Stitchflow
Criteria logo

Criteria SCIM guide

Connector Only

How to automate Criteria user provisioning, and what it actually costs

Summary and recommendation

Criteria, the pre-employment assessment platform, does not support SCIM provisioning on any plan. While Criteria offers SSO integration through Okta (using SWA) and basic SSO endpoints for other identity providers, there is no automated user provisioning capability. This creates a significant operational challenge for IT teams managing candidate assessment workflows, as user accounts must be manually created and managed in Criteria's system even when SSO is configured.

The lack of provisioning automation is particularly problematic for organizations conducting high-volume hiring, where hundreds or thousands of candidate assessments may be processed monthly. Without SCIM, IT teams face manual account creation bottlenecks, potential security gaps from orphaned accounts, and compliance challenges when audit trails require complete user lifecycle visibility across all systems - including assessment platforms that handle sensitive candidate data.

The strategic alternative

Criteria has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaCriteria HireSelect integration uses SWA for sign-on. Supports Schema Discovery and Attribute Writeback but no automated user provisioning.
Microsoft Entra IDVia third-partyNo Criteria Corp provisioning tutorial in Microsoft Entra gallery. SSO endpoint exists at hireselect.criteriacorp.com/SSO.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Criteria accounts manually. Here's what that costs:

Source: Stitchflow research, normalized to 500 employees:
Orphaned accounts (ex-employees with access)5
Unused licenses12
IT hours spent on manual management/year85 hours
Unused license cost/year$3,500
IT labor cost/year$5,100
Cost of compliance misses/year$890
Total annual financial impact$9,490

The Criteria pricing problem

Criteria gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
ProfessionalFrom $1,200/year
EnterpriseCustom (avg ~$32,000/year)

Pricing structure

PlanPriceSSOSCIM
ProfessionalFrom $1,200/year
EnterpriseCustom (avg ~$32,000/year)

Market data on Criteria costs

Average annual cost
~$32,000
Range
$1,600-$90,000 depending on assessment volume and features
Enterprise tier required for any SSO integration

What this means in practice

Without SCIM provisioning, IT teams face manual user management at scale. For organizations conducting high-volume assessments:

Manual account creation
Each hiring manager or recruiter needs individual account setup
No automated deprovisioning
Former employees retain access until manually removed
Assessment access control
No automated role assignment based on department or function
Candidate management gaps
No systematic provisioning for temporary assessment access

Additional constraints

Assessment-focused architecture
Platform designed for candidate evaluation, not employee provisioning workflows
Okta integration limitations
Available Okta connector supports SSO only through SWA (Secure Web Authentication), no provisioning capabilities
No Entra integration
No Microsoft Entra gallery app available for automated provisioning
Enterprise SSO dependency
SAML SSO requires Enterprise tier, creating a $30,000+ barrier for basic identity integration

Summary of challenges

  • Criteria does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Criteria actually offers for identity

SSO Support (Enterprise pricing)

Criteria provides basic SSO integration for their HireSelect pre-employment assessment platform:

FeatureDetails
ProtocolSAML 2.0
Supported IdPsCustom SAML providers
ConfigurationSSO endpoint: hireselect.criteriacorp.com/SSO
User requirementManual account creation required

Critical limitation: Criteria's SSO is designed for candidate assessment workflows, not employee identity management. No automated user provisioning exists.

Okta Integration (via OIN)

The official Okta Integration Network listing for Criteria HireSelect shows:

FeatureSupported?
SAML SSO❌ No
OIDC SSO❌ No
SWA (password vaulting)✓ Yes
Create users❌ No
Update users❌ No
Deactivate users❌ No
Group push❌ No
Schema Discovery✓ Yes
Attribute Writeback✓ Yes

Translation: The Okta integration only provides password vaulting (SWA) plus basic attribute handling. No automated provisioning capabilities exist.

Microsoft Entra Integration

FeatureSupported?
Gallery app❌ No
SAML SSO❌ No
OIDC SSO❌ No
SCIM provisioning❌ No

No Microsoft Entra integration tutorial exists in their app gallery.

Bottom line: Criteria offers extremely limited identity features focused on candidate assessment workflows rather than employee provisioning. At $32,000/year average Enterprise pricing, you're paying premium rates for a platform that requires manual user management and lacks any automated provisioning capabilities.

What IT admins are saying

Criteria's lack of automated provisioning forces IT teams into manual account management for their pre-employment assessment platform:

  • Manual user creation required even with SSO configured
  • No automated deprovisioning when employees leave HR teams
  • Enterprise pricing barrier ($32K average) for basic SSO functionality
  • Limited integration options beyond Okta's basic SWA connection

Criteria HireSelect integration uses SWA for sign-on... no automated user provisioning.

Okta Integration Network

User accounts must be manually managed in Criteria's platform regardless of your identity provider setup.

IT administrator on Reddit

The recurring theme

HR teams end up managing Criteria access outside of centralized identity management, creating security gaps and administrative overhead when staff turnover occurs in recruiting departments.

The decision

Your SituationRecommendation
Small HR team managing <20 candidates at a timeManual user management is workable
Occasional assessment campaigns with stable admin teamManual management with Enterprise SSO for security
High-volume recruiting (100+ assessments/month)Use Stitchflow: automation essential for candidate lifecycle
Multiple hiring managers across departmentsUse Stitchflow: automated role-based access critical
Enterprise with compliance requirementsUse Stitchflow: automated audit trail for assessment access

The bottom line

Criteria Corp offers powerful pre-employment assessments but zero provisioning automation—even their Enterprise plan requires manual user management. For organizations running high-volume recruiting or managing complex hiring workflows, Stitchflow delivers the automated user lifecycle management that Criteria Corp simply doesn't provide.

Make Criteria workflows AI-native

Criteria has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No native SCIM provisioning supportOkta integration is SSO (SWA) only, no automated provisioningPre-employment assessment platform - users typically candidates, not employeesEnterprise SSO available per security documentation

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No native SCIM provisioning support
  • Okta integration is SSO (SWA) only, no automated provisioning
  • Pre-employment assessment platform - users typically candidates, not employees
  • Enterprise SSO available per security documentation

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Where to enable

Okta Admin Console → Applications → Criteria → Sign On

Criteria HireSelect integration uses SWA for sign-on. Supports Schema Discovery and Attribute Writeback but no automated user provisioning.

Use Stitchflow for automated provisioning.

Unlock SCIM for
Criteria

Criteria has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Criteria logo
Criteria
via Stitchflow

Last updated: 2026-01-20

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Abnormal Security logo

Abnormal Security

No SCIM

Security / Email Security

ProvisioningNot Supported
Manual Cost$9,490/yr

Abnormal Security, the AI-powered email security platform protecting against BEC and phishing attacks, does not offer SCIM provisioning on any plan. While the platform supports SAML 2.0 SSO integration with identity providers like Okta and Entra ID, this only handles authentication—not automated user lifecycle management. Security teams must manually provision and deprovision analyst access through Abnormal's portal, creating operational overhead and potential security gaps in a platform specifically designed to protect against email-based threats. This manual provisioning model creates significant challenges for security operations. When new SOC analysts join or existing team members change roles, IT admins must coordinate manual account creation and permission updates in Abnormal Security. For a platform that's critical to threat detection and incident response, delays in provisioning can leave security gaps, while delayed deprovisioning creates compliance risks. The irony is stark: a security platform designed to prevent account takeover and credential abuse lacks the automated provisioning controls that prevent exactly these risks.

View full guide
Airwallex logo

Airwallex

No SCIM
ProvisioningNot Supported
Manual Cost$9,490/yr

Airwallex, the global payments and treasury platform, offers no SCIM provisioning support on any plan, including their custom Accelerate enterprise tier. Despite being positioned for enterprise use with features like multi-entity management and advanced treasury controls, Airwallex lacks any official identity provider integrations—no SSO, no provisioning, and no presence in major IdP galleries like Okta's OIN or Microsoft Entra. This creates a significant operational burden for IT teams managing financial access across growing organizations, where manual user provisioning and deprovisioning in a payments platform presents both efficiency and security risks. The absence of identity management capabilities means IT administrators must manually create, update, and remove user accounts in Airwallex—a particularly concerning gap given that this platform handles sensitive financial operations, cross-border payments, and treasury management. Without automated deprovisioning, former employees could retain access to financial systems, creating compliance risks and potential security vulnerabilities that most finance and IT teams cannot afford to overlook.

View full guide
Alkami logo

Alkami

No SCIM
ProvisioningNot Supported
Manual Cost$9,490/yr

Alkami, the digital banking platform used by banks and credit unions, does not offer SCIM provisioning or public SSO integrations. As an enterprise-only platform with custom pricing, Alkami appears to handle user management through direct account administration rather than standardized identity protocols. This creates significant challenges for financial institutions that need to integrate Alkami with their existing identity infrastructure—particularly problematic given the compliance requirements and security standards that banks must maintain. The lack of automated provisioning means IT teams at financial institutions must manually create, update, and deprovision user accounts in Alkami. For a platform handling sensitive financial data and customer information, this manual approach introduces compliance risks and operational overhead. Banks typically require seamless integration between their core identity systems and all applications accessing customer data.

View full guide