Stitchflow
BigQuery logo

BigQuery SCIM guide

Connector Only

How to automate BigQuery user provisioning, and what it actually costs

Summary and recommendation

Google BigQuery does not provide direct SCIM provisioning capabilities. As a Google Cloud service, BigQuery user management operates through Google Cloud Identity and IAM roles rather than its own provisioning system. While you can provision users to Google Workspace or Google Cloud Identity via SCIM from identity providers like Okta or Entra ID, BigQuery access must then be manually configured through Google Cloud IAM project-level permissions and dataset-specific roles. This creates a two-step provisioning process that leaves gaps in automated lifecycle management.

The indirect provisioning model creates significant operational overhead for data teams. IT admins must first provision users to Google Cloud Identity, then separately manage BigQuery-specific permissions through IAM roles for projects, datasets, and tables. When users change roles or leave the organization, there's no automated way to revoke BigQuery access—it requires manual cleanup across potentially dozens of projects and datasets. For organizations with complex data governance requirements, this manual process creates compliance risks and inconsistent access controls.

The strategic alternative

BigQuery has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolGoogle Cloud Identity (SAML/OIDC)
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaProvision users to Google Cloud Identity/Workspace via SCIM. BigQuery access via IAM roles.
Microsoft Entra IDFederate Entra ID with Google Cloud Identity. SCIM provisioning to Cloud Identity, then IAM for BigQuery.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages BigQuery accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The BigQuery pricing problem

BigQuery gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
StandardPay-per-query and storage
All tiersUsage-based pricing

Provisioning structure

PlanPriceSCIM Support
StandardPay-per-query and storage❌ No direct SCIM
All tiersUsage-based pricing❌ Must use Google Cloud Identity

BigQuery access requires provisioning users to Google Cloud Identity or Google Workspace first, then assigning specific BigQuery IAM roles for dataset and project access.

What this means in practice

Multi-step provisioning process

1. Provision users to Google Cloud Identity/Workspace via SCIM 2. Manually assign Google Cloud IAM roles for BigQuery access 3. Configure dataset-level and table-level permissions separately 4. Manage project-based access controls through Google Cloud Console

Real workflow complexity

Data analysts need different IAM roles than data engineers
Project access must be configured per Google Cloud project
Dataset permissions require separate configuration in BigQuery console
No automated role assignment based on user attributes

Additional constraints

No granular SCIM mapping
Can't automatically assign BigQuery-specific roles during provisioning
Google ecosystem dependency
Must maintain Google Cloud Identity/Workspace licenses
Manual role management
BigQuery IAM roles require hands-on configuration
Project-level complexity
Each Google Cloud project needs separate access management
Limited group provisioning
Google Workspace SCIM only provisions users, not security groups
Audit trail gaps
User lifecycle events split between IdP logs and Google Cloud audit logs

Summary of challenges

  • BigQuery does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What BigQuery actually offers for identity

No Direct SCIM Integration

BigQuery doesn't provide a native SCIM endpoint. As a Google Cloud service, user access is managed through Google Cloud Identity and IAM:

FeatureAvailable?
Direct BigQuery SCIM❌ No
User provisioningVia Google Cloud Identity/Workspace only
Group provisioningVia Google Cloud Identity/Workspace only
Access controlGoogle Cloud IAM roles
SSOVia Google Cloud Identity (SAML/OIDC)

The reality: To provision users for BigQuery, you must: 1. Provision users to Google Cloud Identity or Google Workspace via SCIM 2. Manually assign BigQuery IAM roles and dataset permissions 3. Manage project-level access separately

Google Cloud Identity SCIM Limitations

Even when using Google Cloud Identity's SCIM endpoint, you face significant constraints:

No BigQuery-specific permissions
SCIM only creates users in Cloud Identity
Manual IAM role assignment
BigQuery access requires separate IAM configuration
No dataset-level automation
Table and dataset permissions must be managed outside SCIM
Project complexity
Multi-project BigQuery setups require manual access management per project

Translation: You get basic user creation in Google Cloud Identity, but none of the BigQuery-specific access management that data teams actually need. Dataset permissions, project access, and IAM role assignments remain manual processes.

What IT admins are saying

BigQuery's indirect provisioning model through Google Cloud Identity creates complexity for IT teams managing data analytics access:

  • No direct SCIM endpoint for BigQuery itself - all user management flows through Google Cloud Identity
  • Must provision users to Google Workspace or Cloud Identity first, then assign BigQuery IAM roles separately
  • Dataset and table-level permissions require additional Google Cloud IAM configuration beyond basic user provisioning
  • Project-based access control adds another layer of complexity for cross-functional data teams

BigQuery is a Google Cloud service. User management via Google Cloud IAM and Cloud Identity. No direct SCIM endpoint - provision users to Google Cloud Identity/Workspace instead.

Google Cloud documentation

Must manage via Google Cloud Identity layer

IT administrator on Reddit

The recurring theme

While BigQuery integrates well within the Google ecosystem, IT teams outside of Google Workspace face a multi-step provisioning process - create users in Google Cloud Identity, assign appropriate IAM roles, then configure dataset-specific permissions for each data analyst or scientist.

The decision

Your SituationRecommendation
Small data team (<10 analysts) with basic BigQuery needsManual Google Cloud IAM management is acceptable
Single-project data warehouse with stable teamManual management with Google Workspace SSO
Multi-project enterprise with complex dataset permissionsUse Stitchflow: automate Google Cloud Identity provisioning
Large organization (50+ data users) across multiple teamsUse Stitchflow: automation essential for IAM role management
Compliance-heavy environment requiring audit trailsUse Stitchflow: automated provisioning with full audit logging

The bottom line

BigQuery has no direct SCIM endpoint—all user management flows through Google Cloud Identity and IAM roles. While this works for small teams, enterprise data organizations need automated provisioning to handle the complexity of multi-project access and dataset permissions. Stitchflow eliminates the manual overhead of managing Google Cloud Identity provisioning at scale.

Make BigQuery workflows AI-native

BigQuery has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No direct SCIM endpoint for BigQueryUser provisioning via Google Cloud Identity/WorkspaceAccess controlled through Google Cloud IAM rolesSCIM to Google Workspace limited to users (not groups)

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No direct SCIM endpoint for BigQuery
  • User provisioning via Google Cloud Identity/Workspace
  • Access controlled through Google Cloud IAM roles
  • SCIM to Google Workspace limited to users (not groups)

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Where to enable

Okta Admin Console → Applications → BigQuery → Sign On

Provision users to Google Cloud Identity/Workspace via SCIM. BigQuery access via IAM roles.

Use Stitchflow for automated provisioning.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app

Where to enable

Entra admin center → Enterprise applications → BigQuery → Single sign-on

Federate Entra ID with Google Cloud Identity. SCIM provisioning to Cloud Identity, then IAM for BigQuery.

Use Stitchflow for automated provisioning.

Unlock SCIM for
BigQuery

BigQuery has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
BigQuery logo
BigQuery
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
ActiveCampaign logo

ActiveCampaign

No SCIM

Marketing Automation / Email

ProvisioningNot Supported
Manual Cost$11,754/yr

ActiveCampaign, the marketing automation platform, does not offer native SCIM provisioning on any plan. While the Enterprise plan ($145+/month) includes SAML 2.0 SSO with just-in-time (JIT) provisioning, this only creates user accounts on first login—there's no automated deprovisioning when employees leave or change roles. New SSO users are automatically added to a generic "SSO Users" group with configurable permissions, but IT teams have no way to programmatically manage user lifecycles or enforce granular access controls based on department or role changes. This creates a significant gap for marketing teams that need to manage access to customer data and campaign tools. When employees leave the company or change departments, their ActiveCampaign access must be manually revoked, creating compliance risks and potential data exposure. The lack of automated deprovisioning means former employees could theoretically retain access to sensitive marketing data and customer information until someone manually removes them from the platform.

View full guide
Adyen logo

Adyen

No SCIM

Payments / Fintech

ProvisioningNot Supported
Manual Cost$11,754/yr

Adyen offers SCIM 2.0 provisioning, but only through Okta's integration—there's no native SCIM endpoint. This creates a significant vendor lock-in scenario where your provisioning capabilities are entirely dependent on using Okta as your identity provider. Teams using Azure Entra, Google Workspace, or OneLogin are left with manual user management despite Adyen supporting SAML SSO with these platforms. The Okta integration itself requires maintaining a company account (not just a merchant account) and keeping at least one non-SSO admin for troubleshooting, adding operational complexity. For payment platforms handling sensitive financial data, this provisioning gap creates serious compliance risks. Your finance team, payment operations staff, and developers need timely access to process transactions and manage risk controls, but without automated provisioning, you're stuck with manual onboarding that can delay critical payment operations. The requirement to maintain non-SSO admin accounts also creates a security backdoor that compliance auditors will flag.

View full guide