Stitchflow
Atlassian Loom logo

Atlassian Loom SCIM guide

Native SCIM

How to automate Atlassian Loom user provisioning, and what it actually costs

Native SCIM requires Enterprise plan

Summary and recommendation

Atlassian Loom supports SCIM 2.0 for automated user provisioning, but only on Enterprise plans with custom pricing. This creates a significant barrier for teams on Business plans ($15-20/user/month) who need automated provisioning but can't justify Enterprise-level costs. The limitation is particularly problematic because Loom's domain capture feature can automatically add users to Enterprise workspaces, creating provisioning gaps where some users get automatic access while others require manual management.

For video messaging platforms handling sensitive content, this creates a compliance risk. Teams often deploy Loom organization-wide for async communication, but without automated deprovisioning on Business plans, former employees may retain access to recorded videos containing confidential information. SSO alone doesn't solve this - you need SCIM to ensure departing users lose access immediately when removed from your identity provider.

The strategic alternative

Atlassian Loom gates SCIM behind Enterprise. Skip the Enterprise plan upgrade and automate complete outcomes across your stack. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredEnterprise
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Atlassian Loom accounts manually. Here's what that costs:

Source: Stitchflow customers using Atlassian Loom, normalized to 500 employees:
Orphaned accounts (ex-employees with access)16
Unused licenses16
IT hours spent on manual management/year96 hours
Unused license cost/year$2,338
IT labor cost/year$5,784
Cost of compliance misses/year$3,825
Total annual financial impact$11,946

The Atlassian Loom pricing problem

Atlassian Loom gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Plan Structure (Billed Annually)

PlanPriceSSOSCIM
Business$15/user/month
Business + AI$20/user/month
EnterpriseCustom pricing

Note: Business plans purchased directly from Atlassian.com do not include Atlassian Guard and require a separate Guard purchase for SSO/SCIM access.

What this means in practice

The Enterprise requirement creates a substantial pricing jump from Business plans. While Atlassian doesn't publish Enterprise pricing, industry reports suggest Enterprise typically costs 2-3x Business rates:

Team SizeEstimated Annual Upgrade Cost
50 users$9,000 - $18,000/year
100 users$18,000 - $36,000/year
200 users$36,000 - $72,000/year

These estimates assume Enterprise pricing of $30-45/user/month based on market positioning.

Additional constraints

Domain verification required
Organizations must authorize their email domains before configuring SSO/SCIM, adding setup complexity.
Guard dependency
SSO and SCIM are delivered through Atlassian Guard, not native Loom functionality, creating an additional integration layer.
Workspace placement
Domain capture settings affect which workspace new users join, requiring careful configuration to avoid user confusion.
Custom pricing opacity
Enterprise requires sales engagement with no published pricing, making budget planning difficult.

Summary of challenges

  • Atlassian Loom supports SCIM but only at Enterprise tier (Custom pricing)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

Atlassian Loom doesn't sell SCIM à la carte. It's bundled with Enterprise features through Atlassian Guard:

SCIM automated provisioning (user creation, updates, deactivation, groups)
SAML single sign-on (SSO)
Domain verification and capture
Advanced workspace administration
Enhanced security controls
Priority support
Compliance features (SOC 2, GDPR)

The catch: Business plans purchased directly from Atlassian.com don't include Guard, requiring a separate purchase for SSO/SCIM. Only Enterprise plans include Guard by default.

Stitchflow Insight

If you need enterprise security controls anyway, the upgrade may make sense. If you just want automated user provisioning for your video messaging tool, you're paying for extensive enterprise features you won't use. We estimate ~60% of Enterprise features are irrelevant for teams that only need SCIM for basic user lifecycle management.

What IT admins are saying

Community sentiment on Atlassian Loom's SCIM requirements is mixed, with frustration centered on the Enterprise paywall and domain complexity.

  • Enterprise plan requirement locks out smaller teams needing basic SCIM
  • Domain verification and capture rules create deployment headaches
  • Business plans from Atlassian.com require separate Guard purchase for SSO/SCIM
  • Custom Enterprise pricing with no transparent cost structure

Why does every Atlassian product require Enterprise for basic SSO? We just need to sync users, not buy the entire platform suite.

r/sysadmin

The domain capture thing is confusing - users end up in different workspaces depending on how you set it up. Not intuitive at all.

Atlassian Community Forum

The recurring theme

Basic identity automation is held hostage behind expensive Enterprise upgrades, with confusing domain management that complicates deployment even after paying the premium.

The decision

Your SituationRecommendation
On Business plan, need SCIMUse Stitchflow: avoid the Enterprise tier jump and custom pricing negotiation
Already on Enterprise with GuardUse native SCIM: you're paying for Atlassian Guard provisioning
Need Enterprise features beyond SCIMEvaluate Enterprise: SCIM comes bundled with Guard
Domain verification blocked by IT policiesUse Stitchflow: bypass Atlassian's domain capture requirements
Small video team, low turnoverManual may work: but consider security risks with video content

The bottom line

Loom's Enterprise-only SCIM requirement forces a jump from $15-20/user/month to custom Enterprise pricing, plus mandatory domain verification. For teams that need video messaging provisioning without the Enterprise commitment, Stitchflow delivers SCIM automation at flat-rate pricing with any Loom plan.

Make Atlassian Loom workflows AI-native

Atlassian Loom gates SCIM behind Enterprise. We build complete offboarding, user access reviews, and license workflows without that SCIM Tax upgrade.

No Enterprise upgrade required
Less than a week, start to finish (~2 hours of your time)
We maintain the integration layer underneath
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Enterprise

Prerequisites

SSO must be configured first

Key limitations

  • Enterprise plan required for SSO/SCIM
  • Must authorize domains before SSO/SCIM setup
  • Domain capture affects user workspace placement
  • Business plans purchased from Atlassian.com require separate Guard purchase for SSO

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Atlassian Loom → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

SCIM via Atlassian Guard. Configure in Okta using WorkOS setup. Push users, profile updates, and groups.

Atlassian Loom gates SCIM behind Enterprise. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → Atlassian Loom → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

SCIM via Atlassian Guard. Requires Atlassian Guard subscription or Enterprise plan.

Atlassian Loom gates SCIM behind Enterprise. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Unlock SCIM for
Atlassian Loom

Atlassian Loom gates SCIM behind Enterprise plan. We automate complete offboarding and access reviews across your stack without that SCIM Tax upgrade.

See how it works
Admin Console
Directory
Applications
Atlassian Loom logo
Atlassian Loom
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Atlassian logo

Atlassian

SCIM Tax
SCIM StatusIncluded
Manual Cost$11,946/yr

Atlassian supports SCIM (the protocol that lets your identity provider automatically create, update, and remove user accounts), but requires a separate Atlassian Guard subscription on top of your existing product licenses. Guard Standard costs $3-4/user/month additional, meaning a 100-person organization pays $3,600-4,800/year extra just for provisioning capabilities. The hidden complexity: Guard billing is per "managed user" across your entire Atlassian organization, not per active product license. Recent changes make this even more operationally burdensome. As of January 2025, SCIM API keys now expire after one year, requiring mandatory annual rotation. Plus, portal-only accounts (common in Jira Service Management for external users) won't support SCIM until Q2 2025, leaving a provisioning gap for customer support workflows.

View full guide
Atlassian Jira logo

Atlassian Jira

SCIM Tax

Project Management / Issue Tracking

SCIM StatusIncluded
Manual Cost$11,946/yr

Atlassian Jira supports SCIM 2.0 for automated user provisioning, but only with an Atlassian Guard subscription—an additional $3-4/user/month on top of your base Jira plan. For a 100-person team on Standard ($9.05/user/month), adding Guard means a 33-44% cost increase just to unlock basic provisioning automation. Enterprise customers get Guard included, but that's $155/user/year with an 801-user minimum—$124,355 upfront commitment. The Guard subscription requirement creates a frustrating gap for growing teams. You're paying for Jira licenses but still manually managing user accounts, group assignments, and project access. SSO with JIT provisioning helps with login, but doesn't handle deprovisioning when employees leave or group sync for project permissions. For development teams where access delays impact sprint velocity, manual provisioning becomes a bottleneck.

View full guide
Atlassian Opsgenie logo

Atlassian Opsgenie

SCIM Tax

Incident Management / On-Call

SCIM Tax+238%
Manual Cost$11,946/yr

Atlassian Opsgenie supports SCIM provisioning, but requires an additional Atlassian Guard subscription (~$4/user/month) on top of your existing Opsgenie plan. More critically, Opsgenie reaches end of life on April 5, 2027, with Atlassian migrating customers to Jira Service Management. This creates a challenging situation: invest in SCIM setup for a product being discontinued, or manage manual provisioning during the transition period. For incident management tools, automated provisioning isn't just about convenience—it's about reliability. On-call schedules depend on accurate team membership, and incident response is time-sensitive. Manual user management creates gaps where critical personnel might lack access during emergencies, or former employees retain unnecessary incident management privileges.

View full guide