Stitchflow
Document360 logo

Document360 SCIM guide

Connector Only

How to automate Document360 user provisioning, and what it actually costs

Summary and recommendation

Document360, the knowledge base platform used by technical writing teams and support organizations, does not support SCIM provisioning on any plan. While Document360 offers SAML 2.0 and OpenID Connect SSO with auto-registration for readers on Enterprise plans, this only handles authentication for existing users—not automated user lifecycle management. IT teams still face the manual burden of creating, updating, and deprovisioning user accounts across both internal team members and external documentation readers.

This creates a significant operational gap for organizations managing documentation access at scale. Reader access management becomes particularly challenging when dealing with customer-facing documentation that requires frequent access changes. Without SCIM, IT teams must manually coordinate user provisioning with documentation administrators, leading to delayed access for new team members and potential security risks from orphaned accounts when employees leave. The auto-registration feature helps with initial access but doesn't address ongoing lifecycle management or bulk user operations.

The strategic alternative

Document360 has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0, OpenID Connect
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaVia third-partySSO via SAML 2.0 or OpenID Connect with Okta documented. No SCIM provisioning available. Auto-registration for SSO readers supported.
Microsoft Entra IDVia third-partySSO tutorial available in Microsoft docs. No SCIM provisioning. JIT provisioning via auto-registration only.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Document360 accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Document360 pricing problem

Document360 gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Standard plansCustom quote
EnterpriseCustom quote

Pricing structure

PlanPriceSSOSCIM
Standard plansCustom quote
EnterpriseCustom quote

Document360 pricing context

All pricing is custom/quote-based with no public rates
14-day free trial available
Startup program
6 months free on Business/Enterprise, then 50% off for 6 months
SSO requires Enterprise tier with custom pricing

What this means in practice

Without SCIM, IT teams managing Document360 face several operational challenges:

Reader access management issues

External documentation readers can't be pre-provisioned
Internal team members must manually log in before appearing in admin dashboards
No way to bulk create accounts or manage user lifecycles programmatically

Manual deprovisioning risks

Departing employees retain access until manually removed
No automated way to suspend accounts when users are disabled in your IdP
Documentation access often overlooked during offboarding processes

Additional constraints

SSO protocol limitations
SAML and OpenID Connect are mutually exclusive (can't use both simultaneously)
JIT-only provisioning
Users must authenticate before accounts exist in Document360
No API-based user management
All user lifecycle management requires manual admin intervention
Mixed internal/external access
Complex to manage when documentation serves both employees and customers

Summary of challenges

  • Document360 does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Document360 actually offers for identity

SAML 2.0 & OpenID Connect SSO (Enterprise tier)

Document360 supports federated authentication through both SAML and OpenID Connect:

SettingDetails
ProtocolSAML 2.0 or OpenID Connect (mutually exclusive)
Supported IdPsOkta, Entra ID, Auth0, ADFS, Google, generic SAML/OIDC
JIT Provisioning✓ Auto-registration for SSO readers
SP-initiated✓ Yes
Multiple endpoints✓ Yes

Key limitation: You can use either SAML or OpenID Connect, but not both simultaneously. JWT authentication can coexist with either protocol.

What's Missing: User Lifecycle Management

Document360's identity features stop at authentication. There's no SCIM provisioning documented anywhere:

SCIM FeatureDocument360
Create users❌ No
Update user attributes❌ No
Deactivate users❌ No
Group management❌ No
Role assignment❌ No

The problem: While auto-registration handles initial user creation via SSO, you have no automated way to manage user attributes, roles, or deactivation. When someone leaves your organization or changes roles, you're back to manual administration in Document360's interface.

For documentation platforms where reader access often spans multiple teams and external stakeholders, this creates significant administrative overhead as your user base grows.

What IT admins are saying

Document360's lack of automated user provisioning forces IT teams into manual processes:

  • Every user must be manually added to Document360 before they can use SSO
  • No way to automatically sync team changes from your identity provider
  • Reader access management becomes a bottleneck for support and documentation teams
  • Offboarding requires manual cleanup in Document360 separate from IdP deprovisioning

Auto-registration is available for SSO readers... User accounts must exist in Document360 to use single sign-on for team members.

Document360 official documentation

SAML and OpenID are mutually exclusive and cannot be used together.

Document360 SSO documentation

The recurring theme

Document360 offers SSO authentication but stops short of true provisioning automation. IT teams still manage user lifecycle manually, creating operational overhead every time someone joins the documentation team or needs reader access.

The decision

Your SituationRecommendation
Small documentation team (<10 writers)Manual management with SSO is workable
Internal docs with stable teamUse SAML/OIDC SSO with auto-registration
External knowledge base with reader churnUse Stitchflow: reader access automation essential
Enterprise with compliance requirementsUse Stitchflow: audit trail and deprovisioning critical
Multi-brand documentation sitesUse Stitchflow: centralized identity management required

The bottom line

Document360 offers solid SSO with auto-registration, but lacks SCIM provisioning entirely. For organizations managing external readers or needing automated deprovisioning for compliance, Stitchflow delivers the identity automation that Document360 simply doesn't provide.

Make Document360 workflows AI-native

Document360 has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

SCIM provisioning not documentedSAML and OpenID are mutually exclusive (cannot use both)JWT can coexist with SAML/OpenID

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • SCIM provisioning not documented
  • SAML and OpenID are mutually exclusive (cannot use both)
  • JWT can coexist with SAML/OpenID

Documentation not available.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → Document360 → Single sign-on

SSO tutorial available in Microsoft docs. No SCIM provisioning. JIT provisioning via auto-registration only.

Use Stitchflow for automated provisioning.

Unlock SCIM for
Document360

Document360 has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Document360 logo
Document360
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Slab logo

Slab

SCIM Tax

Knowledge Base / Documentation

SCIM Tax+87%
Manual Cost$11,754/yr

Slab supports native SCIM provisioning, but only on Business ($12.50/user/month) and Enterprise plans. The SCIM integration requires SAML SSO to be configured first and has notable limitations: username changes in your identity provider aren't supported (which can break synchronization), users assigned before SCIM was enabled need manual reassignment, and automatic password sync isn't available. For teams currently on Starter plans ($6.67/user/month), upgrading to Business represents an 87% price increase solely to unlock automated provisioning. For a 50-person team, that's an additional $3,500/year in licensing costs. The SCIM setup process is also more complex than typical integrations, requiring SAML configuration as a prerequisite and careful handling of existing user assignments.

View full guide
Slite logo

Slite

SCIM Tax

Knowledge Base / Documentation

SCIM StatusIncluded
Manual Cost$11,754/yr

Slite supports SCIM provisioning, but only on Enterprise plans with custom pricing. While their Enhanced plan ($10/user/month) includes OpenID Connect SSO, SCIM automation requires upgrading to Enterprise—a pricing tier that forces you into a sales conversation without transparent costs. For teams currently on Standard ($8/user/month) or Enhanced plans, this creates an unpredictable budget impact just to automate user lifecycle management. This pricing structure creates a significant gap for IT teams. You get basic SSO on Enhanced, but still face manual user provisioning tasks—creating accounts, updating attributes when people change roles, and deactivating users when they leave. Without automated deprovisioning, former employees retain access to your knowledge base, creating compliance risks around sensitive documentation and company information.

View full guide
6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide