Stitchflow
Coupa logo

Coupa SCIM guide

Connector Only

How to automate Coupa user provisioning, and what it actually costs

Summary and recommendation

Coupa, the procurement and spend management platform, does not offer native SCIM provisioning on any plan. While Coupa supports SAML 2.0 SSO integration with major identity providers, user provisioning must be handled through Okta's API connector (for Okta customers only) or custom development using Coupa's API. This creates a significant automation gap for IT teams managing procurement workflows, where user access controls are critical for financial compliance and approval hierarchies.

The lack of native SCIM is particularly problematic for procurement platforms like Coupa, where different user types (employees, approvers, suppliers) require distinct permission sets and access levels. Without automated provisioning, IT teams face manual user management for a system that often spans entire organizations and external supplier networks. This manual process increases security risks around financial controls and creates compliance headaches when employees change roles or leave the company.

The strategic alternative

Coupa has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOProvisioningNotes
OktaVia third-partyVia APIProvisioning via Okta API integration (not SCIM). Supports Group Linking, Schema Discovery, Attribute Writeback. OAuth 2.0 required. Also available: Coupa Provisioning Connector by Aquera.
Microsoft Entra IDVia third-partySSO via SAML documented. No native SCIM provisioning. User provisioning requires Coupa API or third-party connector.
Google WorkspaceVia third-partySSO only, no provisioning
OneLoginVia third-partySSO only

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Coupa accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Coupa pricing problem

Coupa gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Starter~$499/year
Pro~$2,500/month
Enterprise~$4,800/year

Pricing structure

PlanPricingSCIMSSO
Starter~$499/year❌ No provisioning✓ SAML 2.0
Pro~$2,500/month❌ No provisioning✓ SAML 2.0
Enterprise~$4,800/year❌ No provisioning✓ SAML 2.0

Note: Coupa uses custom enterprise pricing with complex module structures. The above represents typical market pricing, but your actual costs will vary significantly based on procurement volume, user count, and required modules.

What this means in practice

Without native SCIM, Coupa provisioning requires workarounds that create operational overhead:

Via Okta integration

Requires Okta as your IdP (locks you into specific vendor)
Uses Okta's API connector, not standard SCIM protocol
Provisioning reliability depends on Okta's API uptime and rate limits
Schema changes require Okta admin intervention

Via Coupa API

Requires custom development and ongoing maintenance
API keys need secure management and rotation
No standardized attribute mapping
Updates require developer resources

Additional constraints

IdP dependency
Meaningful provisioning automation only works with Okta's pre-built connector
Procurement complexity
Different access patterns for employees vs. suppliers complicates provisioning logic
Financial controls
Spend management requires careful role-based provisioning that API-based solutions handle poorly
No failover
If Okta integration fails, you're back to manual user management
Limited attribute sync
API-based provisioning often misses nuanced role assignments that procurement workflows require

Summary of challenges

  • Coupa does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Coupa actually offers for identity

SAML SSO (Available on all plans)

Coupa supports SAML 2.0 integration with enterprise identity providers:

SettingDetails
ProtocolSAML 2.0
Supported IdPsOkta, Entra ID, OneLogin, Ping Identity, generic SAML
ConfigurationSP-initiated preferred, IdP-initiated requires RelayState
JIT provisioning✓ Yes

Okta Integration (Enterprise required)

The official Okta Integration Network listing for Coupa shows:

FeatureSupported?
SAML SSO✓ Yes
User provisioning✓ Yes (via API connector)
Group linking✓ Yes
Schema discovery✓ Yes
Attribute writeback✓ Yes
Native SCIM❌ No

The catch: Coupa's "provisioning" works through Okta's API connector technology, not standard SCIM. This means you're locked into Okta-specific provisioning workflows and can't use other identity providers for automated user management.

Microsoft Entra ID Integration

FeatureSupported?
SAML SSO✓ Yes
User provisioning❌ No
Native SCIM❌ No

Entra ID customers get SSO but no automated provisioning - you'll need to manage users manually or build custom API integrations.

What's missing

No native SCIM endpoint: Unlike modern SaaS apps, Coupa doesn't provide a standard SCIM API. User provisioning requires either the Okta-specific connector or custom development against Coupa's proprietary APIs.

IdP lock-in: Automated provisioning only works if you're using Okta. Teams using Entra ID, Google Workspace, or OneLogin must handle user lifecycle management manually or invest in custom integration development.

What IT admins are saying

Coupa's lack of native SCIM provisioning forces IT teams into workarounds and complex integrations:

  • No built-in SCIM endpoint despite being an enterprise platform
  • User provisioning requires either Okta integration or custom API development
  • Complex setup compared to modern SaaS applications with native SCIM
  • Manual provisioning workflows for non-Okta environments

User provisioning via Okta Group Linking. API available for custom provisioning. No native SCIM endpoint documented.

Coupa integration documentation

API-based provisioning requires development resources we don't have for every app.

IT Admin on Reddit

The recurring theme

For a procurement platform handling financial controls, Coupa's provisioning limitations create manual overhead precisely where organizations need tight access controls and audit trails.

The decision

Your SituationRecommendation
Small procurement team (<20 users)Manual management acceptable with JIT provisioning
Using Okta with Enterprise planUse Okta's API connector for automated provisioning
Multi-IdP environment or non-Okta setupUse Stitchflow: simplest automation across any IdP
Large enterprise (100+ users) with suppliersUse Stitchflow: automation essential for complex user types
High-growth procurement organizationUse Stitchflow: automation strongly recommended for scale

The bottom line

Coupa's procurement platform lacks native SCIM, forcing you to rely on Okta's API integration or manual provisioning. For organizations using multiple IdPs or needing seamless automation across procurement teams and suppliers, Stitchflow eliminates the complexity of API-based workarounds.

Make Coupa workflows AI-native

Coupa has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No native SCIM endpoint documentedUser provisioning via Okta integration or Coupa APIPreferred setup is SP-Initiated SSOIdP-Initiated requires RelayState parameter

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No native SCIM endpoint documented
  • User provisioning via Okta integration or Coupa API
  • Preferred setup is SP-Initiated SSO
  • IdP-Initiated requires RelayState parameter

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Where to enable

Okta Admin Console → Applications → Coupa → Sign On

Provisioning via Okta API integration (not SCIM). Supports Group Linking, Schema Discovery, Attribute Writeback. OAuth 2.0 required. Also available: Coupa Provisioning Connector by Aquera.

Use Stitchflow for automated provisioning.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app

Where to enable

Entra admin center → Enterprise applications → Coupa → Single sign-on

SSO via SAML documented. No native SCIM provisioning. User provisioning requires Coupa API or third-party connector.

Use Stitchflow for automated provisioning.

Unlock SCIM for
Coupa

Coupa has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Coupa logo
Coupa
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
Aha! logo

Aha!

No SCIM

Product Management / Roadmapping

ProvisioningNot Supported
Manual Cost$11,754/yr

Aha! Roadmaps, the product roadmapping platform, does not support SCIM provisioning on any plan. While Aha! offers SAML 2.0 SSO integration with identity providers like Okta, Entra ID, and OneLogin, this only handles authentication through JIT (Just-In-Time) provisioning. The critical limitation: JIT provisioning creates user accounts with no default role or access permissions, requiring administrators to manually configure access for each user after they first sign in. For product teams managing strategic roadmaps and stakeholder access, this creates significant operational overhead. Since product roadmaps contain sensitive strategic information and stakeholder access typically varies by product area, IT administrators must manually assign appropriate roles and workspace permissions after each user is provisioned. There's no automatic deprovisioning when users leave the organization, creating potential security gaps. This manual process becomes particularly problematic for larger product organizations where dozens of stakeholders across different business units need carefully managed access to specific roadmaps.

View full guide
Appcues logo

Appcues

No SCIM

Product Adoption / User Onboarding

ProvisioningNot Supported
Manual Cost$11,754/yr

Appcues, the product adoption platform used by product managers and growth teams, explicitly does not support SCIM provisioning on any plan—not even Enterprise. While Appcues offers SAML 2.0 SSO integration starting at the Enterprise tier with just-in-time (JIT) provisioning, this only creates users during first login and provides no automated deprovisioning capabilities. For product teams where access needs change frequently as people move between projects or leave the company, this creates a significant security gap. The lack of SCIM means IT teams must manually manage user lifecycle for Appcues accounts, even though the platform handles sensitive product analytics and user flow data. When employees leave or change roles, their Appcues access remains active until manually revoked—a compliance risk that's particularly problematic given Appcues' role in tracking user behavior and product metrics. With MAU-based pricing starting at $300/month and scaling significantly with usage, paying for orphaned accounts also creates unnecessary cost bloat.

View full guide