Stitchflow
Basecamp logo

Basecamp SCIM guide

Native SCIM

How to automate Basecamp user provisioning, and what it actually costs

Native SCIM requires Business plan

Summary and recommendation

Basecamp offers automated user provisioning only through Okta's connector, which uses a proprietary API rather than the standard SCIM 2.0 protocol. This integration is available with Basecamp's Business plan ($299/month flat rate for unlimited users), but creates significant limitations for IT teams: you're locked into Okta as your identity provider, with no native SCIM support for Entra ID, Google Workspace, or other platforms. While Basecamp does support SAML SSO across multiple IdPs, SSO alone only handles authentication—users must still be manually created and managed in Basecamp.

This creates a problematic gap for organizations using non-Okta identity providers or those requiring standardized SCIM implementations. IT teams end up managing Basecamp users manually or through custom scripts, increasing operational overhead and compliance risk. The lack of true SCIM 2.0 support means you can't leverage your existing provisioning workflows or easily switch identity providers without losing automation capabilities.

The strategic alternative

Basecamp gates SCIM behind Business. Skip the Business plan upgrade and automate complete outcomes across your stack. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredBusiness
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDSSO only
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Basecamp accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Basecamp pricing problem

Basecamp gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Starter$15/user/month
Business$299/month flat (unlimited users)

Pricing and provisioning options

PlanPriceSSOSCIM
Starter$15/user/month
Business$299/month flat (unlimited users)

What this means in practice

For organizations using other identity providers: If you're standardized on Entra ID, Google Workspace, or OneLogin, you're locked out of automated provisioning entirely. Manual user management becomes the only option, regardless of organization size.

For Okta users: While provisioning is technically possible, you're dependent on Basecamp's proprietary API implementation through Okta's connector. This creates a single point of failure - if the connector breaks or Basecamp changes their API, provisioning stops working until both vendors coordinate a fix.

Flat pricing creates hidden complexity: The $299/month unlimited user model seems straightforward, but without proper provisioning automation, IT teams often end up paying for inactive users who were never properly deprovisioned when they left projects or the organization.

Additional constraints

IdP vendor lock-in
Provisioning architecture forces dependency on specific identity providers
Non-standard implementation
Uses proprietary APIs instead of SCIM 2.0, limiting interoperability
Support complexity
Provisioning issues require coordination between Basecamp, your IdP vendor, and your IT team
Limited documentation
Basecamp's provisioning capabilities with non-Okta IdPs are poorly documented
JIT provisioning gaps
While Just-in-Time provisioning is available, it doesn't solve deprovisioning or attribute updates

Summary of challenges

  • Basecamp supports SCIM but only at Business tier (custom pricing)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Basecamp actually offers for identity

Basecamp doesn't offer native SCIM. Instead, provisioning depends on third-party connectors that only work with specific identity providers:

Okta Connector (Business plan required)

SAML single sign-on
Automated user provisioning via proprietary API
User deactivation and attribute updates
Group linking and schema discovery
Critical limitation
Only works with Okta—no other IdP support

For all other identity providers (Entra ID, Google Workspace, OneLogin)

SAML single sign-on only
Manual user creation and management
No automated provisioning
No group synchronization

The fundamental problem: Basecamp's Business plan ($299/month flat rate) includes unlimited users but forces you into either Okta vendor lock-in for automation or manual user management for everything else. There's no SCIM 2.0 standard implementation that works universally across identity providers.

This creates an architectural mismatch—you get flat-rate pricing that should eliminate per-user overhead, but without proper provisioning automation, IT teams still spend time manually managing user lifecycles, especially during project transitions and employee departures.

What IT admins are saying

Community sentiment on Basecamp's provisioning reveals frustration with limited automation options:

  • Okta-only provisioning - Automated user management only works through Okta's proprietary connector, leaving Azure AD and Google Workspace admins with manual processes
  • No native SCIM support - Unlike modern SaaS apps, Basecamp doesn't offer standard SCIM 2.0 endpoints that work with any identity provider
  • Documentation gaps - IT teams struggle to find clear guidance on provisioning options beyond Okta
  • Project access complexity - Managing user access across multiple Basecamp projects requires manual coordination

Limited IdP options documented

Common complaint in IT communities about Basecamp's provisioning setup

Check Basecamp docs for other IdP support

Standard response when admins ask about non-Okta provisioning options

The recurring theme

Basecamp's provisioning automation is essentially an Okta exclusive feature. Organizations using Azure AD, Google Workspace, or other identity providers must handle user lifecycle management manually, creating ongoing administrative overhead despite Basecamp's flat-rate pricing model making user additions cost-neutral.

The decision

Your SituationRecommendation
Using Okta with Business planUse Okta's native connector: you have full provisioning automation
Using Entra ID, Google Workspace, or OneLoginUse Stitchflow: no native provisioning options available
Small teams (<10 users) with manual toleranceManual may work: but monitor deprovisioning gaps
Growing teams or compliance requirementsUse Stitchflow: avoid vendor lock-in and get audit trails
Evaluating Basecamp vs competitorsConsider alternatives: Asana and Monday.com offer standard SCIM

The bottom line

Basecamp's provisioning automation only works through Okta's proprietary connector, leaving organizations using other identity providers with manual user management despite paying $299/month flat rate. For teams wanting vendor-neutral provisioning that works with any IdP, Stitchflow provides the missing automation layer.

Make Basecamp workflows AI-native

Basecamp gates SCIM behind Business. We build complete offboarding, user access reviews, and license workflows without that SCIM Tax upgrade.

No Business upgrade required
Less than a week, start to finish (~2 hours of your time)
We maintain the integration layer underneath
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Business

Prerequisites

SSO must be configured first

Key limitations

  • No native SCIM - provisioning via Okta connector only
  • Uses proprietary API via Okta/OneLogin connectors, not SCIM 2.0
  • Check Basecamp docs for other IdP support

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Basecamp → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

Business required for SCIM

Basecamp gates SCIM behind Business. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Unlock SCIM for
Basecamp

Basecamp gates SCIM behind Business plan. We automate complete offboarding and access reviews across your stack without that SCIM Tax upgrade.

See how it works
Admin Console
Directory
Applications
Basecamp logo
Basecamp
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Hive logo

Hive

SCIM Tax

Project Management

SCIM StatusIncluded
Manual Cost$11,754/yr

Hive supports SCIM 2.0 provisioning with Okta, but only after purchasing the Enterprise Security Add-on on top of an Enterprise plan. This means teams on Starter ($5/user/month) or Teams ($12/user/month) plans must upgrade to custom Enterprise pricing plus pay for the Security Add-on—potentially increasing costs by 5-10x just to unlock automated user provisioning. Additionally, ADFS users get SSO but no auto-deprovisioning, creating a manual offboarding burden. For project management platforms like Hive where team composition changes frequently, manual user management becomes a significant administrative burden. Teams launch new projects, contractors join temporarily, and employees shift between initiatives—all requiring manual account creation and cleanup. Without automated provisioning, IT teams spend hours managing Hive accounts that should be handled automatically through your identity provider.

View full guide
Height logo

Height

SCIM Tax

Project Management

SCIM StatusIncluded
Manual Cost$11,754/yr

Height supports SCIM provisioning, but only on its Enterprise plan with custom pricing. While the lower tiers (Free, Team at $6.99/user/month, Business at $11.99/user/month) offer substantial functionality for project management teams, they lack automated user provisioning entirely. This creates a significant gap for IT teams managing user lifecycle in organizations using Height's more affordable plans. The pricing jump from Business to Enterprise represents an unknown cost increase since Height doesn't publish Enterprise pricing. For organizations that need automated provisioning but don't require Enterprise-level features like 5GB storage or 2,500 monthly automations, this forces an expensive upgrade conversation with Height's sales team. Without SCIM on lower tiers, IT teams face manual account management overhead and potential security gaps when employees join, change roles, or leave the organization.

View full guide
Teamwork logo

Teamwork

No SCIM

Project Management

ProvisioningNot Supported
Manual Cost$11,754/yr

Teamwork, the project management platform, does not offer SCIM provisioning on any plan. While Teamwork supports SAML 2.0 SSO through a paid Advanced Security add-on (which requires contacting security@teamwork.com to configure), this only handles authentication, not user lifecycle management. IT teams must manually create, update, and deprovision user accounts in Teamwork—a significant operational burden for organizations managing projects across multiple teams and external collaborators. This creates a substantial gap for IT administrators who need to maintain security and compliance standards. Without automated provisioning, there's no way to ensure users are properly onboarded with correct permissions or immediately deprovisioned when they leave the organization. Given that Teamwork is commonly used with external contractors and clients, manual user management becomes both a security risk and an administrative nightmare as project teams scale.

View full guide