Stitchflow
Ganttic logo

Ganttic SCIM guide

Connector Only

How to automate Ganttic user provisioning, and what it actually costs

Summary and recommendation

Ganttic, the resource planning and project portfolio management platform, does not support SCIM provisioning on any plan. While Ganttic offers SAML SSO integration with Microsoft Azure and OneLogin for authentication, this leaves IT teams with significant gaps in user lifecycle management. For PMOs and resource managers who need to control access to resource pools and project visibility, the lack of automated provisioning means manual user management across potentially dozens of project resources and team members.

This creates a particular challenge for resource planning environments where team compositions change frequently based on project needs. Without automated provisioning, IT administrators must manually create, update, and deactivate user accounts each time project teams are restructured or when employees change roles—a time-consuming process that introduces security risks and compliance gaps. The combination of unlimited users on all plans with manual-only provisioning creates an administrative burden that scales with organizational growth.

The strategic alternative

Ganttic has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolNot documented
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaVia third-partyNo dedicated Okta OIN integration found. May support SSO via generic SAML.
Microsoft Entra IDVia third-partyMicrosoft Azure integration mentioned for SSO/IAM. No SCIM provisioning documented. Contact vendor for enterprise identity options.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Ganttic accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Ganttic pricing problem

Ganttic gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Free$0/month
ProFrom $25/month

Provisioning options

PlanPriceSSOSCIM
Free$0/month
ProFrom $25/month

What this means in practice

Without SCIM support, every Ganttic user account must be created manually by administrators. For resource planning teams where project managers and resource coordinators frequently join or change roles, this creates ongoing overhead:

New project manager joins
IT must manually create account, assign to correct resource pools
Resource coordinator changes teams
Admin must manually update project visibility permissions
Contractor engagement ends
No automated deprovisioning - accounts must be manually disabled

This manual process becomes particularly problematic for PMOs managing multiple project portfolios where resource access needs change frequently based on active engagements.

Additional constraints

SSO documentation gaps
While Azure and OneLogin integration is mentioned, specific configuration steps aren't publicly documented
Resource-based complexity
User permissions tied to resource pools and projects require manual mapping during onboarding
No JIT provisioning
Even with SSO enabled, user accounts must be pre-created before first login
Vendor dependency
Enterprise identity options require direct contact with Ganttic support for configuration

Summary of challenges

  • Ganttic does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Ganttic actually offers for identity

SAML SSO (Pro plan)

Ganttic includes SAML-based single sign-on on their Pro plan:

SettingDetails
ProtocolSAML (specific version not documented)
Supported IdPsMicrosoft Azure, OneLogin mentioned
ConfigurationNot publicly documented - contact vendor
JIT provisioningNot supported

Critical gap: Ganttic's identity integration documentation is minimal. Their website mentions Azure and OneLogin integrations but provides no configuration details, supported attributes, or provisioning capabilities.

User provisioning

FeatureSupported?
SCIM provisioning❌ No
Manual user creation✓ Yes
Bulk user importUnknown
Automated deprovisioning❌ No
Group/role mappingUnknown

Translation: You'll be manually managing user accounts in Ganttic's interface. For PMOs managing resource pools across projects, this creates ongoing administrative overhead every time team members join or leave projects.

Why this matters for resource planning teams

Resource planning tools like Ganttic require careful access control - project managers need visibility into specific resource pools, while individual contributors only need access to their assigned projects. Without proper provisioning automation, maintaining these access boundaries becomes a manual process that doesn't scale with project complexity.

What IT admins are saying

Ganttic's complete lack of SCIM documentation leaves IT teams in the dark about identity management options:

  • No publicly available SCIM or automated provisioning documentation
  • SSO capabilities are mentioned but not detailed or documented
  • Must contact vendor directly for any enterprise identity management features
  • Resource-based pricing makes it unclear what identity features are available at different tiers

SAML SSO on Pro plan. Resource planning software.

Official pricing documentation (the extent of their public identity management details)

The recurring theme

Ganttic treats identity management as an afterthought. IT teams can't evaluate or implement proper user lifecycle management without vendor conversations, making it impossible to plan deployments or ensure compliance requirements are met.

The decision

Your SituationRecommendation
Small project team (<10 users)Manual user management is sufficient
Resource planning with low team turnoverSSO only - manual provisioning acceptable
Growing PMO (20+ project managers)Use Stitchflow: automation saves significant overhead
Multi-project enterprise deploymentUse Stitchflow: automation essential for scale
Compliance-driven organizationUse Stitchflow: audit trail and automated deprovisioning required

The bottom line

Ganttic offers solid resource planning capabilities but provides no documented SCIM provisioning and unclear SSO implementation. For PMOs managing dynamic project teams where timely access control matters, Stitchflow delivers the automation that Ganttic simply doesn't offer.

Make Ganttic workflows AI-native

Ganttic has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

SCIM not documentedSSO not publicly documentedContact vendor for enterprise identity

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • SCIM not documented
  • SSO not publicly documented
  • Contact vendor for enterprise identity

Documentation not available.

Unlock SCIM for
Ganttic

Ganttic has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Ganttic logo
Ganttic
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
ActiveCampaign logo

ActiveCampaign

No SCIM

Marketing Automation / Email

ProvisioningNot Supported
Manual Cost$11,754/yr

ActiveCampaign, the marketing automation platform, does not offer native SCIM provisioning on any plan. While the Enterprise plan ($145+/month) includes SAML 2.0 SSO with just-in-time (JIT) provisioning, this only creates user accounts on first login—there's no automated deprovisioning when employees leave or change roles. New SSO users are automatically added to a generic "SSO Users" group with configurable permissions, but IT teams have no way to programmatically manage user lifecycles or enforce granular access controls based on department or role changes. This creates a significant gap for marketing teams that need to manage access to customer data and campaign tools. When employees leave the company or change departments, their ActiveCampaign access must be manually revoked, creating compliance risks and potential data exposure. The lack of automated deprovisioning means former employees could theoretically retain access to sensitive marketing data and customer information until someone manually removes them from the platform.

View full guide
Adyen logo

Adyen

No SCIM

Payments / Fintech

ProvisioningNot Supported
Manual Cost$11,754/yr

Adyen offers SCIM 2.0 provisioning, but only through Okta's integration—there's no native SCIM endpoint. This creates a significant vendor lock-in scenario where your provisioning capabilities are entirely dependent on using Okta as your identity provider. Teams using Azure Entra, Google Workspace, or OneLogin are left with manual user management despite Adyen supporting SAML SSO with these platforms. The Okta integration itself requires maintaining a company account (not just a merchant account) and keeping at least one non-SSO admin for troubleshooting, adding operational complexity. For payment platforms handling sensitive financial data, this provisioning gap creates serious compliance risks. Your finance team, payment operations staff, and developers need timely access to process transactions and manage risk controls, but without automated provisioning, you're stuck with manual onboarding that can delay critical payment operations. The requirement to maintain non-SSO admin accounts also creates a security backdoor that compliance auditors will flag.

View full guide