Stitchflow
Checkmarx logo

Checkmarx SCIM guide

Connector Only

How to automate Checkmarx user provisioning, and what it actually costs

Summary and recommendation

Checkmarx One, the application security testing platform that combines SAST, SCA, and secrets detection, does not offer SCIM provisioning on any plan. While Checkmarx supports SAML 2.0 and OIDC SSO integration with identity providers like Okta and Entra ID, this only handles authentication—not automated user lifecycle management. For security teams managing access to projects, scan results, and security findings across multiple development teams, this creates a significant operational gap. Manual user provisioning becomes particularly problematic when developers need rapid access to scan results for vulnerability remediation, or when security engineers require immediate visibility into findings across different projects.

The absence of SCIM automation forces security teams into a reactive posture: developers request access, wait for manual provisioning, and security workflows get delayed. Given Checkmarx's enterprise pricing (~$67K-70K annually), customers expect enterprise-grade automation that matches their investment. The platform's complex project-based access controls make manual provisioning error-prone, potentially creating compliance risks when developers retain access to projects they no longer work on.

The strategic alternative

Checkmarx has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0, OIDC
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaNo SCIM available
Microsoft Entra IDNo SCIM available
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Checkmarx accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Checkmarx pricing problem

Checkmarx gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Enterprise~$67K-70K/year

Pricing and provisioning availability

PlanPricingSCIMSSO
Enterprise~$67K-70K/year❌ Not documented✓ SAML/OIDC

Market data on Checkmarx costs

Pricing based on applications, lines of code, or developers
Enterprise contracts typically $67K-70K annually
On-premises and cloud pricing similar
Generally considered expensive in the SAST/SCA space

What this means in practice

Without SCIM support, IT administrators must:

Manually create accounts
for each security engineer, developer, and DevSecOps team member
Handle project access
through Checkmarx's internal role management system
Remove access manually
when team members leave or change roles
Rely on JIT provisioning
which only creates basic user accounts without proper project assignments

For security teams that need granular access control to scan results, code analysis, and security findings, this manual approach becomes unmanageable at scale.

Additional constraints

Complex multi-product setup
Different Checkmarx products (SAST, SCA, One platform) may require separate configurations
No IdP group mapping
Cannot automatically assign users to security projects based on Active Directory/Okta groups
Expensive licensing model
Per-product, per-user, or per-engine pricing makes scaling costly
Limited automation options
No documented APIs for bulk user management or role assignments

Summary of challenges

  • Checkmarx does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Checkmarx actually offers for identity

SAML SSO (Enterprise-level)

Checkmarx One supports federated authentication through its Access Control system:

SettingDetails
ProtocolSAML 2.0, OpenID Connect
Supported IdPsOkta, Azure AD, OneLogin, CyberArk, generic SAML
ConfigurationConfigure through Access Control portal
User provisioningJust-in-time (JIT) provisioning supported

The authentication works, but user management is manual. While JIT provisioning can create accounts on first login, there's no automated way to assign users to specific projects, configure scan permissions, or manage security finding visibility.

What's missing: SCIM provisioning

Checkmarx's documentation makes no mention of SCIM support across any of their products:

FeatureSupported?
SAML SSO✓ Yes
OIDC SSO✓ Yes
Create usersManual/JIT only
Update user attributes❌ No automation
Deactivate users❌ Manual only
Group/role assignment❌ Manual only
Project access control❌ Manual only

Why this matters for security teams: Application security platforms like Checkmarx require granular access control. Security engineers need different project access than developers, and different scan result visibility than security analysts. Without SCIM, IT teams must manually configure every user's project assignments and permission levels.

The enterprise pricing reality: At ~$67K-70K annually for enterprise features, you're paying premium prices but still handling user lifecycle management manually through their web interface.

What IT admins are saying

Community sentiment on Checkmarx's provisioning capabilities highlights significant gaps for enterprise IT teams:

  • No SCIM documentation found - Manual user provisioning required across all Checkmarx products
  • Complex multi-product SSO setup - Different configurations needed for SAST, SCA, and Checkmarx One
  • Expensive licensing model - Per-application, per-developer, or per-engine pricing that scales costs quickly
  • Slow performance issues - Security scan speeds impact developer workflow integration

SCIM provisioning not documented

Multiple integration sources confirm this limitation

Different products (SAST, SCA, One) may have different configs

IT teams report inconsistent setup requirements across the Checkmarx suite

The recurring theme

Despite enterprise-grade pricing (~$67K-70K annually), IT teams must manually provision users and navigate complex SSO configurations across multiple Checkmarx products, creating operational overhead that doesn't match the premium cost.

The decision

Your SituationRecommendation
Small security team (<10 users) with stable membershipManual management with SAML SSO is workable
DevSecOps teams with frequent contractor onboardingUse Stitchflow: automation essential for security compliance
Enterprise security programs (25+ users)Use Stitchflow: automation strongly recommended
Multi-product Checkmarx deployment (SAST + SCA + One)Use Stitchflow: complex access patterns require automation
Organizations with strict audit requirementsUse Stitchflow: automated provisioning audit trails are mandatory

The bottom line

Checkmarx One is a comprehensive application security platform, but it lacks documented SCIM provisioning capabilities despite enterprise-level pricing starting around $67K-70K annually. For security teams that need automated user lifecycle management across Checkmarx's complex product suite, Stitchflow provides the missing provisioning automation at a fraction of the platform cost.

Make Checkmarx workflows AI-native

Checkmarx has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

SCIM provisioning not documentedSAML and OIDC SSO supported via Access ControlDifferent products (SAST, SCA, One) may have different configsLicensing per product/user/engine can make scaling expensive

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • SCIM provisioning not documented
  • SAML and OIDC SSO supported via Access Control
  • Different products (SAST, SCA, One) may have different configs
  • Licensing per product/user/engine can make scaling expensive

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Checkmarx → Sign On

Enterprise required for SCIM

Use Stitchflow for automated provisioning.

Unlock SCIM for
Checkmarx

Checkmarx has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Checkmarx logo
Checkmarx
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
Aha! logo

Aha!

No SCIM

Product Management / Roadmapping

ProvisioningNot Supported
Manual Cost$11,754/yr

Aha! Roadmaps, the product roadmapping platform, does not support SCIM provisioning on any plan. While Aha! offers SAML 2.0 SSO integration with identity providers like Okta, Entra ID, and OneLogin, this only handles authentication through JIT (Just-In-Time) provisioning. The critical limitation: JIT provisioning creates user accounts with no default role or access permissions, requiring administrators to manually configure access for each user after they first sign in. For product teams managing strategic roadmaps and stakeholder access, this creates significant operational overhead. Since product roadmaps contain sensitive strategic information and stakeholder access typically varies by product area, IT administrators must manually assign appropriate roles and workspace permissions after each user is provisioned. There's no automatic deprovisioning when users leave the organization, creating potential security gaps. This manual process becomes particularly problematic for larger product organizations where dozens of stakeholders across different business units need carefully managed access to specific roadmaps.

View full guide
Appcues logo

Appcues

No SCIM

Product Adoption / User Onboarding

ProvisioningNot Supported
Manual Cost$11,754/yr

Appcues, the product adoption platform used by product managers and growth teams, explicitly does not support SCIM provisioning on any plan—not even Enterprise. While Appcues offers SAML 2.0 SSO integration starting at the Enterprise tier with just-in-time (JIT) provisioning, this only creates users during first login and provides no automated deprovisioning capabilities. For product teams where access needs change frequently as people move between projects or leave the company, this creates a significant security gap. The lack of SCIM means IT teams must manually manage user lifecycle for Appcues accounts, even though the platform handles sensitive product analytics and user flow data. When employees leave or change roles, their Appcues access remains active until manually revoked—a compliance risk that's particularly problematic given Appcues' role in tracking user behavior and product metrics. With MAU-based pricing starting at $300/month and scaling significantly with usage, paying for orphaned accounts also creates unnecessary cost bloat.

View full guide