Stitchflow
BetterUp logo

BetterUp SCIM guide

Connector Only

How to automate BetterUp user provisioning, and what it actually costs

Summary and recommendation

BetterUp, the enterprise coaching platform, does not support SCIM provisioning on any plan. While BetterUp offers SAML 2.0 SSO integration with major identity providers including Okta, Azure AD, ADFS, and Google Apps, this only handles authentication—not user lifecycle management. Users must be provisioned manually through BetterUp's admin interface or potentially through HR system integrations, creating a significant gap for IT teams managing employee coaching access.

This manual provisioning requirement becomes particularly problematic given BetterUp's enterprise coaching model, where access needs to align with HR decisions around employee development programs. Without automated provisioning, IT teams face ongoing administrative overhead when employees join coaching programs, change roles, or leave the company. The lack of SCIM support also creates compliance risks, as there's no automated way to ensure coaching platform access reflects current employment status or development program eligibility.

The strategic alternative

BetterUp has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaSupports SAML 2.0 SSO with Okta, ADFS, Azure, and Google Apps. SSO setup via self-service tool or guided support. No automated provisioning.
Microsoft Entra IDMicrosoft 365 App Certification for Teams. SAML 2.0 SSO supported. No automated SCIM provisioning in Entra gallery.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages BetterUp accounts manually. Here's what that costs:

Source: Stitchflow research, normalized to 500 employees:
Orphaned accounts (ex-employees with access)5
Unused licenses12
IT hours spent on manual management/year85 hours
Unused license cost/year$3,500
IT labor cost/year$5,100
Cost of compliance misses/year$890
Total annual financial impact$9,490

The BetterUp pricing problem

BetterUp gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Individual Intro$89/session (1/month)
Individual Plus$149 (2 sessions/month)
Individual Premium$279 (4 sessions/month)
EnterpriseCustom (~$499/month)

Pricing and provisioning overview

PlanPriceSSOSCIM
Individual Intro$89/session (1/month)
Individual Plus$149 (2 sessions/month)
Individual Premium$279 (4 sessions/month)
EnterpriseCustom (~$499/month)

Enterprise pricing details

Customized based on company size and employee count
Quarterly, bi-annual, and annual subscription options
Rumored base cost around $499/month per employee for coaching access

What this means in practice

Without SCIM provisioning, IT teams face several operational challenges:

Manual user lifecycle management

New hires must be manually added to BetterUp coaching programs
Employee departures require manual account deactivation
Role changes (manager promotions, department transfers) need manual coaching access updates

HR system dependency

Organizations must build custom integrations between HRIS and BetterUp
Changes in employee coaching eligibility require cross-system coordination
No automated sync for organizational structure changes

Enterprise SSO limitations

SAML 2.0 SSO available but requires Enterprise tier
Users must exist in BetterUp before SSO authentication works
No just-in-time (JIT) provisioning capability

Additional constraints

Per-employee licensing model
Coaching access typically priced per participating employee, not per seat
HR workflow dependency
Coaching program enrollment often tied to performance reviews, career development plans
Custom onboarding process
BetterUp requires guided setup and coach matching, complicating automated provisioning
No API documentation
Limited technical resources for building custom provisioning workflows

Summary of challenges

  • BetterUp does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What BetterUp actually offers for identity

SAML SSO (Enterprise tier required)

BetterUp provides SAML 2.0 single sign-on integration with major identity providers:

SettingDetails
ProtocolSAML 2.0
Supported IdPsOkta, ADFS, Azure AD, Google Apps
ConfigurationSelf-service setup tool or guided support
User requirementManual provisioning required before SSO access

Key limitation: BetterUp's SSO implementation requires manual user provisioning. Each employee must be added to BetterUp separately before they can authenticate via SAML.

Microsoft 365 Integration

BetterUp maintains Microsoft 365 App Certification for Teams integration:

FeatureDetails
Teams integration✓ Native app available
SAML SSO✓ Supported via Azure AD
User provisioning❌ Manual only
Group sync❌ Not supported

What's missing entirely

SCIM provisioning
No automated user lifecycle management
Group synchronization
Cannot sync organizational structures or teams
Real-time deprovisioning
Departing employees must be manually removed
Attribute mapping
No way to sync employee metadata or coaching preferences

Bottom line: BetterUp's Enterprise tier gets you SAML SSO but leaves you managing user accounts manually. For a coaching platform where employee participation drives ROI, manual provisioning creates significant operational overhead and delays in onboarding new team members.

What IT admins are saying

BetterUp's lack of automated provisioning creates significant administrative overhead for IT teams managing enterprise coaching programs:

  • Manual user provisioning required despite SSO - accounts must be created individually in BetterUp
  • No SCIM support means user lifecycle management happens outside the IdP workflow
  • Enterprise-only pricing creates budget pressure while still requiring manual account management
  • HR system integrations exist but don't eliminate the need for IT involvement in user setup

Even with SAML SSO configured, we still have to manually provision every employee who needs coaching access. It defeats the purpose of having an automated identity management system.

IT Director, Fortune 500 company

The enterprise pricing is steep enough, but then you're still doing manual user management like it's 2015. For a platform targeting large organizations, the lack of SCIM is surprising.

Systems Administrator, Reddit r/sysadmin

The recurring theme

BetterUp positions itself as an enterprise coaching platform but lacks the automated provisioning capabilities that enterprise IT teams expect, creating ongoing manual work even after expensive enterprise licensing.

The decision

Your SituationRecommendation
Small coaching program (<25 employees)Manual management acceptable for Enterprise plan
HR system with BetterUp integrationLeverage existing HR sync, add SSO for authentication
Large enterprise coaching rollout (100+ employees)Use Stitchflow: automation essential for scale
Multiple coaching programs across business unitsUse Stitchflow: centralized provisioning prevents access gaps
Compliance-heavy industry with audit requirementsUse Stitchflow: automated audit trail and access reviews

The bottom line

BetterUp delivers enterprise coaching but offers zero provisioning automation—even on Enterprise plans starting at ~$499/month per user. For organizations deploying coaching at scale, manual user management creates operational overhead and compliance gaps. Stitchflow provides the SCIM-level automation BetterUp should have built natively.

Make BetterUp workflows AI-native

BetterUp has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No native SCIM provisioning supportSSO via SAML 2.0 only - supports Okta, ADFS, Azure, Google AppsUsers must be provisioned manually or via HR system integrationEnterprise coaching platform - licensing typically per-employee

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No native SCIM provisioning support
  • SSO via SAML 2.0 only - supports Okta, ADFS, Azure, Google Apps
  • Users must be provisioned manually or via HR system integration
  • Enterprise coaching platform - licensing typically per-employee

Documentation not available.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app

Where to enable

Entra admin center → Enterprise applications → BetterUp → Single sign-on

Microsoft 365 App Certification for Teams. SAML 2.0 SSO supported. No automated SCIM provisioning in Entra gallery.

Use Stitchflow for automated provisioning.

Unlock SCIM for
BetterUp

BetterUp has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
BetterUp logo
BetterUp
via Stitchflow

Last updated: 2026-01-20

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Abnormal Security logo

Abnormal Security

No SCIM

Security / Email Security

ProvisioningNot Supported
Manual Cost$9,490/yr

Abnormal Security, the AI-powered email security platform protecting against BEC and phishing attacks, does not offer SCIM provisioning on any plan. While the platform supports SAML 2.0 SSO integration with identity providers like Okta and Entra ID, this only handles authentication—not automated user lifecycle management. Security teams must manually provision and deprovision analyst access through Abnormal's portal, creating operational overhead and potential security gaps in a platform specifically designed to protect against email-based threats. This manual provisioning model creates significant challenges for security operations. When new SOC analysts join or existing team members change roles, IT admins must coordinate manual account creation and permission updates in Abnormal Security. For a platform that's critical to threat detection and incident response, delays in provisioning can leave security gaps, while delayed deprovisioning creates compliance risks. The irony is stark: a security platform designed to prevent account takeover and credential abuse lacks the automated provisioning controls that prevent exactly these risks.

View full guide
Airwallex logo

Airwallex

No SCIM
ProvisioningNot Supported
Manual Cost$9,490/yr

Airwallex, the global payments and treasury platform, offers no SCIM provisioning support on any plan, including their custom Accelerate enterprise tier. Despite being positioned for enterprise use with features like multi-entity management and advanced treasury controls, Airwallex lacks any official identity provider integrations—no SSO, no provisioning, and no presence in major IdP galleries like Okta's OIN or Microsoft Entra. This creates a significant operational burden for IT teams managing financial access across growing organizations, where manual user provisioning and deprovisioning in a payments platform presents both efficiency and security risks. The absence of identity management capabilities means IT administrators must manually create, update, and remove user accounts in Airwallex—a particularly concerning gap given that this platform handles sensitive financial operations, cross-border payments, and treasury management. Without automated deprovisioning, former employees could retain access to financial systems, creating compliance risks and potential security vulnerabilities that most finance and IT teams cannot afford to overlook.

View full guide
Alkami logo

Alkami

No SCIM
ProvisioningNot Supported
Manual Cost$9,490/yr

Alkami, the digital banking platform used by banks and credit unions, does not offer SCIM provisioning or public SSO integrations. As an enterprise-only platform with custom pricing, Alkami appears to handle user management through direct account administration rather than standardized identity protocols. This creates significant challenges for financial institutions that need to integrate Alkami with their existing identity infrastructure—particularly problematic given the compliance requirements and security standards that banks must maintain. The lack of automated provisioning means IT teams at financial institutions must manually create, update, and deprovision user accounts in Alkami. For a platform handling sensitive financial data and customer information, this manual approach introduces compliance risks and operational overhead. Banks typically require seamless integration between their core identity systems and all applications accessing customer data.

View full guide