Stitchflow
Bandwidth logo

Bandwidth SCIM guide

Connector Only

How to automate Bandwidth user provisioning, and what it actually costs

Summary and recommendation

Bandwidth, the Communications Platform as a Service (CPaaS) provider, does not offer SCIM provisioning on any plan. While Bandwidth supports SAML 2.0 SSO integration for dashboard access with identity providers like Okta, Azure AD, and OneLogin, this only handles authentication for the Bandwidth App dashboard—not automated user lifecycle management or API access controls. The platform's usage-based pricing model (starting at $0.0055/min for inbound calls) focuses on API consumption rather than seat-based user management, leaving IT teams without automated provisioning capabilities.

This creates a significant operational gap for organizations using Bandwidth's APIs in production environments. IT administrators must manually manage dashboard access for developers, operations teams, and other users who need to monitor call analytics, configure webhooks, or manage API credentials. Without SCIM, there's no automated way to provision or deprovision users when team members join, change roles, or leave the organization—creating both security risks and compliance challenges for companies that rely on Bandwidth for critical communications infrastructure.

The strategic alternative

Bandwidth has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaSAML 2.0 SSO compatible with Okta. No dedicated OIN integration. No SCIM provisioning.
Microsoft Entra IDSAML 2.0 SSO compatible with Azure AD. No native Entra provisioning documented.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Bandwidth accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Bandwidth pricing problem

Bandwidth gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Pay-as-you-goUsage-based ($0.010/min voice)
EnterpriseCustom pricing + premium support ($3K+/mo)

Provisioning options

PlanPriceSSOSCIM
Pay-as-you-goUsage-based ($0.010/min voice)
EnterpriseCustom pricing + premium support ($3K+/mo)

Note: Bandwidth uses consumption-based pricing for API usage, with enterprise plans adding premium support and dedicated customer success management starting at $7,500/month.

What this means in practice

Without SCIM provisioning, IT teams must:

Manually create dashboard accounts
for each developer or operations team member
Rely on SSO-only authentication
without automated user lifecycle management
Coordinate directly with users
for initial account setup before SSO can function
Handle offboarding manually
by disabling accounts in the Bandwidth dashboard

For development teams using Bandwidth's voice, messaging, and emergency services APIs, this creates a disconnect between identity management and platform access.

Additional constraints

API-first platform limitations
Most Bandwidth functionality is API-driven, reducing the need for extensive dashboard user management
No public SCIM documentation
Enterprise customers must contact Bandwidth directly to explore any provisioning automation options
SAML-only SSO
No OpenID Connect support, limiting integration flexibility with some identity providers
Manual user onboarding required
Users must be created in Bandwidth before SSO authentication can work

Summary of challenges

  • Bandwidth does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Bandwidth actually offers for identity

SAML SSO (Dashboard only)

Bandwidth provides SAML 2.0 integration for dashboard access with a 7-step setup process:

SettingDetails
ProtocolSAML 2.0
Supported IdPsOkta, OneLogin, Shibboleth, AWS SSO, generic SAML 2.0
ConfigurationManual XML metadata exchange
ScopeBandwidth App dashboard only
API accessNot covered by SSO

Critical limitation: This SSO integration only covers the Bandwidth App dashboard interface. It doesn't extend to API authentication or programmatic access, which is where most CPaaS development teams actually work.

No SCIM Provisioning

Bandwidth provides no public documentation for SCIM or automated user provisioning:

FeatureSupported?
Create users❌ No public documentation
Update users❌ No public documentation
Deactivate users❌ No public documentation
Group management❌ No public documentation
Just-in-time provisioning❌ No

The reality: For a communications platform where developers need API access and operations teams manage multiple environments, dashboard-only SSO leaves the most critical access points unmanaged. Teams still manually provision API credentials and manage user lifecycle for the actual platform services.

Why this matters: Most Bandwidth usage happens via API calls and webhooks, not dashboard logins. The current SSO offering doesn't address the core identity challenges for CPaaS implementations.

What IT admins are saying

Community sentiment on Bandwidth's authentication centers on the platform's limited user management capabilities:

  • No documented SCIM provisioning for automated user lifecycle management
  • SSO only available for dashboard access, not API authentication
  • Lack of public documentation around enterprise authentication options
  • Manual user management required for CPaaS platform access

Lack of public documentation on authentication

IT admin complaint noted in community discussions

Contact vendor for enterprise authentication

Bandwidth's standard response for provisioning questions

The recurring theme

Bandwidth functions primarily as a CPaaS API platform rather than a traditional SaaS application, which means limited user provisioning capabilities. IT teams managing developer access to Bandwidth's voice and messaging APIs face manual user management with SSO only covering the dashboard interface.

The decision

Your SituationRecommendation
Small development team (<10 users) accessing dashboardManual user management acceptable
API-only integration with minimal dashboard usersSkip provisioning automation entirely
Growing engineering team (15+ users) needing dashboard accessUse Stitchflow: manual management becomes unwieldy
Enterprise with compliance requirementsUse Stitchflow: audit trail essential for CPaaS access
Multiple teams across dev, ops, and business usersUse Stitchflow: automation critical for role management

The bottom line

Bandwidth offers robust CPaaS services but provides only basic SSO for dashboard access with no SCIM provisioning capabilities. For organizations with growing teams who need systematic user management across their communications platform, Stitchflow delivers the automation that Bandwidth doesn't offer natively.

Make Bandwidth workflows AI-native

Bandwidth has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No public SCIM documentation foundSSO for dashboard access, not APIContact vendor for enterprise authentication

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No public SCIM documentation found
  • SSO for dashboard access, not API
  • Contact vendor for enterprise authentication

Documentation not available.

Unlock SCIM for
Bandwidth

Bandwidth has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Bandwidth logo
Bandwidth
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
Aha! logo

Aha!

No SCIM

Product Management / Roadmapping

ProvisioningNot Supported
Manual Cost$11,754/yr

Aha! Roadmaps, the product roadmapping platform, does not support SCIM provisioning on any plan. While Aha! offers SAML 2.0 SSO integration with identity providers like Okta, Entra ID, and OneLogin, this only handles authentication through JIT (Just-In-Time) provisioning. The critical limitation: JIT provisioning creates user accounts with no default role or access permissions, requiring administrators to manually configure access for each user after they first sign in. For product teams managing strategic roadmaps and stakeholder access, this creates significant operational overhead. Since product roadmaps contain sensitive strategic information and stakeholder access typically varies by product area, IT administrators must manually assign appropriate roles and workspace permissions after each user is provisioned. There's no automatic deprovisioning when users leave the organization, creating potential security gaps. This manual process becomes particularly problematic for larger product organizations where dozens of stakeholders across different business units need carefully managed access to specific roadmaps.

View full guide
Appcues logo

Appcues

No SCIM

Product Adoption / User Onboarding

ProvisioningNot Supported
Manual Cost$11,754/yr

Appcues, the product adoption platform used by product managers and growth teams, explicitly does not support SCIM provisioning on any plan—not even Enterprise. While Appcues offers SAML 2.0 SSO integration starting at the Enterprise tier with just-in-time (JIT) provisioning, this only creates users during first login and provides no automated deprovisioning capabilities. For product teams where access needs change frequently as people move between projects or leave the company, this creates a significant security gap. The lack of SCIM means IT teams must manually manage user lifecycle for Appcues accounts, even though the platform handles sensitive product analytics and user flow data. When employees leave or change roles, their Appcues access remains active until manually revoked—a compliance risk that's particularly problematic given Appcues' role in tracking user behavior and product metrics. With MAU-based pricing starting at $300/month and scaling significantly with usage, paying for orphaned accounts also creates unnecessary cost bloat.

View full guide