Stitchflow
Braintree logo

Braintree SCIM guide

Native SCIM

How to automate Braintree user provisioning, and what it actually costs

Native SCIM requires Enterprise plan

Summary and recommendation

Braintree supports native SCIM 2.0 provisioning, but only for Enterprise merchants who complete a complex multi-step onboarding process. You must first configure SSO, onboard through their sandbox environment, convert all existing non-SSO users, and then request SCIM enablement. Once enabled, you lose the ability to manage SSO users through Braintree's UI entirely—everything must go through your IdP.

The rigid prerequisites create significant friction for payment teams. The sandbox requirement alone adds weeks to deployment timelines, and the all-or-nothing approach to user management means you can't gradually roll out automated provisioning. For organizations processing payments across multiple merchant accounts with complex role hierarchies, this inflexibility becomes a major operational constraint.

The strategic alternative

Stitchflow provides SCIM-level provisioning through resilient browser automation for Braintree without the complex prerequisites or sandbox requirements. Works with any Braintree plan and supports gradual rollout strategies. Flat pricing under $5K/year with 24/7 human-in-the-loop support for payment-critical access management.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredEnterprise
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Braintree accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Braintree pricing problem

Braintree gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Plan Structure

PlanPriceSSOSCIM
Standard2.59% + $0.49/transaction
Gateway Only$49/mo + $0.10/transaction
EnterpriseCustom rates (typically $80k+/mo volume)

Note: SCIM is only available to "SSO merchants" on enterprise contracts. Transaction-based pricing means costs scale with payment volume, not user count.

What this means in practice

Unlike seat-based SaaS apps, Braintree's barrier isn't a simple tier upgrade. The prerequisite chain creates significant implementation friction:

Required sequence

1. Negotiate enterprise contract with custom transaction rates 2. Complete full SSO implementation and testing 3. Convert all existing non-SSO users to SSO 4. Set up sandbox environment for SCIM testing 5. Complete sandbox SCIM onboarding 6. Enable production SCIM

Timeline impact: Most implementations take 4-8 weeks due to the mandatory sandbox phase and user conversion requirements.

Additional constraints

SSO prerequisite
Cannot enable SCIM without fully operational SSO. No shortcuts or parallel implementation.
User conversion requirement
All existing non-SSO users must be converted before SCIM activation, creating a coordination challenge for active payment operations.
Sandbox mandates
Production SCIM requires completing full onboarding in Braintree's sandbox environment first, adding weeks to deployment.
Group management limitations
SCIM cannot create or delete merchant account groups—these must be managed manually in Braintree's UI even after SCIM is active.
UI lockout
Once SCIM is enabled, you cannot create or edit SSO users through Braintree's interface, creating dependency on IdP availability.

Summary of challenges

  • Braintree supports SCIM but only at Enterprise tier (custom pricing)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

Braintree doesn't sell SCIM separately. It's bundled with their Enterprise payment processing features, but requires existing SSO setup first:

SCIM 2.0 automated provisioning
SAML single sign-on (SSO) - required prerequisite
Advanced user role management
Merchant account access controls
Enhanced security settings
Priority fraud protection tools
Dedicated account management

The catch: you must already be an "SSO merchant" before SCIM can be enabled, and all existing non-SSO users must be converted first. Plus, you're required to complete sandbox onboarding before production setup.

Stitchflow Insight

If you're already using Braintree Enterprise with SSO configured, adding SCIM makes sense. But if you just want automated user provisioning without the complex prerequisites and sandbox requirements, you're dealing with significant implementation friction. We estimate the SSO prerequisite and mandatory sandbox phase adds 4-6 weeks to most SCIM deployments.

What IT admins are saying

Community sentiment on Braintree's SCIM prerequisites is mixed, with admins appreciating the functionality but frustrated by implementation barriers. Common complaints:

  • Mandatory sandbox onboarding adds weeks to deployment timelines
  • SSO prerequisite creates chicken-and-egg scenarios for new implementations
  • Converting existing non-SSO users before SCIM enablement is tedious
  • Group management limitations force manual role assignments in the UI

The sandbox requirement seems excessive for something as standard as SCIM provisioning. We're already managing production payment systems - we don't need training wheels.

IT Director, Enterprise SaaS

Once SCIM is enabled, you lose the ability to manage SSO users in the Braintree UI entirely. Hope your IdP integration is bulletproof.

Infrastructure Lead, FinTech

The recurring theme

Braintree's SCIM works well but the onboarding process is overly complex, with strict prerequisites that slow enterprise rollouts and create operational dependencies on perfect IdP configuration.

The decision

Your SituationRecommendation
Not Enterprise, need SCIMUse Stitchflow: avoid the Enterprise tier requirement and complex prerequisites
Enterprise tier but complex SSO/sandbox setup feels overwhelmingUse Stitchflow: skip the sandbox onboarding and SSO conversion requirements
Already Enterprise with SSO configuredUse native SCIM: you're paying for it and meet the prerequisites
Need payment processing beyond BraintreeEvaluate competitors: consider if SCIM access is worth the Enterprise commitment
Small payment team, low user churnManual may work: but monitor for security gaps in financial access

The bottom line

Braintree's SCIM requires Enterprise tier plus a complex prerequisite chain (SSO setup, sandbox onboarding, user conversion). For payment teams that need provisioning automation without the tier upgrade and setup complexity, Stitchflow eliminates the friction.

Automate Braintree without the tier upgrade

Stitchflow delivers SCIM-level provisioning through resilient browser automation, backed by 24/7 human in the loop for Braintree at <$5K/year, flat, regardless of team size.

Works alongside or instead of native SCIM
Syncs with your existing IdP (Okta, Entra ID, Google Workspace)
Automates onboarding and offboarding
SOC 2 Type II certified
24/7 human-in-the-loop monitoring
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Enterprise

Prerequisites

SSO must be configured first

Key limitations

  • SSO must be configured before SCIM
  • Sandbox onboarding REQUIRED before production
  • All non-SSO users must be converted before SCIM enablement
  • Cannot create/delete groups via SCIM (roles/merchant accounts managed in UI)
  • Once SCIM enabled, cannot create/edit SSO users in Braintree UI

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Braintree → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

Enterprise required for SCIM

Native SCIM is available on Enterprise. Use Stitchflow if you need provisioning without the tier upgrade.

Unlock SCIM for
Braintree

Braintree gates automation behind Enterprise plan. Stitchflow delivers the same SCIM outcomes for a flat fee.

See how it works
Admin Console
Directory
Applications
Braintree logo
Braintree
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Amplitude logo

Amplitude

SCIM Tax

Product Analytics

SCIM StatusIncluded
Manual Cost$11,754/yr

Amplitude supports SCIM provisioning, but only on Growth plans (starting around $36K/year) or Enterprise plans with custom pricing. While Amplitude's SCIM implementation covers the core functionality—creating, updating, and deactivating users—it requires SCIM to be specifically enabled for your organization, and regenerating the SCIM key immediately invalidates existing integrations without warning. For product teams on Plus plans ($49/month), upgrading to Growth just to unlock SCIM means jumping from under $600/year to $36,000+/year—a 60x increase. That's often more than the entire analytics budget for smaller product teams. The gap becomes particularly problematic for cross-functional product teams where analysts, PMs, and engineers need varying levels of access to user behavior data, but manual provisioning creates security risks around sensitive analytics permissions.

View full guide
Bill.com logo

Bill.com

SCIM Tax

Accounts Payable / Receivable Automation

SCIM StatusIncluded
Manual Cost$11,754/yr

Bill.com offers inconsistent SCIM provisioning support that varies dramatically by identity provider. While Okta users can access SCIM provisioning through the OIN integration, Bill.com doesn't publish native SCIM documentation, and other IdPs like Entra ID are limited to SAML SSO only. This fragmented approach means your provisioning capabilities depend entirely on your IdP choice rather than Bill.com's platform features. For finance teams managing sensitive AP/AR workflows where user access directly impacts invoice approvals and payment processing, this inconsistency creates operational gaps—especially when onboarding new controllers, AP clerks, or accountants requires manual role assignment tied to spending limits and approval hierarchies. The real problem is that Bill.com gates all SSO functionality behind Enterprise plans with custom pricing (typically 2-3x their Corporate plan at $79/user/month), yet still provides no clear path to automated provisioning for most customers. Since financial systems require precise role-based access controls for SOX compliance and segregation of duties, manual user management creates both security risks and administrative overhead. When employees change departments or leave the company, orphaned accounts in payment systems pose significant financial and compliance risks that manual processes often miss.

View full guide
Bitwarden logo

Bitwarden

SCIM Tax

Password Manager / Secrets Management

SCIM StatusIncluded
Manual Cost$11,754/yr

Bitwarden supports SCIM 2.0 provisioning, but only on Teams ($4/user/month) and Enterprise ($6/user/month) plans. While this pricing is reasonable compared to other password managers, the real challenge lies in Bitwarden's zero-knowledge architecture: SCIM can provision user accounts, but users still need to manually accept vault invitations and set up their encryption keys before gaining access to shared passwords. This creates a critical security gap. Your identity provider shows users as "provisioned," but they can't actually access company passwords until they complete manual setup steps. When employees leave, SCIM deprovisioning removes their account, but any locally cached vault data remains accessible until they next sync. For security teams managing hundreds of shared credentials, this manual friction undermines the entire purpose of automated provisioning.

View full guide