Stitchflow
Bitwarden logo

Bitwarden SCIM guide

Native SCIM

How to automate Bitwarden user provisioning, and what it actually costs

Native SCIM requires Teams/Enterprise plan

Summary and recommendation

Bitwarden supports SCIM 2.0 provisioning, but only on Teams ($4/user/month) and Enterprise ($6/user/month) plans. While this pricing is reasonable compared to other password managers, the real challenge lies in Bitwarden's zero-knowledge architecture: SCIM can provision user accounts, but users still need to manually accept vault invitations and set up their encryption keys before gaining access to shared passwords.

This creates a critical security gap. Your identity provider shows users as "provisioned," but they can't actually access company passwords until they complete manual setup steps. When employees leave, SCIM deprovisioning removes their account, but any locally cached vault data remains accessible until they next sync. For security teams managing hundreds of shared credentials, this manual friction undermines the entire purpose of automated provisioning.

The strategic alternative

Stitchflow provides SCIM-level provisioning through resilient browser automation for Bitwarden that works with any plan, including the free tier. Our automation handles the complete user lifecycle, including vault invitation acceptance and proper deprovisioning verification. Flat pricing under $5K/year, regardless of team size.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredEnterprise
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0, OIDC
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Bitwarden accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Bitwarden pricing problem

Bitwarden gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Plan Structure (Billed Monthly)

PlanPriceSSOSCIM
Free$0
Teams$4/user/mo
Enterprise$6/user/mo

Note: Both Teams and Enterprise include full SCIM support. Enterprise adds policy enforcement, event logs, and advanced compliance features.

What this means in practice

Using current list prices (Free → Teams for SCIM access):

Team SizeUpgrade to TeamsUpgrade to Enterprise
50 users$2,400/year$3,600/year
100 users$4,800/year$7,200/year
200 users$9,600/year$14,400/year

Calculation: Teams ($4 × users × 12) or Enterprise ($6 × users × 12)

Additional constraints

Critical security timing
Password vault access requires immediate deprovisioning when employees leave—manual processes create security gaps.
SSO complexity
Zero-knowledge encryption requires Key Connector setup for self-hosted scenarios, demanding significant IT resources.
Directory Connector alternative
Non-SCIM option exists but requires on-premises server and doesn't provide real-time sync.
No per-seat minimum
Unlike some password managers, Bitwarden doesn't enforce seat minimums, but the per-user cost accumulates quickly across large organizations.

Summary of challenges

  • Bitwarden supports SCIM but only at Enterprise tier ($6/user/month)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

Bitwarden doesn't sell SCIM standalone. Starting at Teams tier ($4/user/month), it's bundled with enterprise password management features:

SCIM automated provisioning
SAML/OIDC single sign-on (SSO)
Collections-based access controls
Policy enforcement (password requirements, 2FA)
Event logs and reporting
Vault health reports
Directory Connector (legacy LDAP/AD sync)
Business vault sharing
Advanced 2FA options

Enterprise tier ($6/user/month) adds:

SSO login with Customer Managed Encryption
Account recovery administration
Password reset assistance
Advanced policy controls

Most organizations need these security controls anyway, making the Teams upgrade logical. However, if you're evaluating purely on provisioning capability, roughly 60% of the bundled features are administrative conveniences rather than core identity automation. The real value is SCIM + SSO working together for immediate vault access revocation when employees leave.

What IT admins are saying

Community sentiment on Bitwarden's SCIM implementation is generally positive, but admins highlight specific configuration challenges. Common concerns:

  • SSO setup complexity for maintaining zero-knowledge architecture
  • Key Connector implementation requires significant IT resources for self-hosted deployments
  • Directory Connector as fallback adds another system to maintain
  • Trusted device configuration needed for optimal passwordless experience

The Key Connector setup is more involved than expected - you really need to understand the cryptographic implications before implementing it in production.

Reddit r/sysadmin

SSO with Bitwarden works well once configured, but the zero-knowledge setup isn't as straightforward as other password managers.

Spiceworks Community

The recurring theme

While Bitwarden's SCIM works reliably and pricing is reasonable, the security-first architecture creates configuration complexity that requires careful planning and technical expertise.

The decision

Your SituationRecommendation
On Free tier, need SCIMUse Stitchflow: avoid the $4-6/user/month upgrade
Already on Teams/EnterpriseUse native SCIM: you're paying for it
Need password management for contractors/tempsUse Stitchflow: flexible provisioning without seat commitments
Security team requires instant deprovisioningEither works: both provide immediate vault access revocation
Small team with low turnoverManual may work: but password vault access is high-stakes

The bottom line

Bitwarden includes SCIM starting at $4/user/month on Teams, but many organizations start on the free tier and want provisioning automation before upgrading. For teams that need SCIM without the seat-based commitment, Stitchflow provides managed automation at flat pricing.

Automate Bitwarden without the tier upgrade

Stitchflow delivers SCIM-level provisioning through resilient browser automation, backed by 24/7 human in the loop for Bitwarden at <$5K/year, flat, regardless of team size.

Works alongside or instead of native SCIM
Syncs with your existing IdP (Okta, Entra ID, Google Workspace)
Automates onboarding and offboarding
SOC 2 Type II certified
24/7 human-in-the-loop monitoring
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Enterprise

Prerequisites

SSO must be configured first

Key limitations

  • Teams or Enterprise tier required
  • SSO with trusted devices is advanced feature
  • Key Connector requires significant IT resources
  • Directory Connector as SCIM alternative for legacy systems

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Bitwarden → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

Enterprise required for SCIM

Native SCIM is available on Enterprise. Use Stitchflow if you need provisioning without the tier upgrade.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → Bitwarden → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

Enterprise required for SCIM

Native SCIM is available on Enterprise. Use Stitchflow if you need provisioning without the tier upgrade.

Unlock SCIM for
Bitwarden

Bitwarden gates automation behind Teams/Enterprise plan. Stitchflow delivers the same SCIM outcomes for a flat fee.

See how it works
Admin Console
Directory
Applications
Bitwarden logo
Bitwarden
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Amplitude logo

Amplitude

SCIM Tax

Product Analytics

SCIM StatusIncluded
Manual Cost$11,754/yr

Amplitude supports SCIM provisioning, but only on Growth plans (starting around $36K/year) or Enterprise plans with custom pricing. While Amplitude's SCIM implementation covers the core functionality—creating, updating, and deactivating users—it requires SCIM to be specifically enabled for your organization, and regenerating the SCIM key immediately invalidates existing integrations without warning. For product teams on Plus plans ($49/month), upgrading to Growth just to unlock SCIM means jumping from under $600/year to $36,000+/year—a 60x increase. That's often more than the entire analytics budget for smaller product teams. The gap becomes particularly problematic for cross-functional product teams where analysts, PMs, and engineers need varying levels of access to user behavior data, but manual provisioning creates security risks around sensitive analytics permissions.

View full guide
Bill.com logo

Bill.com

SCIM Tax

Accounts Payable / Receivable Automation

SCIM StatusIncluded
Manual Cost$11,754/yr

Bill.com offers inconsistent SCIM provisioning support that varies dramatically by identity provider. While Okta users can access SCIM provisioning through the OIN integration, Bill.com doesn't publish native SCIM documentation, and other IdPs like Entra ID are limited to SAML SSO only. This fragmented approach means your provisioning capabilities depend entirely on your IdP choice rather than Bill.com's platform features. For finance teams managing sensitive AP/AR workflows where user access directly impacts invoice approvals and payment processing, this inconsistency creates operational gaps—especially when onboarding new controllers, AP clerks, or accountants requires manual role assignment tied to spending limits and approval hierarchies. The real problem is that Bill.com gates all SSO functionality behind Enterprise plans with custom pricing (typically 2-3x their Corporate plan at $79/user/month), yet still provides no clear path to automated provisioning for most customers. Since financial systems require precise role-based access controls for SOX compliance and segregation of duties, manual user management creates both security risks and administrative overhead. When employees change departments or leave the company, orphaned accounts in payment systems pose significant financial and compliance risks that manual processes often miss.

View full guide
Braintree logo

Braintree

SCIM Tax

Payment Processing

SCIM StatusIncluded
Manual Cost$11,754/yr

Braintree supports native SCIM 2.0 provisioning, but only for Enterprise merchants who complete a complex multi-step onboarding process. You must first configure SSO, onboard through their sandbox environment, convert all existing non-SSO users, and then request SCIM enablement. Once enabled, you lose the ability to manage SSO users through Braintree's UI entirely—everything must go through your IdP. The rigid prerequisites create significant friction for payment teams. The sandbox requirement alone adds weeks to deployment timelines, and the all-or-nothing approach to user management means you can't gradually roll out automated provisioning. For organizations processing payments across multiple merchant accounts with complex role hierarchies, this inflexibility becomes a major operational constraint.

View full guide