Use Cases
- Employee Offboarding: Remove access when team members leave the organization
- Access Revocation: Immediately remove unauthorized or compromised accounts
- Project Completion: Remove temporary members after project-specific work concludes
- Security Incidents: Quickly revoke access during security investigations
- Team Restructuring: Remove members during organizational changes
What Happens When You Delete a Member
Immediate Effects:- ✅ Member loses all access to team workspace
- ✅ Cannot view scans, assets, or vulnerabilities
- ✅ Cannot create or modify team resources
- ✅ Removed from team member list
- ✅ Cannot access team API keys or integrations
- 📝 Audit logs showing member’s historical actions
- 📝 Scans and assets they created remain in the team
- 📝 Their user account (outside the team) remains active
The member’s email must be provided to identify who should be removed. You cannot remove the team owner through this endpoint.
Important Considerations
Best Practices
- Timely Removal: Remove access promptly when no longer needed
- Documentation: Maintain records of who was removed and why
- Transfer First: Ensure critical work is transferred before removal
- Audit Trail: Review member’s activity before removal for compliance
- Communication: When appropriate, inform the member of pending removal
- Verify: Confirm removal was successful and access is revoked
Re-Adding Members
If you need to re-add a member after removal:- They must be invited again using the “Add Team Member” endpoint
- They will need to accept a new invitation
- Their previous role and permissions are not automatically restored
- Consider their historical context when assigning new role
Authorizations
Headers
Retrieve the Team ID from: https://cloud.projectdiscovery.io/settings/team
Body
application/json
Response
Example response