Stitchflow
Databricks logo

Databricks SCIM guide

Native SCIM

How to automate Databricks user provisioning, and what it actually costs

Native SCIM requires Premium plan

Summary and recommendation

Databricks supports SCIM provisioning, but only on Premium plans and above. While this covers most production deployments (since Standard is being phased out), the real challenge isn't plan requirements—it's Databricks' architectural complexity. The platform has strict limits (10,000 users, 5,000 groups per account) and doesn't support nested groups via Azure SCIM, forcing IT teams to flatten complex organizational structures. More critically, SCIM only handles basic user/group provisioning, not the granular workspace access and compute permissions that data teams actually need.

This creates a significant gap for data engineering and ML teams. Data scientists need access to specific workspaces with appropriate cluster permissions, not just basic platform access. Manual management of these permissions becomes unmanageable at scale, while incorrect access can expose sensitive datasets or rack up unexpected compute costs. SSO gets users authenticated, but doesn't solve the workspace-level authorization problem that makes Databricks operationally complex.

The strategic alternative

Databricks gates SCIM behind Premium. Skip the Premium plan upgrade and automate complete outcomes across your stack. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredPro
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0, OIDC
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Databricks accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Databricks pricing problem

Databricks gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
StandardConsumption + $0.07-$0.65+/DBU
PremiumConsumption + $0.07-$0.65+/DBU
EnterpriseCustom pricing

Plan Structure

PlanPriceSCIM
StandardConsumption + $0.07-$0.65+/DBU
PremiumConsumption + $0.07-$0.65+/DBU
EnterpriseCustom pricing

Note: Standard tier is being phased out - AWS/GCP customers must upgrade to Premium by October 2025, Azure Standard retires October 2026.

What this means in practice

Premium tier pricing varies significantly based on workload type and cloud provider, but typical costs range from $500-$5,000+ monthly for moderate usage. The challenge is that DBU consumption can be unpredictable:

Base infrastructure
Cloud costs often run 50-200% of DBU charges
Usage volatility
ML training jobs and large data processing can spike costs unexpectedly
Commitment pricing
Up to 37% discount available with 1-3 year DBCU prepurchase, but requires significant upfront investment

For a data team running moderate workloads, upgrading to Premium specifically for SCIM could mean:

$6,000-$60,000+/year
additional spend just to enable automated provisioning
Forced commitment
Many discounts require annual or multi-year contracts

Additional constraints

Scale limitations
Maximum 10,000 users/service principals and 5,000 groups per account - problematic for large enterprises with complex data team structures.
Architecture changes required
Legacy workspace-level SCIM is deprecated; organizations must migrate to account-level SCIM, often requiring significant reconfiguration.
Nested group limitations
Azure SCIM connector cannot sync nested groups, forcing flat organizational structures or manual workarounds.
IdP-specific quirks
Okta users cannot rename groups after initial provisioning without breaking sync.

Summary of challenges

  • Databricks supports SCIM but only at Pro tier (custom pricing)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

Databricks doesn't sell SCIM separately. It's bundled with Premium plan features across their entire data platform:

SCIM automated provisioning (account-level recommended)
SAML/OIDC single sign-on (SSO)
Advanced security controls and audit logging
Unity Catalog for data governance
Cluster policies and compute governance
Advanced networking features
Enhanced support and SLA
Delta Live Tables and advanced ML features

The real cost consideration: Premium pricing is consumption-based with DBU rates of $0.07-$0.65+ per hour, plus underlying cloud infrastructure costs (often 50-200% of DBU charges). Total monthly costs typically range $500-$5,000+ depending on usage patterns.

Stitchflow Insight

The Premium upgrade brings substantial data platform capabilities, but if you're just looking for automated user provisioning, you're paying for extensive data engineering and ML features you may not need. We estimate ~60% of Premium features are irrelevant for organizations that primarily need identity management automation.

What IT admins are saying

Community sentiment on Databricks's SCIM implementation reveals frustration with platform complexity and limitations. Common complaints:

  • Premium plan requirement adds significant cost for basic identity automation
  • Azure SCIM connector cannot sync nested groups, breaking organizational hierarchies
  • Account-level vs workspace-level SCIM confusion with legacy deprecation
  • User and group limits (10K users, 5K groups) insufficient for large enterprises

"Nested groups not supported via Azure SCIM" is a recurring pain point in Microsoft forums, forcing admins to flatten complex organizational structures.

The workspace-level SCIM deprecation caught us off guard - had to rebuild our entire provisioning setup for account-level

Reddit r/databricks

The recurring theme

Databricks forces expensive plan upgrades for SCIM while maintaining architectural limitations that don't work for enterprise identity management at scale.

The decision

Your SituationRecommendation
On Standard tier, need SCIMUse Stitchflow: avoid the Premium upgrade and DBU cost increases
Already on Premium with SCIM includedUse native SCIM: you're paying for it already
Large organization (>5K users/groups)Use Stitchflow: sidestep Databricks' hard account limits
Using nested Azure groupsUse Stitchflow: Azure SCIM connector can't sync nested groups
Small data team, infrequent access changesManual may work: but monitor workspace security gaps

The bottom line

Databricks gates SCIM behind Premium. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Make Databricks workflows AI-native

Databricks gates SCIM behind Premium. We build complete offboarding, user access reviews, and license workflows without that SCIM Tax upgrade.

No Premium upgrade required
Less than a week, start to finish (~2 hours of your time)
We maintain the integration layer underneath
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Pro

Prerequisites

SSO must be configured first

Key limitations

  • Premium plan required for SCIM
  • Max 10,000 users/service principals per account
  • Max 5,000 groups per account
  • Cannot sync nested groups via Azure SCIM connector

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Databricks → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

Full SCIM provisioning in OIN. Supports SSO, SCIM, entitlements, universal logout, workflows. Supports Create users, Update user attributes, Deactivate users. Don't rename groups in Okta.

Databricks gates SCIM behind Premium. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → Databricks → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

Azure Databricks SCIM Provisioning Connector in gallery. Automatic identity management also available. Cannot sync nested groups via SCIM connector. Initial sync immediate, subsequent every 20-40 minutes.

Databricks gates SCIM behind Premium. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Unlock SCIM for
Databricks

Databricks gates SCIM behind Premium plan. We automate complete offboarding and access reviews across your stack without that SCIM Tax upgrade.

See how it works
Admin Console
Directory
Applications
Databricks logo
Databricks
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Amplitude logo

Amplitude

SCIM Tax

Product Analytics

SCIM StatusIncluded
Manual Cost$11,754/yr

Amplitude supports SCIM provisioning, but only on Growth plans (starting around $36K/year) or Enterprise plans with custom pricing. While Amplitude's SCIM implementation covers the core functionality—creating, updating, and deactivating users—it requires SCIM to be specifically enabled for your organization, and regenerating the SCIM key immediately invalidates existing integrations without warning. For product teams on Plus plans ($49/month), upgrading to Growth just to unlock SCIM means jumping from under $600/year to $36,000+/year—a 60x increase. That's often more than the entire analytics budget for smaller product teams. The gap becomes particularly problematic for cross-functional product teams where analysts, PMs, and engineers need varying levels of access to user behavior data, but manual provisioning creates security risks around sensitive analytics permissions.

View full guide
Bill.com logo

Bill.com

SCIM Tax

Accounts Payable / Receivable Automation

SCIM StatusIncluded
Manual Cost$11,754/yr

Bill.com offers inconsistent SCIM provisioning support that varies dramatically by identity provider. While Okta users can access SCIM provisioning through the OIN integration, Bill.com doesn't publish native SCIM documentation, and other IdPs like Entra ID are limited to SAML SSO only. This fragmented approach means your provisioning capabilities depend entirely on your IdP choice rather than Bill.com's platform features. For finance teams managing sensitive AP/AR workflows where user access directly impacts invoice approvals and payment processing, this inconsistency creates operational gaps—especially when onboarding new controllers, AP clerks, or accountants requires manual role assignment tied to spending limits and approval hierarchies. The real problem is that Bill.com gates all SSO functionality behind Enterprise plans with custom pricing (typically 2-3x their Corporate plan at $79/user/month), yet still provides no clear path to automated provisioning for most customers. Since financial systems require precise role-based access controls for SOX compliance and segregation of duties, manual user management creates both security risks and administrative overhead. When employees change departments or leave the company, orphaned accounts in payment systems pose significant financial and compliance risks that manual processes often miss.

View full guide
Bitwarden logo

Bitwarden

SCIM Tax

Password Manager / Secrets Management

SCIM StatusIncluded
Manual Cost$11,754/yr

Bitwarden supports SCIM 2.0 provisioning, but only on Teams ($4/user/month) and Enterprise ($6/user/month) plans. While this pricing is reasonable compared to other password managers, the real challenge lies in Bitwarden's zero-knowledge architecture: SCIM can provision user accounts, but users still need to manually accept vault invitations and set up their encryption keys before gaining access to shared passwords. This creates a critical security gap. Your identity provider shows users as "provisioned," but they can't actually access company passwords until they complete manual setup steps. When employees leave, SCIM deprovisioning removes their account, but any locally cached vault data remains accessible until they next sync. For security teams managing hundreds of shared credentials, this manual friction undermines the entire purpose of automated provisioning.

View full guide