Stitchflow
Building Engines logo

Building Engines SCIM guide

Connector Only

How to automate Building Engines user provisioning, and what it actually costs

Summary and recommendation

Building Engines, the comprehensive facility management platform now owned by JLL Technologies, does not support SCIM provisioning on any plan. Despite offering Enterprise-tier features and SOC 2 Type II certification through their Prism platform, Building Engines requires manual user management even for their highest-tier Enterprise customers with custom pricing. This creates a significant operational burden for IT teams managing facility operations staff, contractors, and building occupants who need access to work orders, maintenance requests, and facility data.

The lack of automated provisioning is particularly problematic in facility management scenarios where user populations are dynamic—contractors come and go, tenants change, and facility staff turnover requires rapid access adjustments. Manual provisioning delays can impact critical facility operations, and the absence of automated deprovisioning creates security risks when personnel no longer need access to sensitive building systems and data.

The strategic alternative

Building Engines has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaVia third-partyNo Okta OIN integration found
Microsoft Entra IDVia third-partyNo Microsoft Entra integration documentation found
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Building Engines accounts manually. Here's what that costs:

Source: Stitchflow research, normalized to 500 employees:
Orphaned accounts (ex-employees with access)5
Unused licenses12
IT hours spent on manual management/year85 hours
Unused license cost/year$3,500
IT labor cost/year$5,100
Cost of compliance misses/year$890
Total annual financial impact$9,490

The Building Engines pricing problem

Building Engines gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
EnterpriseCustom quote

Pricing and provisioning structure

PlanPricingSCIMSSO
EnterpriseCustom quote❌ Not availableUnknown

Key constraints

All pricing requires custom quotes through JLL Technologies sales
No public SCIM documentation or API references
Platform integration now managed under JLL's broader technology stack

What this means in practice

Without SCIM or documented APIs, Building Engines user management is entirely manual:

New hires
IT must manually create accounts or request account creation through support
Role changes
Property assignments and permissions require manual updates
Offboarding
Former employees retain access until manually removed
Bulk operations
No way to provision multiple users simultaneously

For property management companies with seasonal staff or frequent role changes, this creates significant administrative overhead and security risks.

Additional constraints

JLL Technologies acquisition
Building Engines is now part of a larger enterprise platform, potentially complicating integration roadmaps
SOC 2 compliance
While the Prism platform maintains SOC 2 Type II certification, manual provisioning creates audit trail gaps
Custom enterprise sales
All implementation discussions require going through JLL's enterprise sales process
Limited documentation
No public API or integration documentation available for evaluation

Summary of challenges

  • Building Engines does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Building Engines actually offers for identity

No Native SCIM or SSO

Building Engines (now part of JLL Technologies) does not offer any native identity management features:

FeatureSupported?
SAML SSO❌ No
OIDC SSO❌ No
SCIM provisioning❌ No
API-based provisioning❌ No
Okta integration❌ No
Entra integration❌ No

Enterprise Pricing Without Identity Features

Building Engines operates on a custom Enterprise pricing model, but this upgrade includes:

Advanced property management features
Custom reporting and analytics
Priority support
SOC 2 Type II certified platform (Prism)

What's missing: Despite Enterprise-level pricing, there are no automated user provisioning or SSO capabilities. IT teams must manually manage all user accounts, passwords, and access permissions.

The Manual Reality

Without native identity features, Building Engines requires:

Manual user creation for each new employee
Individual password management and resets
Manual access reviews and deprovisioning
No centralized visibility into user access

This creates significant administrative overhead and security risks, especially for organizations managing multiple properties and large teams.

What IT admins are saying

Building Engines's lack of automated provisioning creates significant overhead for IT teams managing property management software access:

  • Manual user creation required for every new employee across properties
  • No integration with identity providers despite enterprise-level pricing
  • Difficult to maintain consistent access controls across multiple building portfolios
  • Time-consuming offboarding process when staff leave or change roles

We're paying enterprise prices but still doing everything manually. Every new property manager or maintenance tech has to be set up by hand.

IT Director, Commercial Real Estate Company

Building Engines has all the security certifications but none of the modern provisioning features. It's 2024 and we're still managing users like it's 2014.

Systems Administrator, Property Management Firm

The recurring theme

Despite custom enterprise pricing and SOC 2 certification, Building Engines lacks the automated provisioning capabilities that IT teams expect from modern SaaS platforms, creating manual overhead that scales poorly with organization growth.

The decision

Your SituationRecommendation
Small property management team (<10 users)Manual management may be sufficient
Growing property portfolio with frequent staff changesUse Stitchflow: automation essential for scaling
Enterprise property management (50+ users)Use Stitchflow: automation required for efficiency
Multi-location operations with distributed teamsUse Stitchflow: centralized provisioning critical
JLL or enterprise client with compliance requirementsUse Stitchflow: automated audit trail necessary

The bottom line

Building Engines offers robust property management capabilities through JLL's enterprise platform, but provides no SCIM support or automated provisioning. With custom enterprise pricing and manual user management, scaling access becomes a significant operational burden. For property management organizations that need provisioning automation, Stitchflow delivers the missing piece.

Make Building Engines workflows AI-native

Building Engines has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No public SCIM documentation availableNow part of JLL Technologies (JLLT)Prism platform is SOC 2 Type II certifiedCustom enterprise pricing model

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No public SCIM documentation available
  • Now part of JLL Technologies (JLLT)
  • Prism platform is SOC 2 Type II certified
  • Custom enterprise pricing model

Documentation not available.

Unlock SCIM for
Building Engines

Building Engines has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Building Engines logo
Building Engines
via Stitchflow

Last updated: 2026-01-20

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Abnormal Security logo

Abnormal Security

No SCIM

Security / Email Security

ProvisioningNot Supported
Manual Cost$9,490/yr

Abnormal Security, the AI-powered email security platform protecting against BEC and phishing attacks, does not offer SCIM provisioning on any plan. While the platform supports SAML 2.0 SSO integration with identity providers like Okta and Entra ID, this only handles authentication—not automated user lifecycle management. Security teams must manually provision and deprovision analyst access through Abnormal's portal, creating operational overhead and potential security gaps in a platform specifically designed to protect against email-based threats. This manual provisioning model creates significant challenges for security operations. When new SOC analysts join or existing team members change roles, IT admins must coordinate manual account creation and permission updates in Abnormal Security. For a platform that's critical to threat detection and incident response, delays in provisioning can leave security gaps, while delayed deprovisioning creates compliance risks. The irony is stark: a security platform designed to prevent account takeover and credential abuse lacks the automated provisioning controls that prevent exactly these risks.

View full guide
Airwallex logo

Airwallex

No SCIM
ProvisioningNot Supported
Manual Cost$9,490/yr

Airwallex, the global payments and treasury platform, offers no SCIM provisioning support on any plan, including their custom Accelerate enterprise tier. Despite being positioned for enterprise use with features like multi-entity management and advanced treasury controls, Airwallex lacks any official identity provider integrations—no SSO, no provisioning, and no presence in major IdP galleries like Okta's OIN or Microsoft Entra. This creates a significant operational burden for IT teams managing financial access across growing organizations, where manual user provisioning and deprovisioning in a payments platform presents both efficiency and security risks. The absence of identity management capabilities means IT administrators must manually create, update, and remove user accounts in Airwallex—a particularly concerning gap given that this platform handles sensitive financial operations, cross-border payments, and treasury management. Without automated deprovisioning, former employees could retain access to financial systems, creating compliance risks and potential security vulnerabilities that most finance and IT teams cannot afford to overlook.

View full guide
Alkami logo

Alkami

No SCIM
ProvisioningNot Supported
Manual Cost$9,490/yr

Alkami, the digital banking platform used by banks and credit unions, does not offer SCIM provisioning or public SSO integrations. As an enterprise-only platform with custom pricing, Alkami appears to handle user management through direct account administration rather than standardized identity protocols. This creates significant challenges for financial institutions that need to integrate Alkami with their existing identity infrastructure—particularly problematic given the compliance requirements and security standards that banks must maintain. The lack of automated provisioning means IT teams at financial institutions must manually create, update, and deprovision user accounts in Alkami. For a platform handling sensitive financial data and customer information, this manual approach introduces compliance risks and operational overhead. Banks typically require seamless integration between their core identity systems and all applications accessing customer data.

View full guide