Stitchflow
Abnormal Security logo

Abnormal Security SCIM guide

Connector Only

How to automate Abnormal Security user provisioning, and what it actually costs

Native SCIM not available

Summary and recommendation

Abnormal Security, the AI-powered email security platform protecting against BEC and phishing attacks, does not offer SCIM provisioning on any plan. While the platform supports SAML 2.0 SSO integration with identity providers like Okta and Entra ID, this only handles authentication—not automated user lifecycle management. Security teams must manually provision and deprovision analyst access through Abnormal's portal, creating operational overhead and potential security gaps in a platform specifically designed to protect against email-based threats.

This manual provisioning model creates significant challenges for security operations. When new SOC analysts join or existing team members change roles, IT admins must coordinate manual account creation and permission updates in Abnormal Security. For a platform that's critical to threat detection and incident response, delays in provisioning can leave security gaps, while delayed deprovisioning creates compliance risks. The irony is stark: a security platform designed to prevent account takeover and credential abuse lacks the automated provisioning controls that prevent exactly these risks.

The strategic alternative

Stitchflow provides SCIM-level provisioning through resilient browser automation for Abnormal Security without requiring any custom development work. Works with any Abnormal Security deployment and any IdP. Flat pricing under $5K/year.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaNo dedicated Abnormal Security app in Okta OIN. Abnormal integrates with Okta for threat detection (API-based), not user provisioning.
Microsoft Entra IDMicrosoft Sentinel data connector for threat/case log ingestion. No Entra ID user provisioning integration documented.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Abnormal Security accounts manually. Here's what that costs:

Source: Stitchflow research, normalized to 500 employees:
Orphaned accounts (ex-employees with access)5
Unused licenses12
IT hours spent on manual management/year85 hours
Unused license cost/year$3,500
IT labor cost/year$5,100
Cost of compliance misses/year$890
Total annual financial impact$9,490

The Abnormal Security pricing problem

Abnormal Security gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
EnterpriseCustom (~$87K/year or ~$3/user/mo)

Pricing structure

PlanPricingSCIMSSO
EnterpriseCustom (~$87K/year or ~$3/user/mo)❌ Not available✓ SAML (requires support)

Key pricing details

Enterprise-only platform with custom quotes starting around $87,000/year
Often sold through resellers, making direct pricing negotiation difficult
No public pricing tiers
all deployments require sales engagement

What this means in practice

Without SCIM, security teams face significant operational overhead:

Manual user lifecycle management

IT must manually create accounts for new security analysts
Deprovisioning departing users requires manual portal access
Role changes (analyst to admin) need manual adjustment
No automated sync when team members change departments

Audit and compliance gaps

No centralized audit trail of user provisioning events
Manual processes create inconsistency in access controls
Security platform access isn't reflected in identity governance reports
SOX/SOC compliance requires additional manual documentation

Operational friction

SAML SSO configuration requires opening support tickets with Abnormal
New analyst onboarding delayed by manual account creation
Emergency access scenarios require manual intervention outside business hours

Additional constraints

Support-gated SSO setup
Even basic SAML configuration requires customer support engagement
No IdP integration
Unlike other security platforms, no pre-built connectors in Okta OIN or Entra gallery
Portal-only management
All user administration must happen through Abnormal's web interface
Custom enterprise contracts
No self-serve options mean all changes require vendor coordination

Summary of challenges

  • Abnormal Security does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Abnormal Security actually offers for identity

SAML SSO (Enterprise only)

Abnormal Security supports SAML 2.0 integration, but documentation is locked behind their customer support portal:

SettingDetails
ProtocolSAML 2.0
Supported IdPsOkta, Entra ID, custom SAML providers
ConfigurationCustomer support required
JIT Provisioning❌ No
User requirementManual account creation via portal

Critical limitation: No JIT (just-in-time) provisioning means you must manually create each security analyst account in Abnormal's portal before they can authenticate via SSO.

Manual User Management Only

Abnormal Security forces IT teams to manage security platform access manually:

No automated provisioning
Security analysts must be added individually through the web portal
No deprovisioning automation
Departing users remain active until manually removed
RBAC via portal only
Role assignments happen in Abnormal's interface, not your IdP
No audit trail sync
User access changes don't flow back to your identity provider

Third-Party Integration Gaps

While Abnormal integrates with Microsoft Sentinel for threat data, these integrations don't solve user management:

IntegrationPurposeUser Provisioning
Microsoft SentinelThreat/case log ingestion❌ No
Okta APIThreat detection data❌ No
Various SIEMsSecurity event export❌ No

The reality: These are data connectors for security monitoring, not identity management solutions. Your security team still manages Abnormal user access manually, creating audit gaps for this critical security platform.

What IT admins are saying

Community sentiment on Abnormal Security's manual provisioning highlights the disconnect between enterprise security tools and modern IT operations:

  • No SCIM support means manual user management for every security analyst
  • SSO configuration requires opening support tickets instead of self-service setup
  • Custom enterprise pricing makes budgeting and ROI calculations difficult
  • Documentation for identity integrations is locked behind customer portals

User accounts must be manually provisioned through the Abnormal Security portal. There's no automated way to sync from our identity provider.

IT Administrator, TrustRadius

Even though we have SAML SSO working, we still have to manually add each security team member to Abnormal. When someone leaves, it's easy to forget to deprovision them from this critical security tool.

Security Operations Manager, Reddit discussion

The recurring theme

For a platform protecting against insider threats and account compromise, the irony isn't lost on IT teams that Abnormal Security itself requires manual account management that creates audit trail gaps and potential security risks.

The decision

Your SituationRecommendation
Small security team (<10 analysts)Manual management is workable short-term
SOC with low analyst turnoverManual management with SAML SSO for authentication
Growing security organization (25+ users)Use Stitchflow: automation essential for security team scaling
Enterprise with compliance requirementsUse Stitchflow: automated audit trail critical for security platform access
Multi-team security operations (SOC, incident response, threat hunting)Use Stitchflow: role-based provisioning automation required

The bottom line

Abnormal Security delivers critical email threat protection, but offers no SCIM provisioning despite enterprise-level pricing starting around $87K annually. Security teams are left managing analyst access manually in a platform that should be securing the organization. For security operations that need reliable, auditable user provisioning, Stitchflow eliminates the manual overhead while maintaining the security controls your team demands.

Automate Abnormal Security without third-party complexity

Stitchflow delivers SCIM-level provisioning through resilient browser automation, backed by 24/7 human in the loop for Abnormal Security at <$5K/year, flat, regardless of team size.

Works alongside or instead of native SCIM
Syncs with your existing IdP (Okta, Entra ID, Google Workspace)
Automates onboarding and offboarding
SOC 2 Type II certified
24/7 human-in-the-loop monitoring
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No SCIM provisioning support documentedSSO configuration requires customer supportManual user management via portal RBACEnterprise-only pricing with custom quotes

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No SCIM provisioning support documented
  • SSO configuration requires customer support
  • Manual user management via portal RBAC
  • Enterprise-only pricing with custom quotes

Documentation not available.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app

Where to enable

Entra admin center → Enterprise applications → Abnormal Security → Single sign-on

Microsoft Sentinel data connector for threat/case log ingestion. No Entra ID user provisioning integration documented.

Use Stitchflow for automated provisioning.

Unlock SCIM for
Abnormal Security

Abnormal Security doesn't offer SCIM. Get an enterprise-grade SCIM endpoint in your IdP, even without native support.

See how it works
Admin Console
Directory
Applications
Abnormal Security logo
Abnormal Security
via Stitchflow

Last updated: 2026-01-20

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
ActiveCampaign logo

ActiveCampaign

No SCIM

Marketing Automation / Email

ProvisioningNot Supported
Manual Cost$11,754/yr

ActiveCampaign, the marketing automation platform, does not offer native SCIM provisioning on any plan. While the Enterprise plan ($145+/month) includes SAML 2.0 SSO with just-in-time (JIT) provisioning, this only creates user accounts on first login—there's no automated deprovisioning when employees leave or change roles. New SSO users are automatically added to a generic "SSO Users" group with configurable permissions, but IT teams have no way to programmatically manage user lifecycles or enforce granular access controls based on department or role changes. This creates a significant gap for marketing teams that need to manage access to customer data and campaign tools. When employees leave the company or change departments, their ActiveCampaign access must be manually revoked, creating compliance risks and potential data exposure. The lack of automated deprovisioning means former employees could theoretically retain access to sensitive marketing data and customer information until someone manually removes them from the platform.

View full guide
Adyen logo

Adyen

No SCIM

Payments / Fintech

ProvisioningNot Supported
Manual Cost$11,754/yr

Adyen offers SCIM 2.0 provisioning, but only through Okta's integration—there's no native SCIM endpoint. This creates a significant vendor lock-in scenario where your provisioning capabilities are entirely dependent on using Okta as your identity provider. Teams using Azure Entra, Google Workspace, or OneLogin are left with manual user management despite Adyen supporting SAML SSO with these platforms. The Okta integration itself requires maintaining a company account (not just a merchant account) and keeping at least one non-SSO admin for troubleshooting, adding operational complexity. For payment platforms handling sensitive financial data, this provisioning gap creates serious compliance risks. Your finance team, payment operations staff, and developers need timely access to process transactions and manage risk controls, but without automated provisioning, you're stuck with manual onboarding that can delay critical payment operations. The requirement to maintain non-SSO admin accounts also creates a security backdoor that compliance auditors will flag.

View full guide