Stitchflow
Clearbit logo

Clearbit SCIM guide

Connector Only

How to automate Clearbit user provisioning, and what it actually costs

Summary and recommendation

Clearbit, now operating as Breeze Intelligence under HubSpot, does not support SCIM provisioning. The platform only offers SAML 2.0 SSO with just-in-time (JIT) provisioning, which creates users automatically upon first login but provides no ongoing lifecycle management. This creates a significant gap for IT teams managing a B2B data enrichment platform where user access directly impacts data costs and compliance—especially problematic given that Breeze Intelligence credits expire monthly with no rollover and require a HubSpot subscription starting at $75/month minimum.

The JIT-only approach means IT administrators have no automated way to deprovision users when they leave, modify roles when responsibilities change, or bulk-manage access across marketing ops, sales ops, and RevOps teams. Given that data enrichment operations can scale to enterprise volumes costing $12,000-$100,000+ annually, the inability to programmatically control access represents both a security risk and potential budget exposure. Manual user management becomes especially problematic when teams need different permission levels for accessing enrichment APIs and managing data quality workflows.

The strategic alternative

Clearbit has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaNo SCIM available
Microsoft Entra IDNo SCIM available
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Clearbit accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Clearbit pricing problem

Clearbit gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Breeze Intelligence$45-50/month + HubSpot subscription required
Minimum viable setup$75/month ($30 HubSpot Starter + $45 Breeze)
Enterprise volume$12,000-100,000+/year based on usage

Pricing structure

PlanPricingSCIMSSO
Breeze Intelligence$45-50/month + HubSpot subscription required❌ Not available✓ SAML only
Minimum viable setup$75/month ($30 HubSpot Starter + $45 Breeze)❌ Not available✓ SAML only
Enterprise volume$12,000-100,000+/year based on usage❌ Not available✓ SAML only

Additional costs

HubSpot subscription required
$30/month minimum
Credit system
$10/1,000 HubSpot credits (1 enrichment = 10 credits)
Credits expire monthly with no rollover

What this means in practice

Without SCIM provisioning, IT teams must rely on SAML JIT provisioning, which creates accounts automatically when users first log in. However, this approach has significant limitations:

No centralized user lifecycle management
Users can't be pre-provisioned, deprovisioned, or have attributes updated from your IdP
Limited access control
You can't assign users to specific teams or configure permissions before they access the platform
HubSpot dependency
The entire data enrichment workflow is now locked into HubSpot's ecosystem

Additional constraints

Platform lock-in
Cannot use Clearbit data enrichment with other CRMs natively—everything runs through HubSpot
Free tools discontinued
Clearbit's free Connect and Prospector tools are shutting down in April 2025
Credit expiration
Monthly credits don't roll over, creating budget waste if not fully utilized
Domain-based enforcement
SAML SSO is enforced by email domain, limiting flexibility for mixed-domain organizations
API access limitations
Data access controls are managed through HubSpot's permission system, not your IdP

Summary of challenges

  • Clearbit does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Clearbit actually offers for identity

SAML SSO (Base offering)

Clearbit (now Breeze Intelligence under HubSpot) supports SAML 2.0 authentication with just-in-time (JIT) provisioning:

SettingDetails
ProtocolSAML 2.0
Supported IdPsOkta, Azure AD, Google Workspace, JumpCloud
JIT provisioning✓ Yes - creates users on first login
ConfigurationDomain-based SAML enforcement
User managementNo ongoing sync - JIT only

Critical limitation: JIT provisioning only creates users on their first login attempt. There's no ongoing synchronization of user attributes, group memberships, or automated deprovisioning when users are removed from your IdP.

Okta Integration (via OIN)

The official Okta Integration Network listing for Clearbit shows:

FeatureSupported?
SAML SSO✓ Yes
SCIM provisioning❌ No
Create users❌ No (JIT only)
Update users❌ No
Deactivate users❌ No
Group push❌ No

The HubSpot dependency problem

Since Clearbit is now Breeze Intelligence under HubSpot, identity management becomes more complex:

Requires HubSpot subscription
Minimum $30/month for HubSpot Starter
Credit-based pricing
$45-50/month for 100 credits, with monthly expiration
Limited SCIM documentation
Focus shifted to HubSpot's broader platform needs
Free tools discontinued
Forcing migration to paid HubSpot ecosystem

For teams that just need data enrichment with proper user lifecycle management, you're paying for an entire CRM platform you may not need, with identity features designed around HubSpot's broader user base rather than standalone data enrichment workflows.

What IT admins are saying

Community sentiment on Clearbit's provisioning reflects frustration with the HubSpot acquisition and limited automation options:

  • Manual user management required - JIT provisioning via SAML only
  • HubSpot dependency creates vendor lock-in concerns
  • Credits expire monthly with no rollover, complicating budget planning
  • Limited provisioning documentation makes setup unclear

SAML enforced by email domain

Clearbit SSO documentation

Now part of HubSpot as Breeze Intelligence

Multiple community discussions

Free tools discontinued

User complaints following HubSpot acquisition

The recurring theme

IT teams lost familiar Clearbit tools in the HubSpot transition and now face a more complex provisioning setup that requires HubSpot subscriptions. The shift from standalone data enrichment to HubSpot add-on creates dependency issues that many IT departments didn't sign up for.

The decision

Your SituationRecommendation
Small marketing team (<10 users) using HubSpotManual management acceptable - leverage JIT provisioning via SAML
Data enrichment team with frequent user changesUse Stitchflow: automation essential for rapid onboarding
Multi-CRM environment needing Clearbit dataUse Stitchflow: bypasses HubSpot dependency limitations
Enterprise with compliance requirementsUse Stitchflow: automation essential for audit trail and access controls
RevOps team managing credit allocation across departmentsUse Stitchflow: automated provisioning prevents credit waste from orphaned accounts

The bottom line

Clearbit (now Breeze Intelligence) offers powerful B2B data enrichment but lacks SCIM provisioning and requires a HubSpot subscription. With only JIT provisioning via SAML and credits that expire monthly, manual user management creates real cost and compliance risks. For teams that need proper provisioning automation without the HubSpot dependency overhead, Stitchflow is the cleaner solution.

Make Clearbit workflows AI-native

Clearbit has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

Full SCIM not explicitly documentedJIT provisioning via SAML onlySAML enforced by email domainNow part of HubSpot as Breeze IntelligenceCredits expire monthly with no rolloverRequires HubSpot subscription

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • Full SCIM not explicitly documented
  • JIT provisioning via SAML only
  • SAML enforced by email domain
  • Now part of HubSpot as Breeze Intelligence
  • Credits expire monthly with no rollover
  • Requires HubSpot subscription

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Where to enable

Okta Admin Console → Applications → Clearbit → Sign On

Enterprise required for SCIM

Use Stitchflow for automated provisioning.

Unlock SCIM for
Clearbit

Clearbit has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Clearbit logo
Clearbit
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
ActiveCampaign logo

ActiveCampaign

No SCIM

Marketing Automation / Email

ProvisioningNot Supported
Manual Cost$11,754/yr

ActiveCampaign, the marketing automation platform, does not offer native SCIM provisioning on any plan. While the Enterprise plan ($145+/month) includes SAML 2.0 SSO with just-in-time (JIT) provisioning, this only creates user accounts on first login—there's no automated deprovisioning when employees leave or change roles. New SSO users are automatically added to a generic "SSO Users" group with configurable permissions, but IT teams have no way to programmatically manage user lifecycles or enforce granular access controls based on department or role changes. This creates a significant gap for marketing teams that need to manage access to customer data and campaign tools. When employees leave the company or change departments, their ActiveCampaign access must be manually revoked, creating compliance risks and potential data exposure. The lack of automated deprovisioning means former employees could theoretically retain access to sensitive marketing data and customer information until someone manually removes them from the platform.

View full guide
Adyen logo

Adyen

No SCIM

Payments / Fintech

ProvisioningNot Supported
Manual Cost$11,754/yr

Adyen offers SCIM 2.0 provisioning, but only through Okta's integration—there's no native SCIM endpoint. This creates a significant vendor lock-in scenario where your provisioning capabilities are entirely dependent on using Okta as your identity provider. Teams using Azure Entra, Google Workspace, or OneLogin are left with manual user management despite Adyen supporting SAML SSO with these platforms. The Okta integration itself requires maintaining a company account (not just a merchant account) and keeping at least one non-SSO admin for troubleshooting, adding operational complexity. For payment platforms handling sensitive financial data, this provisioning gap creates serious compliance risks. Your finance team, payment operations staff, and developers need timely access to process transactions and manage risk controls, but without automated provisioning, you're stuck with manual onboarding that can delay critical payment operations. The requirement to maintain non-SSO admin accounts also creates a security backdoor that compliance auditors will flag.

View full guide