Summary and recommendation
Coupa, the procurement and spend management platform, does not offer native SCIM provisioning on any plan. While Coupa supports SAML 2.0 SSO integration with major identity providers, user provisioning must be handled through Okta's API connector (for Okta customers only) or custom development using Coupa's API. This creates a significant automation gap for IT teams managing procurement workflows, where user access controls are critical for financial compliance and approval hierarchies.
The lack of native SCIM is particularly problematic for procurement platforms like Coupa, where different user types (employees, approvers, suppliers) require distinct permission sets and access levels. Without automated provisioning, IT teams face manual user management for a system that often spans entire organizations and external supplier networks. This manual process increases security risks around financial controls and creates compliance headaches when employees change roles or leave the company.
The strategic alternative
Coupa has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | No |
| SSO available? | Yes |
| SSO protocol | SAML 2.0 |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | Provisioning | Notes |
|---|---|---|---|
| Okta | Via third-party | Via API | Provisioning via Okta API integration (not SCIM). Supports Group Linking, Schema Discovery, Attribute Writeback. OAuth 2.0 required. Also available: Coupa Provisioning Connector by Aquera. |
| Microsoft Entra ID | Via third-party | ❌ | SSO via SAML documented. No native SCIM provisioning. User provisioning requires Coupa API or third-party connector. |
| Google Workspace | Via third-party | ❌ | SSO only, no provisioning |
| OneLogin | Via third-party | ❌ | SSO only |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages Coupa accounts manually. Here's what that costs:
The Coupa pricing problem
Coupa gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Starter | ~$499/year | ||
| Pro | ~$2,500/month | ||
| Enterprise | ~$4,800/year |
Pricing structure
| Plan | Pricing | SCIM | SSO |
|---|---|---|---|
| Starter | ~$499/year | ❌ No provisioning | ✓ SAML 2.0 |
| Pro | ~$2,500/month | ❌ No provisioning | ✓ SAML 2.0 |
| Enterprise | ~$4,800/year | ❌ No provisioning | ✓ SAML 2.0 |
Note: Coupa uses custom enterprise pricing with complex module structures. The above represents typical market pricing, but your actual costs will vary significantly based on procurement volume, user count, and required modules.
What this means in practice
Without native SCIM, Coupa provisioning requires workarounds that create operational overhead:
Via Okta integration
Via Coupa API
Additional constraints
Summary of challenges
- Coupa does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What Coupa actually offers for identity
SAML SSO (Available on all plans)
Coupa supports SAML 2.0 integration with enterprise identity providers:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0 |
| Supported IdPs | Okta, Entra ID, OneLogin, Ping Identity, generic SAML |
| Configuration | SP-initiated preferred, IdP-initiated requires RelayState |
| JIT provisioning | ✓ Yes |
Okta Integration (Enterprise required)
The official Okta Integration Network listing for Coupa shows:
| Feature | Supported? |
|---|---|
| SAML SSO | ✓ Yes |
| User provisioning | ✓ Yes (via API connector) |
| Group linking | ✓ Yes |
| Schema discovery | ✓ Yes |
| Attribute writeback | ✓ Yes |
| Native SCIM | ❌ No |
The catch: Coupa's "provisioning" works through Okta's API connector technology, not standard SCIM. This means you're locked into Okta-specific provisioning workflows and can't use other identity providers for automated user management.
Microsoft Entra ID Integration
| Feature | Supported? |
|---|---|
| SAML SSO | ✓ Yes |
| User provisioning | ❌ No |
| Native SCIM | ❌ No |
Entra ID customers get SSO but no automated provisioning - you'll need to manage users manually or build custom API integrations.
What's missing
No native SCIM endpoint: Unlike modern SaaS apps, Coupa doesn't provide a standard SCIM API. User provisioning requires either the Okta-specific connector or custom development against Coupa's proprietary APIs.
IdP lock-in: Automated provisioning only works if you're using Okta. Teams using Entra ID, Google Workspace, or OneLogin must handle user lifecycle management manually or invest in custom integration development.
What IT admins are saying
Coupa's lack of native SCIM provisioning forces IT teams into workarounds and complex integrations:
- No built-in SCIM endpoint despite being an enterprise platform
- User provisioning requires either Okta integration or custom API development
- Complex setup compared to modern SaaS applications with native SCIM
- Manual provisioning workflows for non-Okta environments
User provisioning via Okta Group Linking. API available for custom provisioning. No native SCIM endpoint documented.
API-based provisioning requires development resources we don't have for every app.
The recurring theme
For a procurement platform handling financial controls, Coupa's provisioning limitations create manual overhead precisely where organizations need tight access controls and audit trails.
The decision
| Your Situation | Recommendation |
|---|---|
| Small procurement team (<20 users) | Manual management acceptable with JIT provisioning |
| Using Okta with Enterprise plan | Use Okta's API connector for automated provisioning |
| Multi-IdP environment or non-Okta setup | Use Stitchflow: simplest automation across any IdP |
| Large enterprise (100+ users) with suppliers | Use Stitchflow: automation essential for complex user types |
| High-growth procurement organization | Use Stitchflow: automation strongly recommended for scale |
The bottom line
Coupa's procurement platform lacks native SCIM, forcing you to rely on Okta's API integration or manual provisioning. For organizations using multiple IdPs or needing seamless automation across procurement teams and suppliers, Stitchflow eliminates the complexity of API-based workarounds.
Make Coupa workflows AI-native
Coupa has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- No native SCIM endpoint documented
- User provisioning via Okta integration or Coupa API
- Preferred setup is SP-Initiated SSO
- IdP-Initiated requires RelayState parameter
Documentation not available.
Configuration for Okta
Integration type
Okta Integration Network (OIN) app
Where to enable
Docs
Provisioning via Okta API integration (not SCIM). Supports Group Linking, Schema Discovery, Attribute Writeback. OAuth 2.0 required. Also available: Coupa Provisioning Connector by Aquera.
Use Stitchflow for automated provisioning.
Configuration for Entra ID
Integration type
Microsoft Entra Gallery app
Where to enable
SSO via SAML documented. No native SCIM provisioning. User provisioning requires Coupa API or third-party connector.
Use Stitchflow for automated provisioning.
Unlock SCIM for
Coupa
Coupa has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.
See how it works


