Stitchflow
Atlassian Bitbucket logo

Atlassian Bitbucket SCIM guide

Native SCIM

How to automate Atlassian Bitbucket user provisioning, and what it actually costs

Native SCIM requires Atlassian Guard subscription plan

Summary and recommendation

Atlassian Bitbucket supports SCIM 2.0 for user provisioning, but requires an additional Atlassian Guard subscription on top of your existing Bitbucket plan. More critically, Bitbucket's SCIM implementation only provisions users—group sync is completely unavailable. This means while your IdP can create and deactivate user accounts, all repository permissions and team memberships must be managed manually within Bitbucket itself.

For development teams handling sensitive source code, this creates a significant security and operational gap. Repository access controls are critical for IP protection, but without group sync, IT admins must rely on developers to manually assign the correct permissions in Bitbucket after SCIM provisions the accounts. This manual step defeats the purpose of automated provisioning and creates compliance risks when developers leave or change roles.

The strategic alternative

Atlassian Bitbucket gates SCIM behind Atlassian Guard subscription. Skip the Atlassian Guard subscription plan upgrade and automate complete outcomes across your stack. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredEnterprise
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Atlassian Bitbucket accounts manually. Here's what that costs:

Source: Stitchflow customers using Atlassian Bitbucket, normalized to 500 employees:
Orphaned accounts (ex-employees with access)16
Unused licenses16
IT hours spent on manual management/year96 hours
Unused license cost/year$2,338
IT labor cost/year$5,784
Cost of compliance misses/year$3,825
Total annual financial impact$11,946

The Atlassian Bitbucket pricing problem

Atlassian Bitbucket gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
FreeFree (5 users)
Standard$3.30/user/mo
Requires Guard
Premium$6.60/user/mo
Requires Guard

Plan Structure

PlanPriceSCIM
FreeFree (5 users)
Standard$3.30/user/moRequires Guard
Premium$6.60/user/moRequires Guard

Note: SCIM requires a separate Atlassian Guard subscription on top of your Bitbucket plan. Guard pricing varies but adds significant cost to your monthly spend.

What this means in practice

The core limitation: SCIM only provisions user accounts - not repository access. Development teams still need to:

Manually assign users to repositories
Manage repository permissions in Bitbucket's interface
Handle team-based access controls separately from IdP groups

Cost impact: Adding Atlassian Guard to enable basic (incomplete) SCIM:

Team SizeBase Bitbucket Cost+ Guard SubscriptionTotal Impact
25 developers$990/year+ Guard feesSignificant increase
50 developers$1,980/year+ Guard feesDoubles overall cost
100 developers$3,960/year+ Guard feesMajor budget impact

Additional constraints

Third-party dependency
Full group sync requires marketplace apps like "User Sync - SCIM Provisioning & Group Sync" at additional cost.
API key management
SCIM API keys expire after one year, requiring manual renewal to maintain provisioning.
Limited scope
Even with SCIM enabled, repository-level permissions remain a manual process for IT teams.
Guard subscription complexity
Adding Guard changes your billing relationship and support structure with Atlassian.

Summary of challenges

  • Atlassian Bitbucket supports SCIM but only at Enterprise tier (custom pricing)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

Bitbucket doesn't sell SCIM à la carte. It requires an Atlassian Guard subscription on top of your existing plan:

SCIM automated provisioning (users only - no group sync)
SAML single sign-on (SSO)
Advanced security policies and audit logs
Domain verification and management
API token management and monitoring
Data residency options
Enhanced admin controls across Atlassian products

If you need organization-wide security controls across multiple Atlassian products, Guard may justify the cost. But if you just want automated provisioning for Bitbucket specifically, you're paying for a security bundle while still handling the most critical part (repository access) manually. We estimate ~60% of Guard features are irrelevant for teams that only need Bitbucket user provisioning with proper group sync.

Stitchflow Insight

Bitbucket's SCIM only provisions users, not groups. Repository permissions and team assignments must still be managed manually in Bitbucket, or through third-party marketplace apps that add complexity and cost.

What IT admins are saying

Community sentiment on Atlassian Bitbucket's SCIM implementation is mixed, with significant frustration around core limitations. Common complaints:

  • No group sync for Bitbucket - users provision but repository permissions require manual management
  • Requiring separate Atlassian Guard subscription adds complexity and cost
  • Need to purchase third-party marketplace apps for full functionality
  • API keys expiring annually creates maintenance overhead

"GROUP SYNC NOT AVAILABLE for Bitbucket - users only" is the most cited limitation across forums and documentation.

Group sync requires third-party marketplace apps

consistently mentioned as a major gap in native functionality.

The recurring theme

Bitbucket's SCIM provisions users but stops short of the group sync that makes automated access management truly valuable for development teams managing sensitive code repositories.

The decision

Your SituationRecommendation
Need group sync for repository permissionsUse Stitchflow: Bitbucket's native SCIM can't sync groups
Want to avoid Atlassian Guard subscription costsUse Stitchflow: no additional Guard licensing required
On Standard/Premium, don't need other Guard featuresUse Stitchflow: avoid paying for unused Guard capabilities
Already have Guard, only need basic user provisioningUse native SCIM: you're paying for Guard anyway
Small dev team with simple access needsManual may work: but consider security risks for code access

The bottom line

Bitbucket's native SCIM requires an Atlassian Guard subscription and crucially lacks group sync—forcing you to manage repository permissions manually even with provisioning enabled. For development teams where code access security matters, Stitchflow provides complete provisioning automation including the group sync that Bitbucket's native implementation can't deliver.

Make Atlassian Bitbucket workflows AI-native

Atlassian Bitbucket gates SCIM behind Atlassian Guard subscription. We build complete offboarding, user access reviews, and license workflows without that SCIM Tax upgrade.

No Atlassian Guard subscription upgrade required
Less than a week, start to finish (~2 hours of your time)
We maintain the integration layer underneath
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Enterprise

Prerequisites

SSO must be configured first

Key limitations

  • GROUP SYNC NOT AVAILABLE for Bitbucket
  • Requires Atlassian Guard subscription
  • Group sync requires third-party marketplace apps
  • API keys expire after 1 year

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Atlassian Bitbucket → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

Atlassian Cloud app in OIN. Requires Atlassian Guard Standard subscription. Copy SCIM base URL and API key from admin.atlassian.com. Store credentials - not shown again. Group sync only for Jira/Confluence, NOT Bitbucket.

Atlassian Bitbucket gates SCIM behind Atlassian Guard subscription. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → Atlassian Bitbucket → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

Full provisioning tutorial. Set Provisioning Mode to Automatic. Syncs every ~40 minutes. Group sync only for Jira/Confluence - NOT for Bitbucket. Third-party solutions (miniOrange) available for extended Bitbucket SCIM features.

Atlassian Bitbucket gates SCIM behind Atlassian Guard subscription. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Unlock SCIM for
Atlassian Bitbucket

Atlassian Bitbucket gates SCIM behind Atlassian Guard subscription plan. We automate complete offboarding and access reviews across your stack without that SCIM Tax upgrade.

See how it works
Admin Console
Directory
Applications
Atlassian Bitbucket logo
Atlassian Bitbucket
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Atlassian logo

Atlassian

SCIM Tax
SCIM StatusIncluded
Manual Cost$11,946/yr

Atlassian supports SCIM (the protocol that lets your identity provider automatically create, update, and remove user accounts), but requires a separate Atlassian Guard subscription on top of your existing product licenses. Guard Standard costs $3-4/user/month additional, meaning a 100-person organization pays $3,600-4,800/year extra just for provisioning capabilities. The hidden complexity: Guard billing is per "managed user" across your entire Atlassian organization, not per active product license. Recent changes make this even more operationally burdensome. As of January 2025, SCIM API keys now expire after one year, requiring mandatory annual rotation. Plus, portal-only accounts (common in Jira Service Management for external users) won't support SCIM until Q2 2025, leaving a provisioning gap for customer support workflows.

View full guide
Atlassian Jira logo

Atlassian Jira

SCIM Tax

Project Management / Issue Tracking

SCIM StatusIncluded
Manual Cost$11,946/yr

Atlassian Jira supports SCIM 2.0 for automated user provisioning, but only with an Atlassian Guard subscription—an additional $3-4/user/month on top of your base Jira plan. For a 100-person team on Standard ($9.05/user/month), adding Guard means a 33-44% cost increase just to unlock basic provisioning automation. Enterprise customers get Guard included, but that's $155/user/year with an 801-user minimum—$124,355 upfront commitment. The Guard subscription requirement creates a frustrating gap for growing teams. You're paying for Jira licenses but still manually managing user accounts, group assignments, and project access. SSO with JIT provisioning helps with login, but doesn't handle deprovisioning when employees leave or group sync for project permissions. For development teams where access delays impact sprint velocity, manual provisioning becomes a bottleneck.

View full guide
Atlassian Loom logo

Atlassian Loom

SCIM Tax

Video Messaging / Async Communication

SCIM StatusIncluded
Manual Cost$11,946/yr

Atlassian Loom supports SCIM 2.0 for automated user provisioning, but only on Enterprise plans with custom pricing. This creates a significant barrier for teams on Business plans ($15-20/user/month) who need automated provisioning but can't justify Enterprise-level costs. The limitation is particularly problematic because Loom's domain capture feature can automatically add users to Enterprise workspaces, creating provisioning gaps where some users get automatic access while others require manual management. For video messaging platforms handling sensitive content, this creates a compliance risk. Teams often deploy Loom organization-wide for async communication, but without automated deprovisioning on Business plans, former employees may retain access to recorded videos containing confidential information. SSO alone doesn't solve this - you need SCIM to ensure departing users lose access immediately when removed from your identity provider.

View full guide