Post-Sale Management
Account Setup and Configuration: The Technical Foundation of Onboarding
A SaaS company tracked their customer issues for six months and found something revealing: 62% of support tickets in months 2-6 traced back to configuration decisions made during initial setup.
Wrong permissions structure meant constant access requests. Poor workflow configuration meant users creating workarounds. Missing integrations meant manual data entry that should have been automated. Inadequate data migration meant months of cleanup work.
Teams that rush through technical setup to "get customers using the product faster" end up with slower onboarding and lower adoption because they built on a broken foundation.
If you're building onboarding that leads to long-term success, you need to get the technical foundation right. Not perfect, but right. Configured in a way that supports the customer's actual use case and scales with their growth.
Why Technical Setup Matters More Than You Think
Most teams treat account setup as administrative busywork: provision accounts, flip some switches, hand off to training. That's a mistake.
Technical setup determines whether workflows match how the customer actually works (or force them to adapt to your product's assumptions). Whether integrations deliver data when and how it's needed (or create manual reconciliation work). Whether permissions support their organizational structure (or create security headaches and friction). Whether data migration brings clean, usable information (or garbage that undermines trust in the system).
Users blame "the product" for problems that are actually configuration issues. They don't say "we configured this wrong." They say "this product doesn't work for us" and churn.
The Cost of Poor Technical Setup
When you rush setup, the short-term costs pile up fast. Extended onboarding timelines stretching weeks or months as you rework configurations. Support ticket volumes spike. Training sessions don't match actual system state, so you're teaching people to use something that doesn't exist. Users get frustrated and resistant. Your CSMs spend all their time fixing issues instead of driving adoption.
The long-term costs are worse. Lower adoption because workflows don't match reality. Ongoing support burden from technical debt. Users create workarounds that bypass your product entirely. Expansion becomes difficult because the foundation is unstable. Churn goes up because value realization is slow.
The fix costs less than the problem. Spending an extra 5-10 days on thoughtful setup saves months of cleanup work and prevents adoption issues down the line.
Pre-Setup Preparation: The Discovery Phase
Before touching any configuration, you need to understand what you're building.
Technical Requirements Gathering
Start with infrastructure and environment questions. Does the customer have hosting requirements like cloud, on-premise, or specific region deployment? What network and firewall considerations exist? Do they need API access, and if so, from where? Most customers need separate development, staging, and production environments. What are their scalability and performance requirements?
Ask directly: "Are there network restrictions we need to account for?" Don't assume their firewall team will just open everything up. "Do you need separate environments for testing and production?" sounds basic, but plenty of customers haven't thought it through. "What are your uptime and performance requirements?" matters more for mission-critical systems. "Are there geographic data residency requirements?" comes up more often now with privacy regulations.
Security and Compliance Review
Security requirements need clarity upfront because they add weeks to timelines if they surface mid-project.
Single Sign-On and identity provider setup. Multi-factor authentication requirements. Password and access policies. IP whitelisting requirements. Data encryption standards. Audit logging requirements. These aren't nice-to-haves for many customers; they're blockers to go-live.
Compliance requirements matter just as much. Industry regulations like HIPAA, GDPR, SOC 2. Data privacy and retention policies. Security questionnaires or assessments that need completion. Vendor risk assessment processes. Compliance documentation needs.
The questions to ask: "What security and compliance standards must we meet?" gets the conversation started. "Do you require SSO? Which identity provider?" because there are dozens and setup varies. "What data privacy regulations apply?" because customers often have multiple overlapping requirements. "Do you need to review our security documentation?" lets you know if there's a formal review process. "Are there specific audit or logging requirements?" surfaces any special tracking needs.
Red flag: If security or compliance requirements emerge after setup starts, expect weeks of delay. Get this information upfront during sales or kickoff.
Integration Requirements
You need to know which systems need to integrate with your platform. CRM systems like Salesforce or HubSpot. Marketing automation platforms like Marketo or Pardot. Calendar and email through Google Workspace or Microsoft 365. Accounting and ERP systems. Data warehouses or analytics platforms. Custom internal systems via API.
For each integration, nail down specifics. What data needs to sync? Is it uni-directional or bi-directional? How frequently does sync need to happen (real-time, hourly, daily)? What triggers the sync (event-based or scheduled)? Who owns the integration on the customer side, meaning who can actually grant API access? Are there compliance concerns with data sharing between systems?
The practical questions: "Which systems need to integrate with our platform?" and follow up with "What data do you need flowing between systems?" because they won't always think through the details. "Who on your team manages each system and can grant access?" matters because you'll waste weeks waiting for the wrong person to coordinate. "Are there data governance policies we need to follow?" surfaces potential blockers early.
Data Migration Planning
Start with scope. What data is being migrated (contacts, accounts, transactions, historical data)? How much data are we talking about (record counts, file sizes)? From which sources (legacy system, spreadsheets, database export)? How clean is the data (duplicates, missing fields, formatting issues)? What's the migration timeline (big-bang cutover or phased approach)?
Run a data quality assessment early. Get a sample data extract to assess quality before promising anything. Identify duplicates, missing required fields, formatting inconsistencies. Determine cleanup effort required and who's responsible (customer vs vendor). Set realistic expectations for data quality post-migration.
Ask the right questions: "What data do you need in the new system to be productive?" separates must-haves from nice-to-haves. "Can you provide a sample data export so we can assess quality?" because you can't plan migration without seeing the actual data. "Who owns data cleanup on your side?" establishes accountability. "Is historical data critical, or can we start fresh for some records?" because sometimes it's better to start clean.
Don't promise to "migrate everything" without understanding volume and quality. Bad data takes exponentially longer than good data to migrate.
Account Provisioning and User Management
Account Creation and Structure
Set up the organizational hierarchy first. Company account setup. Business unit or team structure if they have multiple divisions. Location or office configuration if relevant to permissions or reporting. Any multi-tenant or white-label requirements that affect account architecture.
Configure basic account settings: company name, logo, branding. Primary language and locale. Time zone configuration that matches their headquarters or primary location. Date/time format preferences. Currency settings for financial data.
User Account Creation and Roles
You have three approaches to user provisioning, and the right choice depends on customer size and touch level.
High-touch enterprise approach: CSM creates all users. You import the user list provided by customer, pre-configure roles and permissions, send invitation emails. This works for enterprise customers, complex role structures, and high-touch service where you want complete control.
Mid-touch approach: CSM creates admin accounts only. Customer admins create their own team accounts. You provide guidance and templates. This works for mid-market customers with capable admins who can handle user management.
Low-touch or product-led growth approach: Users sign up themselves. Admin approves and assigns roles. Automated onboarding flows guide setup. This works for SMB customers, product-led growth motions, and simple products where self-service makes sense.
Role definition needs to match their organization. Admin role gets full system access, configuration, user management. Manager role gets team oversight, reporting, limited configuration. User role gets standard product access for daily work. Read-only role gets reporting and visibility without editing. Custom roles get tailored to customer's organizational structure when standard roles don't fit.
Start restrictive with permissions and expand as needed. It's easier than revoking permissions later. Align with customer's organizational structure, not your assumptions about how they should be organized. Document who has what access and why. Create role templates for common patterns. Review and audit permissions periodically.
SSO and Authentication Setup
SSO configuration follows a predictable process, but coordination matters more than technical steps.
Gather customer's identity provider details (Okta, Azure AD, Google, others). Exchange metadata: customer sends you their IdP metadata, you send them your SP metadata. Configure attribute mapping for email, name, role, and other profile fields. Test SSO with a test user before going live. Enable for production users once testing passes. Provide guidance on user provisioning, whether just-in-time or manual.
Common pitfalls to watch for: Customer IT teams often require security review that adds 2-3 weeks to timelines. Attribute mapping mismatches cause login failures that are painful to debug. Customers assume SSO is instant, but it requires coordination across teams. Users get locked out if SSO is misconfigured, and that's a terrible first impression.
MFA configuration is straightforward once you know requirements. Determine if MFA is required by customer policy or compliance. Configure MFA method (SMS, authenticator app, hardware token). Test the MFA flow. Document recovery process for MFA lockout because users will lose devices.
Core System Configuration
Workflow and Business Process Configuration
Map their current state before configuring anything. How does the customer do this process today? What steps, approvals, and notifications are required? Who is involved at each stage? What are the success criteria and exceptions?
Then design the future state. How will the process work in your product? What workflow steps, triggers, and automations? What customization or configuration is needed? What business rules need to be enforced?
Take invoice approval as an example. Their current state: Employee submits invoice via email. Manager receives email, reviews, replies with approval. Finance manually enters into accounting system. Finance processes payment.
Future state in your product: Employee submits invoice directly. Automated routing to manager based on rules like amount and department. Manager approves in product, email notification sent automatically. Automatic sync to accounting system via integration. Finance gets notified to process payment.
Configuration required: Workflow builder to handle Submission to Approval to Finance handoff. Approval rules that route by amount (over $5K to director, under $5K to manager). Notification templates for manager and finance. Integration to push approved invoices to QuickBooks.
Custom Fields and Objects
Create custom fields when the customer has data specific to their industry or business. When it's required for reporting or segmentation. When it's needed for integration mapping. When it's critical to workflow logic.
Best practices: Only create fields that will actually be used. Resist "just in case" fields that clutter the interface. Use consistent naming conventions. Define field types carefully (text, number, date, dropdown). Set required vs optional appropriately. Document the purpose and usage of each custom field.
Examples that make sense: Sales Opportunity gets "Partner Referral Source" as a dropdown. Support Ticket gets "Product Component" as a dropdown for engineering triage. Customer Account gets "Renewal Risk Reason" as a text field for CS team tracking.
Automation Rules and Triggers
Common automation patterns solve repetitive tasks. Auto-assignment: new record created, assign to owner based on rules. Notifications: status change, send email to stakeholders. Escalations: record in state for X days, escalate to manager. Data updates: Field A changes, update Field B automatically. Cross-object actions: record created in System A, create record in System B.
Start with highest-value automations that handle the most frequent or most painful manual tasks. Test thoroughly before enabling for all users. Document what each automation does and why. Provide a kill switch if automation causes issues. Monitor automation activity for unexpected behavior.
Notification Settings
Build a notification strategy with three tiers. Critical notifications are urgent, actionable, sent immediately (new assignment, escalation). Important updates are time-sensitive, sent in batches like daily digest. FYI notifications are low priority, users can opt in or out (activity feed).
Configure default notification settings for each role. Give users ability to customize because you can't force notifications they don't want. Offer channel selection (email, in-app, mobile push, Slack). Provide frequency control (immediate, hourly digest, daily digest).
Avoid notification fatigue by not notifying users of things they don't care about. Batch low-priority notifications. Give users control over what they receive. Test notification volume with real usage patterns before go-live.
Branding and Customization
Visual customization includes company logo and favicon. Brand colors and theme. Custom domain if your product supports it. Email template branding.
Customize for enterprise customers who care about brand consistency. White-label or reseller scenarios where your brand shouldn't appear. Customer-facing portals where branding matters for trust and adoption.
Don't customize when it delays go-live for non-critical branding tweaks. Don't customize if the customer doesn't actually care. Avoid complex custom work that breaks when you upgrade your product.
Integration Setup and Testing
API Connections and Authentication
Integration setup process: Identify integration type (pre-built connector vs custom API). Obtain API credentials from customer. Configure authentication (API key, OAuth, etc.). Set up connection in your platform. Test authentication and connection. Configure data mapping. Test data sync. Enable for production.
Authentication methods vary by security requirements. API Key is simple: customer provides key, you configure. OAuth is more secure: user authorizes app, token gets managed automatically. Basic Auth uses username/password, less secure, avoid if possible. Certificate-based is complex, typically an enterprise security requirement.
Data Mapping and Field Alignment
Mapping process: Identify source fields from customer's system. Map to destination fields in your system. Handle mismatches like field name differences and data type conversions. Define transformation rules for concatenation, formatting, default values. Map direction for one-way or bi-directional sync.
Example for CRM Contact Sync from Salesforce to your product:
FirstName maps directly to first_name. LastName maps directly to last_name. Email maps directly to email. AccountId requires lookup to Account table to get company_id. LeadStatus needs value mapping where "Open" becomes "Active" and "Closed" becomes "Inactive". Custom_Field__c maps directly to industry.
Handle conflicts by deciding: What happens if same record gets updated in both systems? Which system is "source of truth" for each field? How do you handle deletes (hard delete, soft delete, ignore)?
Integration Testing
Test scenarios cover the basics: Create new record in source system, verify creation in destination. Update record in source, verify update in destination. Delete record, verify handling per configuration. Bulk sync of multiple records. Error handling for invalid data, missing required field, API rate limits.
Validation criteria: Data appears correctly in destination system. Timestamps and audit fields populated. Related records linked properly. No data loss or corruption. Sync completes within acceptable timeframe.
Error Handling and Monitoring
Plan for error scenarios: API rate limits exceeded. Authentication token expiration. Invalid data that fails validation. Network connectivity issues. Source or destination system downtime.
Error handling strategy needs retry logic for transient failures. Error logging for troubleshooting. Notification for critical errors. Queue for failed records to retry later. Manual intervention process for unrecoverable errors.
Monitor with an integration health dashboard. Track sync success rate and failures. Alert on sync failures exceeding threshold. Run regular audits of synced data accuracy.
Data Migration Execution
Data Extraction and Cleaning
Extraction: Export data from legacy system. Validate export completeness. Store in secure location. Document export date and record counts.
Cleaning requirements: Remove duplicates. Standardize formats for phone numbers, addresses, dates. Fill required fields or flag for customer review. Remove test and junk data. Resolve data quality issues identified in discovery.
Cleaning responsibility splits between vendor and customer. Simple cleaning like formatting and obvious duplicates, vendor can handle. Business logic cleaning like deciding which duplicate is correct, customer must handle. Set clear expectations in kickoff about who does what.
Data Transformation and Mapping
Transformation types include field mapping from source field to destination field. Data type conversion like string to integer or date format changes. Value mapping like "Y" to "Yes" or status code to status name. Concatenation like first name plus last name to full name. Splitting like full address to address line 1, city, state, zip. Lookup and enrichment to add related record IDs or fill missing data.
Document all transformation logic. Get customer approval on business logic decisions. Keep audit trail of data changes. Provide customer with before/after sample for validation.
Migration Testing and Validation
Test migration process: Migrate small sample dataset of 100-500 records. Validate data accuracy and completeness. Get customer to review and approve. Fix any issues discovered. Re-test if significant changes made. Proceed to full migration when test successful.
Validation checks: Record counts match between source and destination. No data loss, all fields populated as expected. Related records linked correctly with parent-child relationships intact. Data formatting correct for dates, numbers, text. Special characters and encoding handled properly.
Customer validation requires you to provide access to test data. Give specific validation criteria. Get written approval before full migration. Don't proceed with unresolved issues.
Cut-Over Planning and Execution
Big-bang migration migrates all data at once. Legacy system gets turned off. All users switch to new system simultaneously. Use this for small datasets, clean data, short migration windows.
Phased migration migrates data in batches by date range, department, or record type. Legacy and new system run in parallel temporarily. User migration happens gradually. Use this for large datasets, complex migrations, risk mitigation.
Cut-over checklist: Freeze changes in legacy system or document sync strategy. Run full data migration. Validate migration success. Enable integrations. Activate user accounts. Communicate go-live to users. Monitor for issues first 24-48 hours.
Rollback plan answers critical questions: What if migration fails catastrophically? Can you reload data and try again? How do you revert to legacy system if needed? Don't go live without a rollback plan for critical systems.
Testing and Validation
Configuration Verification Checklist
Account and user setup: All users created with correct roles. SSO working if applicable. Permissions aligned with customer requirements. Test user logins successful.
Workflows and automation: Business processes configured correctly. Automation rules firing as expected. Notifications being sent appropriately. No unexpected behavior or errors.
Integrations: All integrations connected and authenticated. Data syncing bi-directionally as configured. No sync errors or failures. Data mapping correct and complete.
Data migration: All data migrated successfully. Record counts match source. Data quality meets expectations. Customer validated sample data.
Branding and customization: Logo and branding applied. Custom fields created and configured. Reports and dashboards set up.
User Acceptance Testing (UAT)
UAT validates that the configured system meets customer's requirements and works for their actual use cases.
UAT process: Create UAT test plan with customer input. Define test scenarios covering key workflows. Assign customer users to execute tests. Document results and issues. Fix critical issues before go-live. Get customer sign-off on UAT completion.
Example UAT scenarios: User logs in via SSO successfully. User submits invoice, manager receives notification and approves. Approved invoice syncs to accounting system. Admin creates new user and assigns permissions. Manager runs report showing team's invoice status.
UAT issue management prioritizes fixes. Critical issues mean system doesn't work, blocks go-live, must fix. High issues mean major problem but workaround exists, fix before go-live or shortly after. Medium issues are annoyances without blocking, fix in phase 2. Low issues are nice-to-have or cosmetic, goes in backlog.
Performance and Load Testing
Performance testing matters when you have large user base with hundreds or thousands of concurrent users. High-volume data processing. Real-time or time-sensitive workflows. Customer has specific performance SLAs.
Performance test scenarios: Concurrent user load like 500 users logged in simultaneously. Bulk data operations like importing 100K records. Report generation with large datasets. API throughput for integrations.
Acceptance criteria: Page load times under X seconds. Report generation completes within X minutes. API response times meet SLA. System remains stable under expected load.
Security Validation
Security checklist: SSO configured correctly, tested with real users. MFA enabled if required. Permissions enforce least-privilege access. Sensitive data encrypted in transit and at rest. Audit logging enabled for security-relevant actions. API access locked down to authorized IPs if required. Data retention policies configured per compliance requirements.
Security review may include customer security team validation. Penetration testing for high-security environments. Compliance certification review. Document security controls implemented.
Configuration Documentation
As-Built Documentation
Document account structure and organization. User roles and permission model. Workflow configurations and business rules. Custom fields and their purpose. Automation rules and triggers. Integration mappings and sync rules. Data migration decisions and transformations. Branding and customization applied.
This matters for knowledge transfer to customer admin team. Reference for future configuration changes. Troubleshooting when issues arise. Audit trail for compliance. Training material for new admins.
Configuration Decisions Log
Document why configuration decisions were made, not just what was configured.
Example: Decision to set invoice approval threshold at $5,000. Rationale: Finance team requested to balance control with efficiency. Date: 2025-02-15. Approved by: CFO.
Another example: Decision for bi-directional sync for contacts, one-way for accounts. Rationale: Salesforce is system of record for accounts, but contacts can originate in either system. Date: 2025-02-18. Approved by: IT Director.
When someone asks "Why did we configure it this way?" six months later, you have the answer.
Admin Guide Creation
Admin guide contents: How to add/remove users and assign roles. How to modify workflows and business rules. How to create custom fields or objects. How to troubleshoot common issues. How to access and interpret reports. Who to contact for vendor support. Best practices for ongoing administration.
Format options include written documentation in Google Docs, Confluence, or help center. Video walkthroughs using Loom or screen recording. Live training session with recording. Combination of documentation plus video.
Change Management Process
Post-go-live changes need process. Who can request configuration changes? What's the approval process? How are changes tested before deployment? How are users notified of changes? How is configuration documentation updated?
Establish process upfront so changes don't become chaotic free-for-all.
The Bottom Line
Account setup and configuration isn't administrative overhead. It's the technical foundation that determines whether your customer will achieve value quickly and scale successfully, or struggle with friction, workarounds, and eventual churn.
Teams that rush through setup to "get users in the product faster" create problems that take months to fix and undermine adoption permanently.
Teams that invest in thoughtful, thorough setup create a stable foundation that supports fast adoption, smooth expansion, and long-term success.
The work is detailed and methodical. The payoff is massive: customers who achieve value faster, adopt more deeply, expand earlier, and stay longer.
Get the foundation right, and everything else gets easier.
Ready to build your technical setup process? Explore implementation planning, customer training programs, and onboarding completion criteria.
Learn more:

Tara Minh
Operation Enthusiast
On this page
- Why Technical Setup Matters More Than You Think
- The Cost of Poor Technical Setup
- Pre-Setup Preparation: The Discovery Phase
- Technical Requirements Gathering
- Security and Compliance Review
- Integration Requirements
- Data Migration Planning
- Account Provisioning and User Management
- Account Creation and Structure
- User Account Creation and Roles
- SSO and Authentication Setup
- Core System Configuration
- Workflow and Business Process Configuration
- Custom Fields and Objects
- Automation Rules and Triggers
- Notification Settings
- Branding and Customization
- Integration Setup and Testing
- API Connections and Authentication
- Data Mapping and Field Alignment
- Integration Testing
- Error Handling and Monitoring
- Data Migration Execution
- Data Extraction and Cleaning
- Data Transformation and Mapping
- Migration Testing and Validation
- Cut-Over Planning and Execution
- Testing and Validation
- Configuration Verification Checklist
- User Acceptance Testing (UAT)
- Performance and Load Testing
- Security Validation
- Configuration Documentation
- As-Built Documentation
- Configuration Decisions Log
- Admin Guide Creation
- Change Management Process
- The Bottom Line