Summary and recommendation
Checkmarx One, the application security testing platform that combines SAST, SCA, and secrets detection, does not offer SCIM provisioning on any plan. While Checkmarx supports SAML 2.0 and OIDC SSO integration with identity providers like Okta and Entra ID, this only handles authentication—not automated user lifecycle management. For security teams managing access to projects, scan results, and security findings across multiple development teams, this creates a significant operational gap. Manual user provisioning becomes particularly problematic when developers need rapid access to scan results for vulnerability remediation, or when security engineers require immediate visibility into findings across different projects.
The absence of SCIM automation forces security teams into a reactive posture: developers request access, wait for manual provisioning, and security workflows get delayed. Given Checkmarx's enterprise pricing (~$67K-70K annually), customers expect enterprise-grade automation that matches their investment. The platform's complex project-based access controls make manual provisioning error-prone, potentially creating compliance risks when developers retain access to projects they no longer work on.
The strategic alternative
Checkmarx has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | Yes |
| SSO available? | Yes |
| SSO protocol | SAML 2.0, OIDC |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | ✓ | ❌ | No SCIM available |
| Microsoft Entra ID | ✓ | ❌ | No SCIM available |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages Checkmarx accounts manually. Here's what that costs:
The Checkmarx pricing problem
Checkmarx gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Enterprise | ~$67K-70K/year |
Pricing and provisioning availability
| Plan | Pricing | SCIM | SSO |
|---|---|---|---|
| Enterprise | ~$67K-70K/year | ❌ Not documented | ✓ SAML/OIDC |
Market data on Checkmarx costs
What this means in practice
Without SCIM support, IT administrators must:
For security teams that need granular access control to scan results, code analysis, and security findings, this manual approach becomes unmanageable at scale.
Additional constraints
Summary of challenges
- Checkmarx does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What Checkmarx actually offers for identity
SAML SSO (Enterprise-level)
Checkmarx One supports federated authentication through its Access Control system:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0, OpenID Connect |
| Supported IdPs | Okta, Azure AD, OneLogin, CyberArk, generic SAML |
| Configuration | Configure through Access Control portal |
| User provisioning | Just-in-time (JIT) provisioning supported |
The authentication works, but user management is manual. While JIT provisioning can create accounts on first login, there's no automated way to assign users to specific projects, configure scan permissions, or manage security finding visibility.
What's missing: SCIM provisioning
Checkmarx's documentation makes no mention of SCIM support across any of their products:
| Feature | Supported? |
|---|---|
| SAML SSO | ✓ Yes |
| OIDC SSO | ✓ Yes |
| Create users | Manual/JIT only |
| Update user attributes | ❌ No automation |
| Deactivate users | ❌ Manual only |
| Group/role assignment | ❌ Manual only |
| Project access control | ❌ Manual only |
Why this matters for security teams: Application security platforms like Checkmarx require granular access control. Security engineers need different project access than developers, and different scan result visibility than security analysts. Without SCIM, IT teams must manually configure every user's project assignments and permission levels.
The enterprise pricing reality: At ~$67K-70K annually for enterprise features, you're paying premium prices but still handling user lifecycle management manually through their web interface.
What IT admins are saying
Community sentiment on Checkmarx's provisioning capabilities highlights significant gaps for enterprise IT teams:
- No SCIM documentation found - Manual user provisioning required across all Checkmarx products
- Complex multi-product SSO setup - Different configurations needed for SAST, SCA, and Checkmarx One
- Expensive licensing model - Per-application, per-developer, or per-engine pricing that scales costs quickly
- Slow performance issues - Security scan speeds impact developer workflow integration
SCIM provisioning not documented
Different products (SAST, SCA, One) may have different configs
The recurring theme
Despite enterprise-grade pricing (~$67K-70K annually), IT teams must manually provision users and navigate complex SSO configurations across multiple Checkmarx products, creating operational overhead that doesn't match the premium cost.
The decision
| Your Situation | Recommendation |
|---|---|
| Small security team (<10 users) with stable membership | Manual management with SAML SSO is workable |
| DevSecOps teams with frequent contractor onboarding | Use Stitchflow: automation essential for security compliance |
| Enterprise security programs (25+ users) | Use Stitchflow: automation strongly recommended |
| Multi-product Checkmarx deployment (SAST + SCA + One) | Use Stitchflow: complex access patterns require automation |
| Organizations with strict audit requirements | Use Stitchflow: automated provisioning audit trails are mandatory |
The bottom line
Checkmarx One is a comprehensive application security platform, but it lacks documented SCIM provisioning capabilities despite enterprise-level pricing starting around $67K-70K annually. For security teams that need automated user lifecycle management across Checkmarx's complex product suite, Stitchflow provides the missing provisioning automation at a fraction of the platform cost.
Make Checkmarx workflows AI-native
Checkmarx has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- SCIM provisioning not documented
- SAML and OIDC SSO supported via Access Control
- Different products (SAST, SCA, One) may have different configs
- Licensing per product/user/engine can make scaling expensive
Documentation not available.
Configuration for Okta
Integration type
Okta Integration Network (OIN) app
Prerequisite
SSO must be configured before enabling SCIM.
Where to enable
Docs
Enterprise required for SCIM
Use Stitchflow for automated provisioning.
Unlock SCIM for
Checkmarx
Checkmarx has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.
See how it works


