Stitchflow
Bombora logo

Bombora SCIM guide

Connector Only

How to automate Bombora user provisioning, and what it actually costs

Summary and recommendation

Bombora, the B2B intent data platform serving marketing and sales teams, does not offer SCIM provisioning on any plan. While Bombora provides SAML SSO integration with major identity providers like Okta and Azure AD, this only handles authentication—not the automated provisioning and deprovisioning of user accounts. IT admins must manually create, modify, and remove user access to Bombora's data platform, which is particularly challenging given that marketing teams frequently need access to intent data for campaign planning and account-based marketing initiatives.

This creates a significant operational gap for enterprises using Bombora's services, especially considering the platform's high-value nature (contracts typically range from $25,000-$100,000+ annually) and the sensitive customer intelligence data it provides. Without automated user lifecycle management, organizations face compliance risks when employees change roles or leave the company, as stale accounts with access to competitive intelligence and prospect data may persist. The manual overhead also slows down onboarding for new marketing and sales operations team members who need immediate access to launch campaigns.

The strategic alternative

Bombora has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolUnknown
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaNo SCIM available
Microsoft Entra IDNo SCIM available
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Bombora accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Bombora pricing problem

Bombora gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Basic Surge$25,000-$30,000/year
Enhanced$50,000-$100,000/year
Full Audience$100,000+/year

Pricing and provisioning overview

PlanPriceSSOSCIM
Basic Surge$25,000-$30,000/year
Enhanced$50,000-$100,000/year
Full Audience$100,000+/year

Market data on Bombora costs

Average annual cost
~$57,832
Enterprise contracts required (no monthly billing)
10-20% discount available for multi-year commitments
No free trial period

What this means in practice

Without SCIM provisioning, IT teams must manually manage user accounts for a platform that costs more than many companies' entire SaaS stack. For marketing and sales operations teams who need rapid access to intent data, this creates bottlenecks:

Manual onboarding delays
New marketing hires wait days or weeks for Bombora access while IT creates accounts manually
Offboarding risks
Departing employees retain access to expensive B2B data unless IT remembers to manually revoke licenses
No role-based provisioning
Can't automatically assign different data access levels based on job function (demand gen vs. account-based marketing)

At $57,832 average annual cost, manual mistakes become expensive quickly.

Additional constraints

Limited IdP support
Only Okta and Azure AD documented for SSO; no Google Workspace or OneLogin integration
Vendor dependency
All identity management features require contacting Bombora sales and support
No public documentation
Identity management capabilities must be negotiated during sales process
Integration complexity
B2B data platforms typically require CRM/MAP system coordination that manual provisioning complicates

Summary of challenges

  • Bombora does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Bombora actually offers for identity

SAML SSO (Enterprise only)

Bombora provides basic SAML 2.0 authentication for enterprise customers:

SettingDetails
ProtocolSAML 2.0
Supported IdPsOkta, Entra ID, custom SAML providers
ConfigurationContact Bombora sales team
DocumentationNone publicly available
User requirementManual account creation required

Critical gap: Bombora provides no public documentation for SSO setup or capabilities. All identity management features require direct sales engagement.

Identity Provider Integration Status

IdPSSO SupportProvisioningNotes
Okta✓ SAML❌ NoneListed in Okta Integration Network
Entra ID✓ SAML❌ NoneBasic SAML integration
Google Workspace❌ No❌ NoneNot supported
OneLogin❌ No❌ NoneNot supported

What's Missing

No SCIM provisioning: Bombora offers no automated user lifecycle management. Every user addition, role change, or deactivation requires manual intervention through their platform.

Limited IdP support: Only Okta and Entra ID are documented, leaving Google Workspace and OneLogin users without federated authentication.

No public documentation: Unlike most enterprise SaaS platforms, Bombora provides no publicly available guides for identity integration, forcing IT teams to engage sales for basic technical information.

For B2B intent data teams paying $57,832/year on average, the lack of modern identity management creates operational overhead that scales poorly as marketing and sales teams grow.

What IT admins are saying

Bombora's lack of public documentation on identity management creates uncertainty for IT teams evaluating enterprise authentication options:

The absence of standard identity provider documentation means IT teams must engage in lengthy sales conversations just to understand basic SSO and provisioning capabilities - a barrier that delays evaluation and implementation timelines.

  • No publicly available SCIM provisioning documentation
  • Limited SSO implementation guidance without contacting sales
  • Unclear authentication capabilities for enterprise buyers
  • Opaque integration requirements for B2B intent data access

"Contact vendor for enterprise features" appears consistently across integration directories, indicating Bombora keeps authentication details behind their sales process rather than providing transparent documentation.

The recurring theme

Bombora treats identity management as a black box, forcing IT teams into sales discussions before they can assess whether the platform meets their authentication requirements.

The decision

Your SituationRecommendation
Small marketing team (<10 users) on basic planManual management is acceptable
Stable demand gen team with infrequent changesManual management with SAML SSO where available
Mid-size revenue operations team (20+ users)Use Stitchflow: automation essential for scaling
Enterprise with compliance requirementsUse Stitchflow: automation essential for audit trail
Multi-team B2B organization using intent dataUse Stitchflow: automation strongly recommended

The bottom line

Bombora provides valuable B2B intent data, but lacks any documented SCIM provisioning capabilities or clear SSO implementation guidance. For organizations that need automated user management across their sales and marketing tech stack, Stitchflow eliminates the manual overhead and vendor communication delays.

Make Bombora workflows AI-native

Bombora has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No public SCIM documentation foundNo public SSO documentation foundContact vendor for enterprise features

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No public SCIM documentation found
  • No public SSO documentation found
  • Contact vendor for enterprise features

Documentation not available.

Unlock SCIM for
Bombora

Bombora has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Bombora logo
Bombora
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
ActiveCampaign logo

ActiveCampaign

No SCIM

Marketing Automation / Email

ProvisioningNot Supported
Manual Cost$11,754/yr

ActiveCampaign, the marketing automation platform, does not offer native SCIM provisioning on any plan. While the Enterprise plan ($145+/month) includes SAML 2.0 SSO with just-in-time (JIT) provisioning, this only creates user accounts on first login—there's no automated deprovisioning when employees leave or change roles. New SSO users are automatically added to a generic "SSO Users" group with configurable permissions, but IT teams have no way to programmatically manage user lifecycles or enforce granular access controls based on department or role changes. This creates a significant gap for marketing teams that need to manage access to customer data and campaign tools. When employees leave the company or change departments, their ActiveCampaign access must be manually revoked, creating compliance risks and potential data exposure. The lack of automated deprovisioning means former employees could theoretically retain access to sensitive marketing data and customer information until someone manually removes them from the platform.

View full guide
Adyen logo

Adyen

No SCIM

Payments / Fintech

ProvisioningNot Supported
Manual Cost$11,754/yr

Adyen offers SCIM 2.0 provisioning, but only through Okta's integration—there's no native SCIM endpoint. This creates a significant vendor lock-in scenario where your provisioning capabilities are entirely dependent on using Okta as your identity provider. Teams using Azure Entra, Google Workspace, or OneLogin are left with manual user management despite Adyen supporting SAML SSO with these platforms. The Okta integration itself requires maintaining a company account (not just a merchant account) and keeping at least one non-SSO admin for troubleshooting, adding operational complexity. For payment platforms handling sensitive financial data, this provisioning gap creates serious compliance risks. Your finance team, payment operations staff, and developers need timely access to process transactions and manage risk controls, but without automated provisioning, you're stuck with manual onboarding that can delay critical payment operations. The requirement to maintain non-SSO admin accounts also creates a security backdoor that compliance auditors will flag.

View full guide