Stitchflow
CircleCI logo

CircleCI SCIM guide

Connector Only

How to automate CircleCI user provisioning, and what it actually costs

Summary and recommendation

CircleCI, the popular CI/CD platform, does not offer native SCIM provisioning capabilities. While CircleCI supports SAML 2.0 SSO on their Scale plan ($300+/month), automated user provisioning is only available through Okta's CircleCI connector using SCIM 2.0. This creates a significant limitation: organizations using Azure Entra ID, Google Workspace, or OneLogin as their primary identity provider cannot automate CircleCI user lifecycle management, forcing IT teams to manually provision and deprovision developer accounts in a platform that handles sensitive source code and build secrets.

The lack of universal SCIM support creates a compliance and security risk for DevOps teams. Manual provisioning means delayed access for new developers joining projects, and more critically, potential delays in deprovisioning when team members leave—leaving former employees with access to CI/CD pipelines, source code repositories, and build secrets. For organizations not using Okta, the choice becomes accepting manual user management overhead or switching identity providers solely to enable CircleCI automation.

The strategic alternative

Stitchflow provides SCIM-level provisioning through resilient browser automation for CircleCI that works with any identity provider—Okta, Azure Entra ID, Google Workspace, or OneLogin. No dependency on specific IdP connectors or Scale plan requirements. Flat pricing under $5K/year, regardless of team size.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaNo SCIM available
Microsoft Entra IDNo SCIM available
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages CircleCI accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The CircleCI pricing problem

CircleCI gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Free$0 (30,000 credits, 5 users)
Performance$30/month (2,500 build minutes)
Scale$300-$1,000+/month (25,000+ build minutes)
Server~$93,000/year (on-prem, 50 licenses)

Pricing structure

PlanPriceSSOSCIM
Free$0 (30,000 credits, 5 users)
Performance$30/month (2,500 build minutes)
Scale$300-$1,000+/month (25,000+ build minutes)
Server~$93,000/year (on-prem, 50 licenses)

What this means in practice

For teams on Performance plans: Moving from $30/month to $300+/month represents a 10x cost increase just to enable user provisioning. Many development teams can't justify this jump for SSO alone.

For multi-IdP environments: CircleCI's SCIM integration only works through Okta's connector. Organizations using Entra ID, Google Workspace, or OneLogin must either switch to Okta or manage CircleCI users manually.

Scale plan requirement creates budget friction: Development teams often start with Performance plans for the build minutes, then hit an expensive wall when they need centralized user management.

Additional constraints

Okta dependency
SCIM provisioning requires Okta as the IdP - no direct integration with other identity providers
GitHub SSO conflicts
Teams using GitHub SSO may experience OAuth token invalidation when enabling CircleCI SSO
API token complications
Personal API tokens require SSO authentication when SSO is enabled, complicating CI/CD automation
Manual fallback
Without Scale plan + Okta, all user lifecycle management is manual ticket-based work

Summary of challenges

  • CircleCI does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What CircleCI actually offers for identity

SAML SSO (Scale plan required)

CircleCI supports SAML 2.0 integration for single sign-on:

SettingDetails
ProtocolSAML 2.0
Supported IdPsOkta, Azure AD, OneLogin, custom SAML providers
Plan requirementScale plan ($300+/month minimum)
User provisioningJIT (Just-in-Time) supported
ConfigurationContact CircleCI for Scale/Server setup

Critical limitation: Personal API tokens require SSO authentication when SSO is enabled, which can complicate CI/CD automation workflows.

SCIM Provisioning (Okta only)

CircleCI doesn't offer native SCIM - provisioning only works through Okta's integration:

FeatureSupport
Native SCIM API❌ No
Okta SCIM connector✓ Yes (Scale plan)
Azure AD provisioning❌ No
Google Workspace❌ No SSO support
OneLogin provisioning❌ No

The Okta integration provides:

Group linking
Schema discovery
Attribute writeback
User lifecycle management

Real-world impact: If you're using Azure AD, Google Workspace, or OneLogin as your primary IdP, you have no automated provisioning options. You're stuck with manual user management or need to implement a complex Okta passthrough setup.

What's missing for most teams

The Scale plan requirement means you're paying $3,600+/year minimum just to get basic identity management. Most of that cost goes toward build credits you may not need - there's no identity-only pricing tier.

For DevOps teams managing CI/CD access across multiple repositories and environments, the Okta-only SCIM limitation creates significant operational overhead if you're standardized on a different IdP.

What IT admins are saying

Community sentiment on CircleCI's provisioning reveals frustration with limited automation options and scaling costs:

  • No native SCIM support - Must use Okta's connector for any automated provisioning
  • Scale plan requirement - SSO and SCIM features locked behind expensive tier ($300-1,000+/month)
  • API token complications - Personal tokens require SSO authentication when SSO is enabled
  • GitHub SSO conflicts - OAuth token invalidation issues when GitHub SSO is also configured

Personal API tokens require SSO auth when SSO enabled

CircleCI documentation

GitHub SSO conflicts can invalidate OAuth tokens

Community reports

The recurring theme

CircleCI forces IT teams into expensive Scale plans for basic provisioning automation, while lacking native SCIM means you're dependent on third-party connectors like Okta's integration just to automate user lifecycle management.

The decision

Your SituationRecommendation
Small dev team (<10 developers) on Free/Performance plansManual management is acceptable
Growing development team on Scale plan with OktaUse native Okta SCIM connector
Development team using Entra ID or Google WorkspaceUse Stitchflow: no native SCIM support for these IdPs
Enterprise with multiple CI/CD tools and compliance needsUse Stitchflow: centralized automation across DevOps stack
Teams frequently onboarding/offboarding contractorsUse Stitchflow: automation essential for access control

The bottom line

CircleCI offers SCIM provisioning only through Okta on expensive Scale plans ($300+/month), leaving teams using Entra ID or Google Workspace without automation options. For organizations that need consistent provisioning across their entire DevOps toolchain, Stitchflow provides universal automation regardless of your IdP or CircleCI plan.

Automate CircleCI without third-party complexity

Stitchflow delivers SCIM-level provisioning through resilient browser automation, backed by 24/7 human in the loop for CircleCI at <$5K/year, flat, regardless of team size.

Works alongside or instead of native SCIM
Syncs with your existing IdP (Okta, Entra ID, Google Workspace)
Automates onboarding and offboarding
SOC 2 Type II certified
24/7 human-in-the-loop monitoring
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

Native SCIM not documented - SCIM via OktaScale plan required for SSO/SCIMPersonal API tokens require SSO auth when SSO enabledGitHub SSO conflicts can invalidate OAuth tokens

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • Native SCIM not documented - SCIM via Okta
  • Scale plan required for SSO/SCIM
  • Personal API tokens require SSO auth when SSO enabled
  • GitHub SSO conflicts can invalidate OAuth tokens

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Where to enable

Okta Admin Console → Applications → CircleCI → Sign On

Enterprise required for SCIM

Use Stitchflow for automated provisioning.

Unlock SCIM for
CircleCI

CircleCI doesn't offer SCIM. Get an enterprise-grade SCIM endpoint in your IdP, even without native support.

See how it works
Admin Console
Directory
Applications
CircleCI logo
CircleCI
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Buildkite logo

Buildkite

No SCIM

CI/CD / DevOps

ProvisioningNot Supported
Manual Cost$11,754/yr

Buildkite supports SCIM provisioning through Okta and Azure AD connectors, but only on Enterprise plans with custom pricing. While Business plans ($25/user/month) include SAML SSO, they lack SCIM deprovisioning—meaning users remain active in Buildkite even after being removed from your IdP. Additionally, custom SAML providers require contacting support for a feature flag to enable SCIM functionality, creating deployment delays and support dependencies. This creates a significant security gap for engineering organizations. DevOps teams frequently change, contractors come and go, and engineers move between projects requiring different pipeline access. Without automated deprovisioning, former team members retain access to build agents, deployment pipelines, and potentially production infrastructure. JIT provisioning delays billing until first login, but manual offboarding creates compliance risks that outweigh any cost savings.

View full guide
Jenkins logo

Jenkins

No SCIM

CI/CD / DevOps

ProvisioningNot Supported
Manual Cost$11,754/yr

Jenkins, the open-source CI/CD platform, does not support SCIM provisioning on any plan. While Jenkins offers SAML 2.0 SSO through plugins like the SAML plugin or miniOrange SAML SP, this only provides authentication with just-in-time (JIT) provisioning—meaning user accounts are created automatically on first login but there's no automated lifecycle management thereafter. For DevOps teams managing Jenkins across development, staging, and production environments, this creates a significant security gap when developers or contractors leave the organization. The lack of SCIM support means IT teams have no automated way to deprovision users, disable accounts, or update permissions when roles change. Unlike other enterprise tools that might have admin dashboards for manual user management, Jenkins relies heavily on configuration files and role-based authorization plugins, making manual deprovisioning both time-consuming and error-prone. This is particularly problematic for Jenkins given its access to critical CI/CD pipelines, deployment keys, and production infrastructure—exactly the type of access that needs immediate revocation during offboarding.

View full guide
6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide