Stitchflow
Amplitude logo

Amplitude SCIM guide

Native SCIM

How to automate Amplitude user provisioning, and what it actually costs

Native SCIM requires Growth or Enterprise plan

Summary and recommendation

Amplitude supports SCIM provisioning, but only on Growth plans (starting around $36K/year) or Enterprise plans with custom pricing. While Amplitude's SCIM implementation covers the core functionality—creating, updating, and deactivating users—it requires SCIM to be specifically enabled for your organization, and regenerating the SCIM key immediately invalidates existing integrations without warning.

For product teams on Plus plans ($49/month), upgrading to Growth just to unlock SCIM means jumping from under $600/year to $36,000+/year—a 60x increase. That's often more than the entire analytics budget for smaller product teams. The gap becomes particularly problematic for cross-functional product teams where analysts, PMs, and engineers need varying levels of access to user behavior data, but manual provisioning creates security risks around sensitive analytics permissions.

The strategic alternative

Amplitude gates SCIM behind Growth or Enterprise. Skip the Growth or Enterprise plan upgrade and automate complete outcomes across your stack. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredEnterprise
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Amplitude accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Amplitude pricing problem

Amplitude gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
StarterFree
Plus$49/month
Growth~$36,000/year
EnterpriseCustom

Plan Structure

PlanPriceSCIM
StarterFree
Plus$49/month
Growth~$36,000/year✓ (if enabled)
EnterpriseCustom✓ (if enabled)

Note: SCIM availability depends on organizational enablement and may require contacting Amplitude sales even on qualifying plans.

What this means in practice

For teams currently on Plus looking to add SCIM automation:

Current SpendGrowth Upgrade CostAnnual Increase
$588/year (Plus)$36,000/year+$35,412/year
Multiple orgs on PlusEach needs Growth6,000%+ cost increase

This represents one of the steepest SCIM upgrade premiums in the product analytics space - teams pay over 60x more to unlock basic user provisioning automation.

Additional constraints

Sales-gated access
SCIM enablement often requires direct sales contact, even on qualifying plans.
Key management risks
Regenerating SCIM API keys immediately invalidates existing integrations with no grace period.
Immediate effect changes
SCIM configuration changes apply instantly, even before saving other settings, creating potential for accidental disruptions.
No granular access
You get the full Growth feature set whether you need advanced behavioral analysis, A/B testing, and real-time streaming or just want user provisioning.

Summary of challenges

  • Amplitude supports SCIM but only at Enterprise tier (Custom (Enterprise))
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

Amplitude doesn't sell SCIM standalone. It's bundled with Growth or Enterprise plan features (though availability depends on organizational enablement):

SCIM 2.0 automated provisioning
SAML 2.0 single sign-on (SSO)
Advanced behavioral cohort analysis
Real-time data streaming
A/B testing and experimentation platform
Custom dashboards and reporting
Data governance controls
Advanced user segmentation
Revenue analytics (LTV, retention)
API access for data exports

Stitchflow Insight

The Growth plan starts around $36K/year for 300K+ monthly tracked users. If you need advanced analytics capabilities anyway, the upgrade provides value. But if you just want automated user provisioning for basic product analytics, you're paying for sophisticated data science tools your team may never use. We estimate ~80% of Growth/Enterprise features are overkill for teams that only need SCIM to manage analyst and PM access.

What IT admins are saying

Community sentiment on Amplitude's SCIM implementation reveals frustration with access barriers and key management issues. Common complaints:

  • SCIM availability depends on organization-level enablement that isn't always accessible
  • Regenerating SCIM keys immediately breaks existing integrations without warning
  • Having to contact sales teams just to enable SCIM functionality
  • Growth plan pricing barriers that force expensive upgrades for basic provisioning

SCIM key changes apply immediately even before saving other changes - caught us off guard during a routine key rotation.

IT Admin, Reddit

Had to go through sales just to get SCIM enabled on our Growth plan. Should be a standard admin feature.

SysAdmin Forum

The recurring theme

Amplitude gates essential provisioning features behind sales conversations and unpredictable enablement processes, making what should be straightforward identity management unnecessarily complex.

The decision

Your SituationRecommendation
On Plus or lower, need SCIMUse Stitchflow: avoid the $36K+/year Growth tier jump
On Growth but SCIM not enabledUse Stitchflow: bypass the sales process and enablement delays
Already on Growth/Enterprise with SCIM enabledUse native SCIM: you're paying for it
Need Growth analytics features beyond SCIMEvaluate Growth upgrade: SCIM may come bundled
Small analytics team, infrequent user changesManual may work: but watch for data access gaps

The bottom line

Amplitude's SCIM requires Growth tier pricing (starting around $36K/year) plus organizational enablement, creating a significant cost barrier for teams that just need provisioning automation. For product teams on Plus who want secure analytics access without the tier jump, Stitchflow delivers SCIM functionality at a fraction of the cost.

Make Amplitude workflows AI-native

Amplitude gates SCIM behind Growth or Enterprise. We build complete offboarding, user access reviews, and license workflows without that SCIM Tax upgrade.

No Growth or Enterprise upgrade required
Less than a week, start to finish (~2 hours of your time)
We maintain the integration layer underneath
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Enterprise

Prerequisites

SSO must be configured first

Key limitations

  • SCIM must be enabled for your organization
  • Regenerating SCIM key immediately invalidates old key
  • SCIM key changes apply immediately even before saving other changes

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Amplitude → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

OIN app available. Supports: Import Users/Groups, Create New Users (sends invitation email), Update User Attributes, Deactivate Users, Push Groups. Authenticate with API Token (SCIM key from Amplitude). Regenerating SCIM key immediately invalidates old key.

Amplitude gates SCIM behind Growth or Enterprise. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → Amplitude → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

Microsoft Entra ID tutorial available for Amplitude SSO and provisioning. SCIM API follows SCIM 2.0 standard.

Amplitude gates SCIM behind Growth or Enterprise. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Unlock SCIM for
Amplitude

Amplitude gates SCIM behind Growth or Enterprise plan. We automate complete offboarding and access reviews across your stack without that SCIM Tax upgrade.

See how it works
Admin Console
Directory
Applications
Amplitude logo
Amplitude
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Mixpanel logo

Mixpanel

SCIM Tax

Product Analytics

SCIM StatusIncluded
Manual Cost$11,754/yr

Mixpanel supports SCIM (the protocol that lets your identity provider automatically create, update, and remove user accounts). But Mixpanel gates SCIM behind its Enterprise plan, which starts at $10,000/year and can reach $200,000+ depending on event volume. For product analytics, this creates a significant barrier since teams often start with Growth plans ($20/month base) but need Enterprise-level security controls as they scale. This pricing structure forces growing companies into an uncomfortable choice: either manage Mixpanel users manually (creating compliance gaps for sensitive product data) or pay Enterprise prices before they're ready. SSO alone doesn't solve the provisioning problem - you still need to manually grant project-level permissions and manage role assignments for product managers, analysts, and engineers accessing user behavior data.

View full guide
Bugsnag logo

Bugsnag

SCIM Tax

Error Monitoring / Observability

SCIM StatusIncluded
Manual Cost$11,754/yr

Bugsnag supports native SCIM provisioning, but only on Enterprise plans with custom pricing. This creates a significant cost barrier since you must upgrade from Business ($475/month for 1M events) to Enterprise just to unlock automated user provisioning. For many engineering teams, this represents a substantial price jump for provisioning features that should be standard across all paid plans. The Enterprise requirement is particularly problematic for mid-size development teams who need error monitoring automation but don't require Enterprise-level features. Without SCIM, IT teams must manually provision developer accounts and manage team memberships for project access—creating security gaps when developers change teams or leave the company. OneLogin users face an additional limitation: SCIM isn't supported on Enterprise instances, forcing a workaround through the standard Bugsnag app.

View full guide
Greenhouse logo

Greenhouse

SCIM Tax

HR / Recruiting

SCIM StatusIncluded
Manual Cost$11,754/yr

Greenhouse supports SCIM provisioning, but only on Advanced or Expert tiers (starting around $6,000/year, quote-based). The bigger issue: Greenhouse's SCIM implementation only provisions users—not groups—meaning you lose the organizational structure and permission inheritance that makes identity management scalable. Additionally, you cannot fully delete users via SCIM (only deactivate), and Azure Entra users face a 40-minute sync delay. For recruiting teams managing hiring managers, interviewers, and HR staff across different departments and access levels, the lack of group provisioning creates a significant operational burden. You're forced to manually assign permissions and manage access changes for every user individually. With recruiting involving sensitive candidate data and frequent access changes during hiring cycles, this manual overhead increases both security risk and administrative workload.

View full guide