Stitchflow
Dropbox logo

Dropbox SCIM guide

Native SCIM

How to automate Dropbox user provisioning, and what it actually costs

Native SCIM requires Standard, Advanced, or Enterprise plan

Summary and recommendation

Dropbox Business supports SCIM 2.0 provisioning on Standard plans and above ($15/user/month), with solid integration across major identity providers including Okta, Azure AD, and Google Workspace. However, there's a critical architectural limitation: Dropbox Sign (formerly HelloSign) operates as a separate product that doesn't support SCIM at all, despite being a core part of many organizations' document workflows.

This creates a significant provisioning gap for IT teams. While your main Dropbox storage accounts can be automatically managed, any users who need access to Dropbox Sign must be manually provisioned and deprovisioned. For organizations relying on both products, this means maintaining hybrid workflows where some users are automated and others require manual intervention—exactly the kind of inconsistency that leads to compliance issues and security gaps during employee transitions.

The strategic alternative

Stitchflow provides unified provisioning automation across all Dropbox products, including Dropbox Sign, without requiring enterprise upgrades. Works with any Dropbox Business plan. Flat pricing under $5K/year, regardless of team size.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredBusiness
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Dropbox accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Dropbox pricing problem

Dropbox gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Plan Structure (Minimum 3 Users, Billed Monthly)

PlanPriceSSOSCIM
Professional$12/user/mo
Standard$15/user/mo
Advanced$20/user/mo
Enterprise~$24/user/mo

Note: Annual billing provides 20% discount. SCIM 2.0 available through Azure AD and Google Cloud Identity integrations.

What this means in practice

Using current list prices (Professional → Standard for SCIM access):

Team SizeAnnual Upgrade CostMonthly Upgrade Cost
25 users+$900/year+$75/month
50 users+$1,800/year+$150/month
100 users+$3,600/year+$300/month

Calculation: $3/user difference × users × billing period

Additional constraints

Product fragmentation
Dropbox Sign (HelloSign) does NOT support SCIM despite being part of the Dropbox ecosystem, requiring separate manual management.
Connector migration required
Azure AD users must migrate from the deprecated connector to the new SCIM 2.0 connector, creating deployment friction.
Minimum user requirement
3-user minimum applies to all business plans, preventing smaller team deployments.
Feature inconsistency
SCIM functionality varies significantly between Dropbox products, complicating unified identity management strategies.

Summary of challenges

  • Dropbox supports SCIM but only at Business tier (~$24/user/mo)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

Dropbox doesn't sell SCIM à la carte. It's bundled with their Standard plan and above business features:

SCIM 2.0 automated provisioning via Azure AD and Google Cloud Identity
SAML single sign-on (SSO)
Advanced sharing controls and link permissions
Team folder management and governance
Enhanced security monitoring and audit logs
Remote device wipe capabilities
Admin console with user management
Priority support

If you need comprehensive file sharing governance, the Standard plan ($15/user/month) delivers solid value. But if you're upgrading purely for automated provisioning, roughly 60% of the business features won't apply to your use case. And the Dropbox Sign gap means you're still managing identity manually for document workflows.

Stitchflow Insight

Dropbox Sign (HelloSign) has no SCIM support despite being part of the business ecosystem. You'll manage two separate user bases.

What IT admins are saying

Community sentiment on Dropbox's fragmented SCIM support is increasingly frustrated. Common complaints:

  • Dropbox Sign (HelloSign) completely lacks SCIM despite being a core business tool
  • Migration headaches from deprecated Azure AD connectors to SCIM 2.0
  • Feature inconsistency across Dropbox products creates operational complexity
  • Having to manage multiple provisioning workflows for what feels like one platform

It's frustrating that we can automate Dropbox but still have to manually manage HelloSign users. They're the same company but feel like completely different systems.

IT Admin, Reddit

Had to scramble to migrate our Azure connector when they deprecated the old one. Would have been nice to get more warning about the SCIM 2.0 requirement.

Enterprise Admin, Spiceworks

The recurring theme

Dropbox's product fragmentation means IT teams can't rely on consistent SCIM coverage across their file storage and document signing workflows, creating operational gaps despite paying for "unified" Dropbox Business.

The decision

Your SituationRecommendation
On Professional plan, need SCIMUse Stitchflow: avoid the $15-24/user/month Standard upgrade
Using Dropbox Sign, need provisioningUse Stitchflow: Dropbox Sign has no SCIM support
Already on Standard/Advanced/EnterpriseUse native SCIM: you're paying for it
Mixed Dropbox + Dropbox Sign environmentUse Stitchflow: covers both products uniformly
Small team, infrequent user changesManual may work: but watch for security gaps

The bottom line

Dropbox's tier restrictions mean SCIM requires upgrading from Professional ($12/user/month) to Standard ($15/user/month) or higher, while Dropbox Sign users have no native option at all. For teams wanting provisioning automation without plan upgrades or product limitations, Stitchflow provides comprehensive coverage across both Dropbox products.

Automate Dropbox without the tier upgrade

Stitchflow delivers SCIM-level provisioning through resilient browser automation, backed by 24/7 human in the loop for Dropbox at <$5K/year, flat, regardless of team size.

Works alongside or instead of native SCIM
Syncs with your existing IdP (Okta, Entra ID, Google Workspace)
Automates onboarding and offboarding
SOC 2 Type II certified
24/7 human-in-the-loop monitoring
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Business

Prerequisites

SSO must be configured first

Key limitations

  • Dropbox Sign (HelloSign) does NOT support SCIM
  • Need to migrate to new SCIM 2.0 connector for Azure AD
  • SCIM functionality varies by product (Dropbox vs Dropbox Sign)

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Dropbox → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

Full SCIM provisioning with group push, silent provisioning (no welcome emails), and offboarding workflows. Supports AD/LDAP sync. Granular control over deactivation actions. Schema discovery and attribute writeback supported.

Native SCIM is available on Business. Use Stitchflow if you need provisioning without the tier upgrade.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → Dropbox → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

Migrate to new SCIM 2.0 connector (old connector deprecated). Supports automatic user provisioning and group sync. Configure in Azure Portal > Enterprise Applications > Provisioning. Requires DocuSign admin with at least Cloud App Administrator role.

Native SCIM is available on Business. Use Stitchflow if you need provisioning without the tier upgrade.

Unlock SCIM for
Dropbox

Stop paying the SCIM Tax for Dropbox. Get enterprise-grade SCIM at a fraction of the enterprise plan cost.

See how it works
Admin Console
Directory
Applications
Dropbox logo
Dropbox
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

15Five logo

15Five

Has SCIM

Performance Management / Employee Engagement

SCIM StatusIncluded
Manual Cost$11,754/yr

15Five includes SCIM provisioning on all plans starting at $4/user/month, with full support for creating, updating, and deactivating users across Okta, Entra ID, Google Workspace, and OneLogin. However, 15Five's SCIM implementation has a critical prerequisite: SSO must be configured first, and their documentation explicitly warns against using JIT provisioning alongside SCIM due to duplicate user creation risks. This creates operational friction for IT teams managing performance management rollouts. The SSO-first requirement means you can't test SCIM provisioning in isolation, and the JIT conflict forces you to choose between automated onboarding convenience and reliable user lifecycle management. For HR-driven tools like 15Five that need to maintain accurate manager hierarchies and team structures, these provisioning gaps can disrupt performance review cycles and employee engagement tracking.

View full guide
Atlassian Jira Service Management logo

Atlassian Jira Service Management

Has SCIM

IT Service Management / ITSM

SCIM StatusIncluded
Manual Cost$11,946/yr

Atlassian Jira Service Management supports SCIM 2.0 for provisioning both support agents and customers, but only with an Atlassian Guard Standard subscription on top of your existing JSM plan. This means paying for two separate subscriptions: JSM ($20-57/agent/month) plus Guard for SCIM functionality. For enterprise teams with 201+ agents, this often results in six-figure annual costs just to enable automated provisioning. The dual subscription model creates significant budget friction for IT teams who need basic user lifecycle management. Without SCIM, you're manually managing agent accounts and customer portal access, creating security gaps when employees change roles or leave. JSM's customer provisioning complexity—requiring specific product access roles and organization mapping—makes manual management even more error-prone for large service desk operations.

View full guide
AWS IAM Identity Center logo

AWS IAM Identity Center

Has SCIM

Cloud Infrastructure / Identity Management

SCIM StatusIncluded
Manual Cost$14,407/yr

AWS IAM Identity Center supports SCIM 2.0 provisioning and is completely free—no additional licensing costs beyond your AWS account. However, the implementation has significant operational limitations that create ongoing management overhead for IT teams. The core issues: SCIM sync runs every 20-40 minutes (not real-time), multivalue attributes aren't supported, and once SCIM is enabled, you lose the ability to manually manage users through the AWS console. More problematic, Azure AD users face nested group limitations and attribute removal sync issues, while all IdPs must work around the requirement for specific mandatory fields (First name, Last name, Username, Display name). For organizations managing complex AWS multi-account environments with varying permission sets, these constraints force manual workarounds that undermine automation benefits. While IAM Identity Center's free pricing is attractive, the operational friction from sync delays, attribute limitations, and console lockout creates hidden administrative costs—especially when managing hundreds of users across multiple AWS accounts with different access requirements.

View full guide