Stitchflow
Cofense logo

Cofense SCIM guide

Native SCIM

How to automate Cofense user provisioning, and what it actually costs

Native SCIM requires Enterprise plan

Summary and recommendation

Cofense supports native SCIM 2.0 provisioning through its "Recipient Sync" feature, but only on Enterprise plans with custom pricing. This creates a significant barrier for security teams who need to deploy phishing awareness training across their entire organization but are stuck on lower-tier plans where manual user management becomes operationally expensive.

The challenge is particularly acute for security awareness training platforms like Cofense, where successful programs require enrolling all employees—not just a subset of power users. Manual provisioning means delayed training rollouts when employees join, potential security gaps when users aren't properly deprovisioned, and ongoing administrative overhead that scales poorly. For compliance-focused organizations, inconsistent user lifecycle management in security training platforms represents a measurable risk.

The strategic alternative

Cofense gates SCIM behind Enterprise. Skip the Enterprise plan upgrade and automate complete outcomes across your stack. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredEnterprise
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0, AD/LDAP
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Cofense accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Cofense pricing problem

Cofense gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Starter~$10/user/year (estimated)
EnterpriseCustom pricing

Plan Structure

PlanPriceSCIM
Starter~$10/user/year (estimated)
EnterpriseCustom pricing

Note: Cofense doesn't publish standard pricing. Enterprise pricing requires direct sales engagement for custom quotes.

What this means in practice

The lack of transparent pricing creates several challenges:

No self-service evaluation
You can't calculate provisioning costs without engaging sales
Custom negotiation required
Every deployment requires enterprise sales cycle
Unknown cost multiplier
Enterprise tier likely represents significant price increase over Starter

For security awareness training that typically needs organization-wide deployment, the Enterprise requirement means:

All-hands training programs automatically require top-tier pricing
No ability to start small and scale up with SCIM
Budget planning requires sales engagement before technical evaluation

Additional constraints

Sales-gated setup
Multiple user reports indicate SSO configuration requires contacting Cofense support rather than self-service setup.
Limited IdP support
No documented Google Workspace support, potentially limiting deployment options.
Training-specific provisioning
SCIM primarily serves training campaign enrollment rather than app access, making the Enterprise requirement harder to justify for basic training use cases.

Summary of challenges

  • Cofense supports SCIM but only at Enterprise tier (Custom pricing)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

Cofense doesn't sell SCIM à la carte. It's bundled with their Enterprise security platform:

SCIM automated provisioning via Cofense Recipient Sync
SAML single sign-on (SSO)
Advanced phishing simulation campaigns
Email threat detection and reporting
Security awareness training content library
Administrative controls and reporting
Dedicated enterprise support

The challenge: Cofense pricing isn't publicly disclosed, requiring custom quotes that can drag procurement cycles. Many organizations find they need the full platform to justify the investment, not just the SCIM provisioning component.

Stitchflow Insight

If your organization needs comprehensive phishing defense and security training, the Enterprise upgrade delivers value. If you just want automated user provisioning for basic security awareness, you're paying for an extensive security platform you may not fully utilize. We estimate ~60% of Enterprise features focus on advanced threat detection and simulation rather than core identity management.

What IT admins are saying

Community sentiment on Cofense's SCIM implementation reveals frustration with enterprise gatekeeping and support dependencies. Common complaints:

  • SCIM provisioning locked behind Enterprise tier with undisclosed pricing
  • Must contact support for SSO setup instead of self-service configuration
  • Limited transparency on pricing forces lengthy sales conversations
  • Security training platforms shouldn't require enterprise contracts for basic automation

The recurring theme

Cofense treats SCIM as an enterprise-only feature, forcing IT teams through custom pricing negotiations and support tickets for what should be standard identity automation in security awareness platforms.

The decision

Your SituationRecommendation
Not on Enterprise tier, need SCIMUse Stitchflow: avoid the custom enterprise pricing jump
Security team wants automated user sync for training campaignsUse Stitchflow: get provisioning without enterprise procurement
Already on Enterprise with SCIM accessUse native SCIM: you're paying for the feature
Need Enterprise security features beyond SCIMEvaluate Enterprise: SCIM comes bundled with advanced features
Small organization with minimal user changesManual may work: but consider gaps in training coverage

The bottom line

Cofense requires Enterprise tier for SCIM provisioning, which means custom pricing negotiations and lengthy procurement cycles. For security teams that need automated user sync for phishing training without the enterprise upgrade, Stitchflow delivers managed provisioning at transparent flat-rate pricing.

Make Cofense workflows AI-native

Cofense gates SCIM behind Enterprise. We build complete offboarding, user access reviews, and license workflows without that SCIM Tax upgrade.

No Enterprise upgrade required
Less than a week, start to finish (~2 hours of your time)
We maintain the integration layer underneath
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Enterprise

Prerequisites

None

Key limitations

  • SCIM requires Enterprise tier
  • SSO may require contacting Cofense support for setup
  • AD/LDAP for on-premise deployments only

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Where to enable

Okta Admin Console → Applications → Cofense → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

SCIM provisioning via Cofense Recipient Sync. Supports user create, update, and deactivate.

Cofense gates SCIM behind Enterprise. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Where to enable

Entra admin center → Enterprise applications → Cofense → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

Native SCIM provisioning tutorial available for Microsoft Entra ID.

Cofense gates SCIM behind Enterprise. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Unlock SCIM for
Cofense

Cofense gates SCIM behind Enterprise plan. We automate complete offboarding and access reviews across your stack without that SCIM Tax upgrade.

See how it works
Admin Console
Directory
Applications
Cofense logo
Cofense
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Amplitude logo

Amplitude

SCIM Tax

Product Analytics

SCIM StatusIncluded
Manual Cost$11,754/yr

Amplitude supports SCIM provisioning, but only on Growth plans (starting around $36K/year) or Enterprise plans with custom pricing. While Amplitude's SCIM implementation covers the core functionality—creating, updating, and deactivating users—it requires SCIM to be specifically enabled for your organization, and regenerating the SCIM key immediately invalidates existing integrations without warning. For product teams on Plus plans ($49/month), upgrading to Growth just to unlock SCIM means jumping from under $600/year to $36,000+/year—a 60x increase. That's often more than the entire analytics budget for smaller product teams. The gap becomes particularly problematic for cross-functional product teams where analysts, PMs, and engineers need varying levels of access to user behavior data, but manual provisioning creates security risks around sensitive analytics permissions.

View full guide
Bill.com logo

Bill.com

SCIM Tax

Accounts Payable / Receivable Automation

SCIM StatusIncluded
Manual Cost$11,754/yr

Bill.com offers inconsistent SCIM provisioning support that varies dramatically by identity provider. While Okta users can access SCIM provisioning through the OIN integration, Bill.com doesn't publish native SCIM documentation, and other IdPs like Entra ID are limited to SAML SSO only. This fragmented approach means your provisioning capabilities depend entirely on your IdP choice rather than Bill.com's platform features. For finance teams managing sensitive AP/AR workflows where user access directly impacts invoice approvals and payment processing, this inconsistency creates operational gaps—especially when onboarding new controllers, AP clerks, or accountants requires manual role assignment tied to spending limits and approval hierarchies. The real problem is that Bill.com gates all SSO functionality behind Enterprise plans with custom pricing (typically 2-3x their Corporate plan at $79/user/month), yet still provides no clear path to automated provisioning for most customers. Since financial systems require precise role-based access controls for SOX compliance and segregation of duties, manual user management creates both security risks and administrative overhead. When employees change departments or leave the company, orphaned accounts in payment systems pose significant financial and compliance risks that manual processes often miss.

View full guide
Bitwarden logo

Bitwarden

SCIM Tax

Password Manager / Secrets Management

SCIM StatusIncluded
Manual Cost$11,754/yr

Bitwarden supports SCIM 2.0 provisioning, but only on Teams ($4/user/month) and Enterprise ($6/user/month) plans. While this pricing is reasonable compared to other password managers, the real challenge lies in Bitwarden's zero-knowledge architecture: SCIM can provision user accounts, but users still need to manually accept vault invitations and set up their encryption keys before gaining access to shared passwords. This creates a critical security gap. Your identity provider shows users as "provisioned," but they can't actually access company passwords until they complete manual setup steps. When employees leave, SCIM deprovisioning removes their account, but any locally cached vault data remains accessible until they next sync. For security teams managing hundreds of shared credentials, this manual friction undermines the entire purpose of automated provisioning.

View full guide