Stitchflow
DISCO logo

DISCO SCIM guide

Connector Only

How to automate DISCO user provisioning, and what it actually costs

Native SCIM not available

Summary and recommendation

DISCO, the eDiscovery platform used by law firms and corporate legal departments, does not offer SCIM provisioning on any plan. While DISCO supports SAML-based SSO with identity providers like Okta and Azure AD, this only handles authentication for existing users. User accounts must still be created and managed manually through DISCO's interface, with SSO configured per email domain rather than through centralized provisioning protocols.

This creates a significant operational burden for legal IT teams managing large case teams or frequent personnel changes. Without automated provisioning, administrators must manually create accounts for new attorneys, paralegals, and contractors, then remember to deprovision access when cases close or team members leave. Given DISCO's role in handling sensitive litigation data, manual user management introduces both security risks and compliance gaps that legal teams cannot afford.

The strategic alternative

DISCO has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaSSO via SAML supported. No OIN connector for provisioning.
Microsoft Entra IDSSO via SAML with Azure AD as IdP. No SCIM provisioning.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages DISCO accounts manually. Here's what that costs:

Source: Stitchflow research, normalized to 500 employees:
Orphaned accounts (ex-employees with access)5
Unused licenses12
IT hours spent on manual management/year85 hours
Unused license cost/year$3,500
IT labor cost/year$5,100
Cost of compliance misses/year$890
Total annual financial impact$9,490

The DISCO pricing problem

DISCO gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
ProNot disclosed
BusinessNot disclosed
EnterpriseCustom per-GB pricing

Pricing and provisioning availability

PlanPriceSSOSCIM
ProNot disclosed
BusinessNot disclosed
EnterpriseCustom per-GB pricing

Pricing transparency issues

No public pricing for any tier
Custom per-GB storage model requires sales engagement
Enterprise managed services available at $250/hour for configuration assistance

What this means in practice

Without SCIM provisioning, IT administrators must handle all user management tasks manually:

New hires
Create accounts through DISCO's web interface, assign appropriate cases/projects, configure role-based permissions
Role changes
Update user permissions manually when staff move between legal matters or change responsibilities
Departures
Remember to deactivate accounts and transfer case ownership - no automated deprovisioning when users are removed from your IdP

For legal teams handling sensitive eDiscovery data, this manual overhead creates both operational burden and compliance risk.

Additional constraints

Domain-based SSO configuration
Authentication is configured per email domain, limiting flexibility for organizations with multiple domains
No identity provider connectors
Neither Okta OIN nor Entra gallery connectors exist, requiring custom SAML configuration
Limited IdP support
SSO works with Okta, Azure AD, and ADFS only - no support for Google Workspace or other providers
Storage-based pricing opacity
Per-GB pricing model makes cost planning difficult without detailed storage usage forecasting

Summary of challenges

  • DISCO does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What DISCO actually offers for identity

SAML SSO (All plans)

DISCO supports basic SAML 2.0 integration with identity providers:

SettingDetails
ProtocolSAML 2.0
Supported IdPsOkta, Azure AD, ADFS
ConfigurationDomain-based SSO setup
User requirementManual account creation required
ProvisioningNone - SSO authentication only

Critical limitation: DISCO's SSO is authentication-only. Users must be manually created in DISCO before they can authenticate via SSO. There's no automated user lifecycle management.

Okta Integration Status

FeatureSupported?
SAML SSO✓ Yes
OIN connector❌ No
Create users❌ No
Update users❌ No
Deactivate users❌ No
Group mapping❌ No

Azure AD Integration Status

FeatureSupported?
SAML SSO✓ Yes
Gallery app❌ No
User provisioning❌ No
Group sync❌ No
Attribute mapping❌ No

The reality: DISCO provides basic federated authentication but zero provisioning capabilities. IT teams still handle all user lifecycle tasks manually - creating accounts, updating roles, and deactivating users when they leave. For an eDiscovery platform handling sensitive legal data, this manual overhead creates both operational burden and security gaps.

What IT admins are saying

DISCO's lack of automated provisioning forces IT teams into manual account management workflows:

  • Manual user creation required even with SSO configured
  • No visibility into who has access without logging into DISCO directly
  • Deprovisioning requires remembering to manually remove users from yet another system
  • Custom per-GB pricing model makes budgeting difficult without sales engagement

SSO via SAML only - supports Okta, Azure AD, ADFS but no automated provisioning means we're still managing users manually in DISCO.

IT Administrator, Legal Services Firm

Enterprise managed services at $250/hr just to help with basic configuration feels excessive when other eDiscovery platforms include this.

Infrastructure Manager, Law Firm

The recurring theme

DISCO treats SSO and user provisioning as separate problems. IT teams get single sign-on but must still manually create, update, and remove user accounts in DISCO whenever their team changes.

The decision

Your SituationRecommendation
Small legal team (<10 users) with stable rosterManual management is workable
Mid-size firm with quarterly litigation wavesUse Stitchflow: user scaling automation essential
Enterprise legal department (50+ users)Use Stitchflow: automation required for compliance
Multi-matter teams with external counsel accessUse Stitchflow: complex access patterns need automation
Firms with strict audit requirementsUse Stitchflow: automated provisioning creates audit trail

The bottom line

DISCO offers powerful eDiscovery capabilities but provides no identity automation—just SAML SSO with manual user management. For legal teams managing complex access patterns across multiple matters and external counsel, Stitchflow delivers the SCIM-level provisioning automation that DISCO should have built.

Make DISCO workflows AI-native

DISCO has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No native SCIM endpointSSO via SAML only - supports Okta, Azure AD, ADFSNo Okta OIN or Entra gallery connectorCustom per-GB pricing requires sales contactSSO configured per email domainEnterprise managed services available at $250/hr

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No native SCIM endpoint
  • SSO via SAML only - supports Okta, Azure AD, ADFS
  • No Okta OIN or Entra gallery connector
  • Custom per-GB pricing requires sales contact
  • SSO configured per email domain
  • Enterprise managed services available at $250/hr

Documentation not available.

Unlock SCIM for
DISCO

DISCO has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
DISCO logo
DISCO
via Stitchflow

Last updated: 2026-01-20

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Abnormal Security logo

Abnormal Security

No SCIM

Security / Email Security

ProvisioningNot Supported
Manual Cost$9,490/yr

Abnormal Security, the AI-powered email security platform protecting against BEC and phishing attacks, does not offer SCIM provisioning on any plan. While the platform supports SAML 2.0 SSO integration with identity providers like Okta and Entra ID, this only handles authentication—not automated user lifecycle management. Security teams must manually provision and deprovision analyst access through Abnormal's portal, creating operational overhead and potential security gaps in a platform specifically designed to protect against email-based threats. This manual provisioning model creates significant challenges for security operations. When new SOC analysts join or existing team members change roles, IT admins must coordinate manual account creation and permission updates in Abnormal Security. For a platform that's critical to threat detection and incident response, delays in provisioning can leave security gaps, while delayed deprovisioning creates compliance risks. The irony is stark: a security platform designed to prevent account takeover and credential abuse lacks the automated provisioning controls that prevent exactly these risks.

View full guide
Airwallex logo

Airwallex

No SCIM
ProvisioningNot Supported
Manual Cost$9,490/yr

Airwallex, the global payments and treasury platform, offers no SCIM provisioning support on any plan, including their custom Accelerate enterprise tier. Despite being positioned for enterprise use with features like multi-entity management and advanced treasury controls, Airwallex lacks any official identity provider integrations—no SSO, no provisioning, and no presence in major IdP galleries like Okta's OIN or Microsoft Entra. This creates a significant operational burden for IT teams managing financial access across growing organizations, where manual user provisioning and deprovisioning in a payments platform presents both efficiency and security risks. The absence of identity management capabilities means IT administrators must manually create, update, and remove user accounts in Airwallex—a particularly concerning gap given that this platform handles sensitive financial operations, cross-border payments, and treasury management. Without automated deprovisioning, former employees could retain access to financial systems, creating compliance risks and potential security vulnerabilities that most finance and IT teams cannot afford to overlook.

View full guide
Alkami logo

Alkami

No SCIM
ProvisioningNot Supported
Manual Cost$9,490/yr

Alkami, the digital banking platform used by banks and credit unions, does not offer SCIM provisioning or public SSO integrations. As an enterprise-only platform with custom pricing, Alkami appears to handle user management through direct account administration rather than standardized identity protocols. This creates significant challenges for financial institutions that need to integrate Alkami with their existing identity infrastructure—particularly problematic given the compliance requirements and security standards that banks must maintain. The lack of automated provisioning means IT teams at financial institutions must manually create, update, and deprovision user accounts in Alkami. For a platform handling sensitive financial data and customer information, this manual approach introduces compliance risks and operational overhead. Banks typically require seamless integration between their core identity systems and all applications accessing customer data.

View full guide