What does Google say about SEO? /
Quick SEO Quiz

Test your SEO knowledge in 3 questions

Less than 30 seconds. Find out how much you really know about Google search.

🕒 ~30s 🎯 3 questions 📚 SEO Google

Official statement

To remove delegated access in the Search Console, check if the user is verified by a token on your site. If they are verified through a delegation method, you can revoke that access directly in the Search Console.
29:05
🎥 Source video

Extracted from a Google Search Central video

⏱ 1h00 💬 EN 📅 17/03/2020 ✂ 10 statements
Watch on YouTube (29:05) →
Other statements from this video 9
  1. 4:50 Pourquoi votre contenu disparaît-il des résultats de recherche malgré une technique irréprochable ?
  2. 10:32 Pourquoi Google ne fournit-il aucune donnée Discover dans Analytics ?
  3. 17:28 Faut-il encore optimiser vos pages AMP avec le mobile-first indexing ?
  4. 25:53 Peut-on migrer un site multilingue sans implémenter hreflang immédiatement ?
  5. 35:15 Faut-il vraiment multiplier ou réduire vos pages produits pour le SEO ?
  6. 35:20 Faut-il vraiment créer une page par variante produit ou miser sur des pages consolidées ?
  7. 39:06 Faut-il vraiment passer toutes les pages de catégories en noindex sauf une ?
  8. 44:07 La vitesse de chargement est-elle vraiment un facteur de classement déterminant ?
  9. 47:08 Googlebot conserve-t-il vraiment les cookies entre les sessions de crawl ?
📅
Official statement from (6 years ago)
TL;DR

Google specifies that revoking delegated access in the Search Console depends on the type of verification used. If the former provider has placed a verification token on your site, simply removing their access in the interface is not enough — they technically retain the ability to re-verify. For a complete revocation, you must first physically remove the token from the site and then revoke access in the console. Without this step, you remain vulnerable.

What you need to understand

What is the difference between token verification and delegated access?

The Search Console offers two distinct mechanisms for managing access. The first level is property verification: you prove to Google that you control the site via an HTML tag, a file, a DNS record, or even Google Analytics. The second level is delegated access: a verified owner can invite other users without them needing to verify the site themselves.

The problem arises when your former provider was verified by their method — typically a HTML token or a file placed on your server. In this case, they are not just a guest: they are a verified owner just like you. Removing their account from the user list in the interface does not change the fact that they can reconnect at any time as long as their token remains in place.

Why does Google make this technical distinction?

It is a matter of hierarchy of permissions. A directly verified user holds a higher status than a delegated user. Google considers that if someone has technical access to your source code or your DNS configuration, they have proven a level of control over the site that justifies permanent access — until you physically remove the verification method.

This logic often conflicts with the reality of client-agency relationships. Many owners believe they have regained control by removing the agency from the user list, while in reality, the agency retains the technical access key. This presents a potential security flaw that few SEOs adequately anticipate during the handover.

How can you identify the type of verification used by a former provider?

In the Search Console, go to Settings > Users and Permissions > Manage Property Owners. You will see each verified user with the method used: HTML tag, HTML file, Google Analytics, Google Tag Manager, DNS, or other. If multiple methods are listed for the same user, it means they have verified the site through multiple channels — multiplying the access points that need to be cleaned up.

Some clever providers combine multiple verification methods to safeguard against accidental revocation. This is technically legitimate during collaboration, but it complicates the breakup significantly if things go south. Let's be honest: in 80% of cases, the client doesn't even know what method was used initially.

  • A delegated access can be revoked instantly from the Search Console interface without touching the site's code.
  • A token-verified owner retains the ability to reconnect as long as the token (HTML tag, file, DNS) remains in place.
  • Regularly checking the list of active verification methods is a good security practice, especially after a provider change.
  • The Search Console does not automatically notify when a former owner reconnects via a verification method that remains in place.
  • Physically removing all obsolete tokens should be part of the handover protocol between agencies.

SEO Expert opinion

Does this statement truly cover all scenarios?

No, and that's where it gets tricky. Google is deliberately simplifying a topic that can become quite technical very quickly. For example, the statement does not mention the case where a provider was verified via Google Tag Manager: removing their access to the Search Console does not necessarily remove their access to the GTM container, which itself may contain tokens or Analytics configurations used for other verifications. The cascading dependencies are not addressed.

Another point: what happens if the former provider configured a DNS record that you cannot easily modify because you do not have access to your registrar? Or if the verification tag is embedded in a WordPress theme of which you have lost the sources? Google tells you to "remove the token," but in practice, some clients lack the skills or access to do so. [To be verified]: Google does not specify if there is an automatic expiration deadline for tokens or if they remain valid indefinitely.

What real risks do you face if you do not clean up properly?

The main risk is persistent access to data. Your former provider can continue to view your performance, queries, backlinks, crawl errors — in short, all your SEO intelligence. If the breakup did not go well, this data could be used to advise a direct competitor. This is not paranoia: it happens.

More insidiously: a malicious provider could technically submit a disavow of links, request a massive re-crawl of unnecessary pages to saturate your crawl budget, or even modify certain geographic or international targeting parameters if permissions allow. I've never seen this documented publicly, but technically, nothing prevents it as long as they remain a verified owner. And if the Google Analytics account is linked, they can also retrieve business insights that far exceed SEO.

Security alert: If you have parted ways with an SEO agency under tense circumstances, do not just remove the access in the interface. Audit ALL active verification methods, physically clean the tokens on your site, check the linked Analytics/GTM accesses, and change the passwords for your Google accounts if the agency had access. It's thankless work, but it's the only way to be sure.

Could Google improve this revocation process?

Clearly, yes. Other platforms (Facebook Business Manager, for example) have a system of hierarchical revocation: when you remove a partner, all associated accesses are automatically revoked, even those obtained through technical methods. Google could implement an option "revoke all accesses from this user, including direct verifications" with a clear warning.

The fact that this is not already in place suggests that Google views technical verification as an equal property right rather than a mere access convenience. This is philosophically defensible — if someone controls your DNS or your server, they indeed have a level of site control that justifies privileged status. But it creates shaky situations in client-provider relationships where the "legal owner" of the site does not necessarily have total technical control in the tool.

Practical impact and recommendations

What practical steps should you take when changing your SEO provider?

First step: establish a handover protocol even before breaking off. Ask your current provider to list all the verification methods they have implemented, all third-party accesses (Analytics, GTM, Data Studio, etc.), and all the tools connected to the Search Console (like Ahrefs, SEMrush, or other crawlers). This transparency should be part of the departure contract, but it rarely is.

Next, create your own independent property verification before removing the agency. Preferably use a DNS method if you have access to your registrar — it’s the most challenging to lose accidentally. Once your verification is active, you can begin cleaning up the accesses of your former provider without risking being locked out yourself.

How can you identify and remove all obsolete verification tokens?

Inspect the source code of your homepage (and possibly key templates) to find the meta tags name="google-site-verification". There may be several — keep only the one(s) you control. Check also the root of your site for HTML verification files (they look like googleXXXXXXX.html). Remove those you do not recognize.

On the DNS side, log into your registrar and look for TXT records related to the Search Console. They usually contain "google-site-verification=" followed by a hash. If you are unsure whether a record is still used by you, create a new one before deleting the old — the Search Console accepts multiple simultaneous verifications. Finally, check your Analytics and Tag Manager properties: some may serve as indirect verification methods.

What critical mistakes should you absolutely avoid?

A classic mistake: removing ALL verification tokens at once, including yours, and ending up locked out. The Search Console does not allow you to revoke the last verified owner, but if you delete the physical tokens without having created a new verification first, you lose access. And re-verifying it can take time if you need to go through support or if you have DNS issues.

Another trap: forgetting the domain properties that cover all subdomains and protocols. If your former provider has access to a domain property, they see EVERYTHING — www, mobile, all subdomains. Check both types of properties (URL prefix and domain) and clean up both. And do not overlook old archived properties: they may still contain sensitive data and active accesses.

  • List all active verification methods in Settings > Users and Permissions.
  • Create your own DNS verification or HTML tag before removing the provider's.
  • Inspect the source code and the root of the site to identify all physical tokens.
  • Check the Google Analytics, Tag Manager, and other related Google services accessed.
  • Revoke delegated accesses in the interface AFTER deleting the physical tokens.
  • Document all changes in a handover file for future reference.

Revoking access to the Search Console is not just a matter of clicks in an interface — it is a complete technical audit of your verification methods and dependencies. Many sites end up with phantom tokens accumulated over several years, creating invisible security breaches. If you do not have the internal skills to properly audit your accesses, or if you inherit a site with opaque history, enlisting a specialized SEO agency can save you unpleasant surprises. An external perspective often identifies forgotten access points that you would never have spotted on your own and secures the handover methodically.

❓ Frequently Asked Questions

Puis-je retirer l'accès d'un ancien prestataire sans toucher au code du site ?
Uniquement s'il a été ajouté via délégation d'accès. S'il est vérifié par une balise HTML, un fichier ou un enregistrement DNS, retirer son compte de l'interface ne suffit pas — il peut se reconnecter tant que le token reste en place.
Comment savoir si mon ancien prestataire a placé un token de vérification ?
Rendez-vous dans Paramètres > Utilisateurs et autorisations > Gérer les propriétaires de la propriété. La méthode de vérification est indiquée pour chaque utilisateur vérifié. Si vous voyez "Balise HTML", "Fichier HTML" ou "Enregistrement DNS", un token physique existe quelque part.
Que se passe-t-il si je supprime mon propre token par erreur ?
Vous perdez l'accès à la Search Console pour cette propriété. Vous devrez créer une nouvelle vérification, ce qui peut prendre quelques heures ou jours selon la méthode choisie et les délais de propagation DNS. Créez toujours une seconde vérification avant de supprimer la première.
Un ancien prestataire peut-il réellement nuire à mon SEO s'il garde l'accès ?
Techniquement oui, bien que ce soit rare. Il peut soumettre un désaveu de liens, modifier des paramètres de ciblage géographique, ou consulter vos données stratégiques. Le risque principal reste la fuite d'informations vers des concurrents.
Google Analytics peut-il servir de méthode de vérification pour la Search Console ?
Oui, si le compte Analytics est configuré comme méthode de vérification. Retirer l'accès Search Console ne suffit donc pas — il faut aussi vérifier et nettoyer les accès Analytics liés, sinon l'ancien prestataire peut se re-vérifier via ce canal.
🏷 Related Topics
Search Console

🎥 From the same video 9

Other SEO insights extracted from this same Google Search Central video · duration 1h00 · published on 17/03/2020

🎥 Watch the full video on YouTube →

Related statements

💬 Comments (0)

Be the first to comment.

2000 characters remaining
🔔

Get real-time analysis of the latest Google SEO declarations

Be the first to know every time a new official Google statement drops — with full expert analysis.

No spam. Unsubscribe in one click.