Stitchflow
Fullstory logo

Fullstory SCIM guide

Native SCIM

How to automate Fullstory user provisioning, and what it actually costs

Native SCIM requires Enterprise plan

Summary and recommendation

Fullstory supports SCIM for automated user provisioning, but only through Okta and only on Enterprise plans (~$10,000+/year minimum). The setup requires creating a custom SAML application in Okta rather than using their published integration. Additionally, SCIM deactivation doesn't actually delete users from Fullstory—it only marks them as inactive, requiring manual cleanup to maintain compliance.

For growing product teams, this creates a significant operational burden. While SSO handles authentication, IT teams must still manually provision users on lower-tier plans ($199-1,000/month), track session-based licensing, and manually remove departed employees to avoid compliance issues with customer data access. Given Fullstory's role in capturing user behavior data, maintaining proper access controls is critical.

The strategic alternative

Fullstory gates SCIM behind Enterprise. That can unlock provisioning, but it still does not complete the offboarding, access review, or license workflow across the rest of your stack. Stitchflow builds and maintains the IT workflows your team still runs manually, across every app, including the ones without APIs.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredEnterprise
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDSSO only
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Fullstory accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Fullstory pricing problem

Fullstory gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Plan Structure

PlanPriceSSOSCIM
BusinessFrom $199/month
Advanced$300-1,000/month
EnterpriseCustom (~$10,000+/year)

Note: Pricing varies significantly based on session volume and data retention requirements. Enterprise includes SAML SSO, advanced permissions, and compliance features beyond SCIM.

What this means in practice

The Enterprise requirement creates substantial cost increases for teams needing automated provisioning:

Minimum Enterprise commitment: Most customers report ~$10,000/year minimum spend, regardless of actual session usage.

From Advanced tier: Teams on $300-600/month Advanced plans face 15-30x cost increases to access SCIM provisioning.

Session-based complexity: Unlike per-seat SaaS pricing, Fullstory's session-based model makes it difficult to predict exact Enterprise costs without custom quotes.

Additional constraints

Okta-only SCIM
Currently limited to Okta via custom SAML app configuration, not the published Okta integration.
Manual deletion required
Users deleted from IdP don't automatically get removed from Fullstory, requiring ongoing manual cleanup.
Custom SAML setup
Cannot use Fullstory's published Okta app for SCIM - requires creating custom SAML 2.0 application.
Limited IdP support
Other identity providers (Entra ID, Google Workspace) only get JIT provisioning, not full SCIM automation.

Summary of challenges

  • Fullstory supports SCIM but only at Enterprise tier (Custom (~$10,000+/year minimum))
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

Fullstory doesn't sell SCIM à la carte. It's bundled with Enterprise features that most teams won't need:

SCIM automated provisioning (Okta only, via custom SAML app)
SAML single sign-on with JIT provisioning
Advanced user permissions and role management
PCI DSS and CCPA compliance features
Dedicated customer success manager
Priority support and SLA guarantees
Advanced data governance controls
Custom data retention policies

The Enterprise tier starts around $10,000+ annually—a massive jump from Advanced plans at $300-1,000/month. If you just need automated user provisioning for your product analytics team, you're paying for compliance and governance features that 80% of companies never use. Plus, the SCIM limitation to Okta-only means teams using Entra ID or Google Workspace are stuck with manual provisioning regardless of what they pay.

What IT admins are saying

Community sentiment on Fullstory's SCIM implementation is mixed, with frustration centered on complexity and limitations. Common complaints:

  • SCIM only works through Okta with a custom SAML app setup
  • Published Okta integration doesn't include SCIM provisioning
  • Users aren't automatically deleted from Fullstory when deactivated in IdP
  • Enterprise tier requirement creates a significant cost barrier for smaller teams

Having to set up a custom SAML app just to get SCIM working feels like an unnecessary workaround when other analytics tools have this built-in.

IT Administrator, Reddit

The fact that deactivating users in Okta doesn't remove them from Fullstory means we're still doing manual cleanup - kind of defeats the purpose of automation.

SysAdmin Forum

The recurring theme

While Fullstory offers SCIM, the Okta-only limitation and incomplete lifecycle management forces IT teams into workarounds and manual processes that undermine the automation benefits.

The decision

Your SituationRecommendation
On Business plan, need SCIMUse Stitchflow: avoid the $10K+ Enterprise jump
Already on Enterprise with OktaUse native SCIM: you're paying for it, just requires custom SAML setup
Using Azure AD or other IdPsUse Stitchflow: Fullstory only supports SCIM via Okta
Need user deletion automationUse Stitchflow: native SCIM doesn't auto-delete deactivated users
Small product team, low churnManual may work: but monitor for abandoned analytics access

The bottom line

Fullstory gates SCIM behind Enterprise. The upgrade may unlock provisioning, but the workflow still has to complete across the rest of your stack.

Close the Fullstory workflow gap

Fullstory gates SCIM behind Enterprise, but the bigger issue is the workflow around it. Stitchflow builds and maintains the offboarding, access review, or license workflow underneath.

Across every app in the workflow, including the ones without APIs
Built in less than a week, with roughly 2 hours from your team
You review the exceptions. Stitchflow maintains the workflow underneath
Start with the free gap diagnostic

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Enterprise

Prerequisites

SSO must be configured first

Key limitations

  • SCIM currently only via Okta
  • Requires custom SAML app (not published Okta app)
  • User deletion from IdP doesn't auto-delete from Fullstory
  • Roles: Admin, Architect, Standard, Guest

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Fullstory → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

Published Okta app doesn't support SCIM natively. Must create custom SAML 2.0 app to enable SCIM. Supports Create Users, Update User Attributes, Deactivate Users. Role mapping via IdP attributes (Admin, Architect, Standard, Guest - umbrella manager not supported via SCIM).

Fullstory gates SCIM behind Enterprise. The upgrade may unlock provisioning, but the workflow still has to complete across the rest of your stack.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → Fullstory → Single sign-on

SAML SSO with JIT provisioning only. Users created on first SSO login. No SCIM-based automatic provisioning documented for Entra ID.

Use Stitchflow for automated provisioning.

Close the workflow gap in
Fullstory

Fullstory gates SCIM behind Enterprise plan. That can unlock provisioning, but it still does not complete the offboarding, access review, or license workflow across your stack.

Start with the free gap diagnostic
Admin Console
Directory
Applications
Fullstory logo
Fullstory
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Amplitude logo

Amplitude

SCIM Tax

Product Analytics

SCIM StatusIncluded
Manual Cost$11,754/yr

Amplitude supports SCIM provisioning, but only on Growth plans (starting around $36K/year) or Enterprise plans with custom pricing. While Amplitude's SCIM implementation covers the core functionality—creating, updating, and deactivating users—it requires SCIM to be specifically enabled for your organization, and regenerating the SCIM key immediately invalidates existing integrations without warning. For product teams on Plus plans ($49/month), upgrading to Growth just to unlock SCIM means jumping from under $600/year to $36,000+/year—a 60x increase. That's often more than the entire analytics budget for smaller product teams. The gap becomes particularly problematic for cross-functional product teams where analysts, PMs, and engineers need varying levels of access to user behavior data, but manual provisioning creates security risks around sensitive analytics permissions.

View full guide
Bill.com logo

Bill.com

SCIM Tax

Accounts Payable / Receivable Automation

SCIM StatusIncluded
Manual Cost$11,754/yr

Bill.com offers inconsistent SCIM provisioning support that varies dramatically by identity provider. While Okta users can access SCIM provisioning through the OIN integration, Bill.com doesn't publish native SCIM documentation, and other IdPs like Entra ID are limited to SAML SSO only. This fragmented approach means your provisioning capabilities depend entirely on your IdP choice rather than Bill.com's platform features. For finance teams managing sensitive AP/AR workflows where user access directly impacts invoice approvals and payment processing, this inconsistency creates operational gaps—especially when onboarding new controllers, AP clerks, or accountants requires manual role assignment tied to spending limits and approval hierarchies. The real problem is that Bill.com gates all SSO functionality behind Enterprise plans with custom pricing (typically 2-3x their Corporate plan at $79/user/month), yet still provides no clear path to automated provisioning for most customers. Since financial systems require precise role-based access controls for SOX compliance and segregation of duties, manual user management creates both security risks and administrative overhead. When employees change departments or leave the company, orphaned accounts in payment systems pose significant financial and compliance risks that manual processes often miss.

View full guide
Bitwarden logo

Bitwarden

SCIM Tax

Password Manager / Secrets Management

SCIM StatusIncluded
Manual Cost$11,754/yr

Bitwarden supports SCIM 2.0 provisioning, but only on Teams ($4/user/month) and Enterprise ($6/user/month) plans. While this pricing is reasonable compared to other password managers, the real challenge lies in Bitwarden's zero-knowledge architecture: SCIM can provision user accounts, but users still need to manually accept vault invitations and set up their encryption keys before gaining access to shared passwords. This creates a critical security gap. Your identity provider shows users as "provisioned," but they can't actually access company passwords until they complete manual setup steps. When employees leave, SCIM deprovisioning removes their account, but any locally cached vault data remains accessible until they next sync. For security teams managing hundreds of shared credentials, this manual friction undermines the entire purpose of automated provisioning.

View full guide