Stitchflow
Docebo logo

Docebo SCIM guide

Native SCIM

How to automate Docebo user provisioning, and what it actually costs

Native SCIM requires Enterprise plan

Summary and recommendation

Docebo, the enterprise learning management system, does not support native SCIM provisioning on any plan. While Docebo offers SAML 2.0 SSO with Just-in-Time (JIT) provisioning for user creation, this approach has significant limitations for IT teams managing organizational learning programs. Most notably, the Direct Manager field—critical for manager-driven learning workflows and organizational hierarchy visibility—cannot be provisioned through any automated method. Additionally, third-party solutions like the Aquera connector for Okta or Docebo Connect for Entra ID may involve additional licensing costs and still don't address core field mapping limitations.

For organizations investing $25,000+ annually in Docebo (typical minimum enterprise contract), the inability to maintain accurate manager hierarchies creates operational friction. L&D teams lose visibility into reporting structures, automated course assignments by department become unreliable, and HR data synchronization requires manual intervention. With Docebo's pricing averaging $84-120 per user annually, these manual processes compound the total cost of ownership significantly.

The strategic alternative

Docebo gates SCIM behind Enterprise. Skip the Enterprise plan upgrade and automate complete outcomes across your stack. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredEnterprise
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0, OpenID Connect, ADFS 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Docebo accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Docebo pricing problem

Docebo gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
OktaAquera connector (3rd party)
Enterprise plan, API keys
Entra IDDocebo Connect recipes
Account manager activation, potential costs
Other IdPsSAML JIT only
Manual fallback required

Provisioning options by IdP

IdPMethodReliabilityRequirements
OktaAquera connector (3rd party)UnknownEnterprise plan, API keys
Entra IDDocebo Connect recipesProprietaryAccount manager activation, potential costs
Other IdPsSAML JIT onlyLimitedManual fallback required

Base pricing: Enterprise plans start around $25,000/year (~$7-10/user/month), with multi-year commitments required for cost reduction.

What this means in practice

For Okta users: You're dependent on Aquera's third-party connector, which adds another vendor relationship and potential failure point. The connector supports basic CRUD operations but introduces API key management overhead.

For Entra ID users: Docebo Connect recipes provide some automation, but require account manager involvement to activate and may carry additional costs beyond your base Enterprise subscription.

For everyone: Critical organizational data like manager hierarchies cannot be provisioned - the Direct Manager field simply isn't supported, forcing manual updates or leaving organizational structure incomplete in Docebo.

Additional constraints

No true SCIM standard
Each IdP uses different proprietary methods, making multi-IdP environments complex
Third-party dependency risk
Okta users rely entirely on Aquera's connector reliability and support
Manual manager hierarchy
Direct Manager relationships must be maintained manually, breaking automated org chart sync
Enterprise tier required
All provisioning options require expensive Enterprise contracts, typically $25K+ annually
SAML migration
Docebo is migrating to a new SAML interface in January 2026, potentially disrupting existing integrations

Summary of challenges

  • Docebo supports SCIM but only at Enterprise tier (Custom (based on users))
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Docebo actually offers for identity

SAML SSO with JIT Provisioning

Docebo provides SAML 2.0 integration with just-in-time user creation:

FeatureDetails
ProtocolSAML 2.0, OpenID Connect, ADFS 2.0
JIT Provisioning✓ Creates users on first login
Supported IdPsOkta, Entra ID, OneLogin, PingIdentity, Salesforce, ADFS
Field Locking✓ Can prevent users from editing provisioned attributes
SP/IdP InitiatedBoth supported

Critical limitation: The Direct Manager field cannot be provisioned through any method. This is a documented restriction that breaks manager hierarchy synchronization.

Third-Party Provisioning Options

Since Docebo doesn't offer native SCIM, two vendor-specific solutions exist:

ProviderMethodNotes
OktaAquera connector (OIN)Third-party API connector, requires Enterprise tier
MicrosoftDocebo ConnectProprietary integration, contact account manager to activate

Why these fall short: Both solutions are vendor-specific workarounds that still can't provision the Direct Manager field. The Aquera connector adds another vendor relationship, while Docebo Connect may have additional licensing costs and limited IdP support.

What's Missing

No SCIM standard
Forces you into proprietary integrations
No manager hierarchy sync
Direct Manager field is not provisionable through any method
Limited automation
JIT only works for user creation, not ongoing attribute updates
Vendor lock-in
Different solutions for different IdPs instead of standard SCIM

For learning management systems, manager hierarchy is often critical for course assignments and reporting structures. Docebo's inability to sync this data creates ongoing manual overhead for L&D teams.

What IT admins are saying

Docebo's lack of SCIM provisioning creates manual overhead for IT teams managing learning environments:

  • Direct Manager field cannot be provisioned, breaking organizational hierarchy sync
  • No automated user lifecycle management - manual account creation required
  • SCIM protocol not documented or available despite enterprise pricing
  • Reliance on JIT provisioning means users must attempt login before accounts exist

Direct Manager field not provisionable

Common limitation reported across identity management forums

User accounts must be created manually or through JIT provisioning only

Based on Docebo's SSO documentation lacking SCIM references

The recurring theme

At $25,000+ annual minimums, Docebo forces IT teams into manual provisioning workflows while competitors offer full SCIM automation. The missing Direct Manager sync is particularly problematic for L&D teams tracking reporting structures.

The decision

Your SituationRecommendation
Small L&D team (<20 learners)Manual management with JIT provisioning via SAML
Stable workforce with low turnoverJIT provisioning acceptable, but consider automation for growth
Enterprise with complex org hierarchyUse Stitchflow: Direct Manager sync essential for proper reporting
Multi-division learning programsUse Stitchflow: automation essential for department-based course enrollment
Compliance-heavy industriesUse Stitchflow: audit trail and automated deprovisioning required

The bottom line

Docebo offers JIT provisioning via SAML, but lacks SCIM support and can't sync critical fields like Direct Manager—a major limitation for enterprise learning programs that depend on organizational hierarchy. For companies that need proper manager relationships and automated provisioning workflows, Stitchflow delivers the automation Docebo can't provide natively.

Make Docebo workflows AI-native

Docebo gates SCIM behind Enterprise. We build complete offboarding, user access reviews, and license workflows without that SCIM Tax upgrade.

No Enterprise upgrade required
Less than a week, start to finish (~2 hours of your time)
We maintain the integration layer underneath
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Enterprise

Prerequisites

None

Key limitations

  • SCIM not documented
  • Direct Manager cannot be provisioned (relational field)
  • JIT provisioning available for user creation
  • Migrating to new SAML interface in Jan 2026

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Where to enable

Okta Admin Console → Applications → Docebo → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

Provisioning available via Aquera connector (third-party). Supports user create, update, deactivate, and delete. SSO via SAML.

Docebo gates SCIM behind Enterprise. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Where to enable

Entra admin center → Enterprise applications → Docebo → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

User provisioning via Docebo Connect recipes. Triggered by user create/update in Entra ID. Contact account manager to activate. May have associated costs.

Docebo gates SCIM behind Enterprise. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Unlock SCIM for
Docebo

Docebo gates SCIM behind Enterprise plan. We automate complete offboarding and access reviews across your stack without that SCIM Tax upgrade.

See how it works
Admin Console
Directory
Applications
Docebo logo
Docebo
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Absorb LMS logo

Absorb LMS

SCIM Tax

Learning Management System (LMS)

SCIM StatusIncluded
Manual Cost$11,754/yr

Absorb LMS supports native SCIM provisioning, but only on Enterprise plans with SSO as a required paid add-on. Even with SCIM enabled, the implementation has critical limitations: SAML provisioning only creates accounts on first login and never updates existing users, and full user provisioning requires the specific "Absorb 5 - New Learner Experience" version. For organizations managing compliance training across hundreds or thousands of learners, these gaps create ongoing manual work. The SSO-as-add-on model means you're paying extra fees on top of already custom Enterprise pricing ($6-12/user/month base, but varies significantly). For learning management systems handling external partners, contractors, and employees across different access levels, the inability to update existing user attributes through SAML provisioning forces IT teams into manual account management—exactly what automated provisioning should eliminate.

View full guide
Amplitude logo

Amplitude

SCIM Tax

Product Analytics

SCIM StatusIncluded
Manual Cost$11,754/yr

Amplitude supports SCIM provisioning, but only on Growth plans (starting around $36K/year) or Enterprise plans with custom pricing. While Amplitude's SCIM implementation covers the core functionality—creating, updating, and deactivating users—it requires SCIM to be specifically enabled for your organization, and regenerating the SCIM key immediately invalidates existing integrations without warning. For product teams on Plus plans ($49/month), upgrading to Growth just to unlock SCIM means jumping from under $600/year to $36,000+/year—a 60x increase. That's often more than the entire analytics budget for smaller product teams. The gap becomes particularly problematic for cross-functional product teams where analysts, PMs, and engineers need varying levels of access to user behavior data, but manual provisioning creates security risks around sensitive analytics permissions.

View full guide
Bill.com logo

Bill.com

SCIM Tax

Accounts Payable / Receivable Automation

SCIM StatusIncluded
Manual Cost$11,754/yr

Bill.com offers inconsistent SCIM provisioning support that varies dramatically by identity provider. While Okta users can access SCIM provisioning through the OIN integration, Bill.com doesn't publish native SCIM documentation, and other IdPs like Entra ID are limited to SAML SSO only. This fragmented approach means your provisioning capabilities depend entirely on your IdP choice rather than Bill.com's platform features. For finance teams managing sensitive AP/AR workflows where user access directly impacts invoice approvals and payment processing, this inconsistency creates operational gaps—especially when onboarding new controllers, AP clerks, or accountants requires manual role assignment tied to spending limits and approval hierarchies. The real problem is that Bill.com gates all SSO functionality behind Enterprise plans with custom pricing (typically 2-3x their Corporate plan at $79/user/month), yet still provides no clear path to automated provisioning for most customers. Since financial systems require precise role-based access controls for SOX compliance and segregation of duties, manual user management creates both security risks and administrative overhead. When employees change departments or leave the company, orphaned accounts in payment systems pose significant financial and compliance risks that manual processes often miss.

View full guide