Stitchflow
15Five logo

15Five SCIM guide

Native SCIM

How to automate 15Five user provisioning, and what it actually costs

Native SCIM requires All plans plan

Summary and recommendation

15Five includes SCIM provisioning on all plans starting at $4/user/month, with full support for creating, updating, and deactivating users across Okta, Entra ID, Google Workspace, and OneLogin. However, 15Five's SCIM implementation has a critical prerequisite: SSO must be configured first, and their documentation explicitly warns against using JIT provisioning alongside SCIM due to duplicate user creation risks.

This creates operational friction for IT teams managing performance management rollouts. The SSO-first requirement means you can't test SCIM provisioning in isolation, and the JIT conflict forces you to choose between automated onboarding convenience and reliable user lifecycle management. For HR-driven tools like 15Five that need to maintain accurate manager hierarchies and team structures, these provisioning gaps can disrupt performance review cycles and employee engagement tracking.

The strategic alternative

15Five has native SCIM. Native SCIM is a start, but critical offboarding and access review workflows still break across systems. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredFree
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages 15Five accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The 15Five pricing problem

15Five gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Plan Structure

PlanPriceSSOSCIM
Standard$4/user/mo
Engage$4/user/mo
Perform$11/user/mo
Total Platform$16/user/mo

All plans billed annually. SCIM available at no additional cost.

What this means in practice

While 15Five doesn't gate SCIM behind expensive tiers, the implementation creates operational challenges:

Mandatory SSO prerequisite
SCIM configuration requires SSO to be set up first, forcing a specific deployment sequence that can complicate rollouts.
JIT conflicts
Just-in-time provisioning conflicts with SCIM, potentially creating duplicate user accounts if not properly managed.
Limited attribute sync
SSO only passes Email and Name ID - all other user attributes must flow through SCIM, requiring dual-channel management.

Additional constraints

Setup sequence dependency
SSO must be configured before SCIM can be enabled, preventing parallel implementation.
JIT incompatibility
Using JIT provisioning alongside SCIM can create duplicate accounts, requiring careful coordination between SSO and SCIM workflows.
Attribute channel split
Critical user data flows through two different channels (SSO for basic identity, SCIM for everything else), complicating troubleshooting.
Manager hierarchy sync
Performance management tools require accurate reporting relationships, making attribute sync failures particularly disruptive for HR processes.

Summary of challenges

  • 15Five supports SCIM but only at Free tier (custom pricing)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What 15Five actually offers for identity

15Five includes SCIM provisioning across all pricing tiers, making it unusually accessible compared to most SaaS apps. Here's what you get:

SCIM automated provisioning (create, update, deactivate users)
SAML single sign-on (SSO)
Support for all major IdPs (Okta, Entra, Google Workspace, OneLogin)
Manager hierarchy sync for performance reviews
Team structure provisioning

The catch: SSO must be configured before SCIM, and just-in-time (JIT) provisioning conflicts with SCIM automation. 15Five's documentation explicitly warns against using JIT when SCIM is active, as it can create duplicate user records.

While SCIM is technically available on the $4/user Standard plan, you'll need SSO working first. For organizations that want simple automated provisioning without SSO complexity, this prerequisite adds unnecessary friction to what should be a straightforward setup.

What IT admins are saying

Community sentiment on 15Five's SCIM implementation is mixed, with frustration centered around prerequisite requirements and integration conflicts. Common complaints:

  • SSO being required before SCIM setup adds implementation complexity
  • JIT provisioning conflicts with SCIM, creating duplicate user scenarios
  • Limited attribute passing through SSO forces reliance on SCIM for complete profiles
  • Manager hierarchy syncing issues during performance review cycles

The JIT and SCIM conflict is a real pain point - you have to choose one or the other, but then you lose flexibility.

IT Admin, Reddit

Why does SSO need to be configured first? Most other apps let you set up SCIM independently.

Identity Management Forum

The recurring theme

While SCIM is available on all plans (a positive), the implementation requirements and integration dependencies create unnecessary friction for IT teams trying to automate their performance management workflows.

The decision

Your SituationRecommendation
Any plan, want SCIM without SSO complexityUse Stitchflow: skip the SSO prerequisite entirely
Using JIT provisioning, need SCIM tooUse Stitchflow: avoid the JIT/SCIM conflict that creates duplicates
Multiple IdPs or complex attribute mappingUse Stitchflow: get unified provisioning across all identity providers
Already have SSO configured, comfortable with native setupUse native SCIM: it's included in all plans
Small team with minimal user changesManual may work: but watch for manager hierarchy sync issues

The bottom line

While 15Five includes SCIM in all plans, the SSO prerequisite and JIT conflicts create unnecessary complexity for many IT teams. Stitchflow eliminates these dependencies, delivering clean provisioning automation without the setup headaches.

Make 15Five workflows AI-native

15Five has native SCIM, but critical workflows still break across systems. We build the full end-to-end workflow in your environment.

Works alongside native SCIM to close workflow gaps
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Free

Prerequisites

SSO must be configured first

Key limitations

  • SSO should be configured before SCIM
  • JIT not recommended when using SCIM (can create duplicates)
  • SSO only passes Email and Name ID - other attributes via SCIM

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → 15Five → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

SCIM creates new users when assigned in Okta. Sync is one-way (Okta to 15Five). Import existing users to make Okta aware of them.

15Five has native SCIM, but critical workflows still break across systems. Stitchflow builds complete end-to-end outcomes with your team.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → 15Five → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

Initial sync takes ~40 minutes, then every ~20 minutes. Groups cannot remove access - must unassign individually. SCIM key is 30 chars (not 32-char API key).

15Five has native SCIM, but critical workflows still break across systems. Stitchflow builds complete end-to-end outcomes with your team.

Unlock SCIM for
15Five

15Five has native SCIM, but complete workflows still span more than one tool. We build the full flow with your team so you can extend it to anything else in the company.

See how it works
Admin Console
Directory
Applications
15Five logo
15Five
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Dropbox logo

Dropbox

Has SCIM
SCIM StatusIncluded
Manual Cost$11,754/yr

Dropbox Business supports SCIM 2.0 provisioning on Standard plans and above ($15/user/month), with solid integration across major identity providers including Okta, Azure AD, and Google Workspace. However, there's a critical architectural limitation: Dropbox Sign (formerly HelloSign) operates as a separate product that doesn't support SCIM at all, despite being a core part of many organizations' document workflows. This creates a significant provisioning gap for IT teams. While your main Dropbox storage accounts can be automatically managed, any users who need access to Dropbox Sign must be manually provisioned and deprovisioned. For organizations relying on both products, this means maintaining hybrid workflows where some users are automated and others require manual intervention—exactly the kind of inconsistency that leads to compliance issues and security gaps during employee transitions.

View full guide
Atlassian Jira Service Management logo

Atlassian Jira Service Management

Has SCIM

IT Service Management / ITSM

SCIM StatusIncluded
Manual Cost$11,946/yr

Atlassian Jira Service Management supports SCIM 2.0 for provisioning both support agents and customers, but only with an Atlassian Guard Standard subscription on top of your existing JSM plan. This means paying for two separate subscriptions: JSM ($20-57/agent/month) plus Guard for SCIM functionality. For enterprise teams with 201+ agents, this often results in six-figure annual costs just to enable automated provisioning. The dual subscription model creates significant budget friction for IT teams who need basic user lifecycle management. Without SCIM, you're manually managing agent accounts and customer portal access, creating security gaps when employees change roles or leave. JSM's customer provisioning complexity—requiring specific product access roles and organization mapping—makes manual management even more error-prone for large service desk operations.

View full guide
AWS IAM Identity Center logo

AWS IAM Identity Center

Has SCIM

Cloud Infrastructure / Identity Management

SCIM StatusIncluded
Manual Cost$14,407/yr

AWS IAM Identity Center supports SCIM 2.0 provisioning and is completely free—no additional licensing costs beyond your AWS account. However, the implementation has significant operational limitations that create ongoing management overhead for IT teams. The core issues: SCIM sync runs every 20-40 minutes (not real-time), multivalue attributes aren't supported, and once SCIM is enabled, you lose the ability to manually manage users through the AWS console. More problematic, Azure AD users face nested group limitations and attribute removal sync issues, while all IdPs must work around the requirement for specific mandatory fields (First name, Last name, Username, Display name). For organizations managing complex AWS multi-account environments with varying permission sets, these constraints force manual workarounds that undermine automation benefits. While IAM Identity Center's free pricing is attractive, the operational friction from sync delays, attribute limitations, and console lockout creates hidden administrative costs—especially when managing hundreds of users across multiple AWS accounts with different access requirements.

View full guide