employees alongside full-time staff — and want all of them handled in the same offboarding flow.
- You want Notion-style simplicity without enterprise-level configuration overhead.
What's Coming: The Access Problem Gets Harder Before It Gets Easier
The offboarding gap is about to compound. Two trends are making it worse in 2026 and beyond.
AI agent accounts. Teams are now spinning up AI agents — Claude, Cursor, Copilot Workspace, Devin — with their own API keys and OAuth grants. When an employee leaves, their personal AI agent setup often includes organization-level access: repos, design files, documents. These accounts don't live in your IdP. They live in the AI tool's own access model. Revoking the human's access doesn't necessarily revoke the agent's access. This is a new category of ghost access that no existing HR tool or IT tool has a complete answer to yet.
OAuth token sprawl. As employees connect more tools to each other (Zapier automations, Figma-to-Jira integrations, Slack-to-Notion bots), the OAuth token graph grows. Disabling the primary identity account stops new auth but doesn't terminate active tokens that were issued before the account was suspended. For a company with 20 employees and 3 years of tool connections, the graph is genuinely hard to audit manually.
The category we're building toward is access lifecycle management that starts at hire and is continuously reconciled — not just a point-in-time check at offboarding. For a deeper look at managing distributed tool access across remote teams, see remote team tool access management.
Frequently Asked Questions
Does BambooHR automatically revoke access to third-party tools when I terminate an employee?
No. BambooHR terminates the employee's access to BambooHR itself and sends configurable notifications to your team reminding them to revoke access elsewhere. The actual access revocation in tools like Slack, Figma, GitHub, or Notion must be done manually by an admin in each tool — or via a separate integration layer (like Optserv or an IT provisioning tool).
What's the difference between deprovisioning and offboarding?
Offboarding is the full HR process: final pay, equipment return, exit interview, benefits termination, documentation. Deprovisioning is specifically the IT action of removing a person's access to systems and data. Most HR tools handle offboarding. Most IT tools handle deprovisioning. The offboarding gap is the space between them — companies that complete the HR offboarding but miss the deprovisioning step.
Do I need Okta to automate access revocation?
Not necessarily. Okta (and similar IdPs like Azure AD / Entra) is one approach — it centralizes identity and can sync with SCIM-compatible apps. But Okta requires setup by someone who understands identity infrastructure, and not all your SaaS tools support SCIM. Founder-friendly alternatives like Optserv wire access revocation directly from your HR record without requiring an identity provider layer.
What is a "ghost access" problem?
Ghost access refers to former employees (or their OAuth-connected automations and AI agents) retaining some form of data or system access after their employment ends, even when their primary account appears deactivated. It's most common with: OAuth tokens granted before account suspension, shared credential vaults not updated, GitHub bot/org accounts not removed, and AI agent API keys not revoked.
How long does manual offboarding take vs. automated?
Studies consistently put manual deprovisioning at 4–9 hours per offboarding, spread across multiple admins across multiple tools. Automated offboarding with a purpose-built tool (not just an HR notification) runs in minutes. More importantly, automated offboarding has a completion rate close to 100% — manual offboarding reliably misses 2–5 tools per departure.
Close the Gap
Optserv is the lifecycle + access layer for startups that don't have a dedicated IT team. When you mark someone as offboarded, every tool they touched — Slack, Figma, GitHub, Notion, 1Password, and more — loses their access in the same flow. No checklist, no 12 admin tabs, no ghost access two months later. Start for free at app.optserv.ai — setup takes under 30 minutes.
Optserv Team
Sources
- BambooHR offboarding workflow documentation and feature overview
- BetterCloud: "How to build the perfect offboarding workflow" (bettercloud.com)
- SecureEnds: "Automated Deprovisioning: A Complete Guide to Securing User Offboarding" (securends.com)
- AccessOwl Blog: "Best tools for automating offboarding access revocation" (accessowl.com)
- Stitchflow: "Top employee offboarding software for IT teams 2026" (stitchflow.com)
- Scalekit: "When an employee leaves, who revokes their AI agent's access?" (scalekit.com)
- US Chamber of Commerce / CO-: "5 tips for secure offboarding: revoking access for departing employees"
Run your entire team from one place.
Optserv handles hiring, onboarding, access management, and offboarding — built for startups that want to operate like grown-ups without the enterprise overhead.
Try Optserv free