Stitchflow
Gem logo

Gem SCIM guide

Connector Only

How to automate Gem user provisioning, and what it actually costs

Summary and recommendation

Gem, the recruiting and talent management platform, does not currently support SCIM provisioning on any plan. While Gem offers SAML 2.0 SSO integration on Enterprise plans and their Okta integration lists "provisioning supported," this appears to refer to future functionality rather than current capabilities. This creates a significant gap for IT teams managing recruiter access, as recruiting platforms like Gem typically experience high user turnover with new hires, role changes, and departures requiring frequent access adjustments.

The lack of automated provisioning is particularly problematic for recruiting teams where candidate visibility and recruiter permissions need rapid adjustment. With Gem's Enterprise plan starting around $3,600-4,000 per seat annually, organizations are paying premium prices but still managing user lifecycles manually. This manual process creates compliance risks in recruiting environments where candidate data protection and access controls are critical.

The strategic alternative

Gem has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaVia third-partyOkta integration supports Group Linking, Schema Discovery, Attribute Writeback. Created by Okta community and verified by Okta.
Microsoft Entra IDVia third-partyNo Entra ID SCIM provisioning documented. SSO may be available via generic SAML.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Gem accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Gem pricing problem

Gem gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Essentials$139/month
Professional$199/month
GrowthCustom (101-1,000 FTE)
EnterpriseCustom (~$3,600-4,000/seat/year)

Provisioning options

PlanPriceSSOSCIM
Essentials$139/month
Professional$199/month
GrowthCustom (101-1,000 FTE)
EnterpriseCustom (~$3,600-4,000/seat/year)

What this means in practice

Manual provisioning overhead

IT teams must manually create accounts for each recruiter
No automated role assignment based on team structure
Deprovisioning requires manual account deactivation when recruiters leave
Access reviews become time-intensive manual processes

JIT provisioning limitations

Users can only access Gem after attempting to log in
No pre-provisioning for new hires before their start date
Limited attribute mapping from your IdP to Gem user profiles
No group-based access control or automatic team assignments

Additional constraints

Enterprise plan requirement
Even when SCIM arrives in 2025, it will only be available on Enterprise plans starting at ~$3,600-4,000 per user annually
Limited IdP support
Currently only supports Okta integration; no documented Entra ID or Google Workspace SCIM support planned
Recruiting-specific complexity
User access often needs to be tied to specific candidate pools, requisitions, and hiring manager relationships that manual provisioning can't efficiently handle
Timeline uncertainty
No specific delivery date provided for the promised 2025 SCIM implementation

Summary of challenges

  • Gem does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Gem actually offers for identity

SAML SSO (Enterprise only)

Gem provides SAML 2.0 integration for enterprise customers:

SettingDetails
ProtocolSAML 2.0
Supported IdPsOkta, custom SAML providers
JIT Provisioning✓ Yes
User requirementNew users created on first login

The reality: Gem's SSO creates accounts via just-in-time provisioning, but there's no automated lifecycle management or attribute synchronization beyond initial account creation.

Okta Integration (via OIN)

The official Okta Integration Network listing for Gem shows:

FeatureSupported?
SAML SSO✓ Yes
SCIM provisioning❌ No
Create users❌ No
Update users❌ No
Deactivate users❌ No
Group push❌ No

Translation: The current Okta integration only provides basic SSO authentication. Despite Gem announcing SCIM capabilities for 2025, no automated user lifecycle management is available today.

Why this falls short for recruiting teams

Recruiting platforms require precise access controls—recruiters need different permissions than hiring managers, and contractor access must be tightly managed around hiring cycles. Without automated provisioning, IT teams manually configure every recruiter's access to candidate pools, sourcing tools, and analytics dashboards.

For a talent acquisition team of 25+ recruiters across multiple offices, manual user management becomes a significant operational burden, especially with the high turnover rates common in recruiting roles.

What IT admins are saying

Gem's Enterprise-only SCIM requirement creates access barriers for IT teams managing recruiting operations:

  • High barrier to entry: SCIM provisioning locked behind Enterprise tier with custom pricing
  • Manual user management: Without SCIM, recruiters and hiring managers must be provisioned manually
  • Identity governance gaps: No automated deprovisioning when recruiting team members leave
  • Limited IdP flexibility: Azure AD/Entra ID provisioning not supported, restricting Microsoft-first organizations

All-in-one recruiting platform. Includes ATS, CRM, Sourcing, Scheduling, Analytics. SSO on Enterprise. SCIM added in 2025 for auto-provisioning.

Gem official documentation

The recurring theme

Gem positions itself as an enterprise recruiting solution but gates basic identity management features behind their highest pricing tier, forcing IT teams to choose between manual provisioning overhead or significant budget increases just to automate user lifecycle management.

The decision

Your SituationRecommendation
Small recruiting team (<10 users)Manual management is acceptable
Growing talent acquisition team with moderate turnoverUse Stitchflow: automation prevents access delays for new recruiters
Large recruiting organization (25+ users)Use Stitchflow: automation essential for scaling hiring operations
Enterprise with multiple hiring teamsUse Stitchflow: automation strongly recommended for consistent access
Budget-conscious teams on Growth planUse Stitchflow: avoid Enterprise upgrade costs (~$3,600-4,000/seat/year)

The bottom line

Gem is an excellent recruiting platform, but it locks SCIM provisioning behind expensive Enterprise pricing that can cost $3,600-4,000 per seat annually. For recruiting teams that need automated user management without the Enterprise price tag, Stitchflow delivers provisioning automation at a fraction of the cost.

Make Gem workflows AI-native

Gem has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

Enterprise plan requiredSCIM for user lifecycle

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • Enterprise plan required
  • SCIM for user lifecycle

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Gem → Sign On

Okta integration supports Group Linking, Schema Discovery, Attribute Writeback. Created by Okta community and verified by Okta.

Use Stitchflow for automated provisioning.

Unlock SCIM for
Gem

Gem has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Gem logo
Gem
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
ActiveCampaign logo

ActiveCampaign

No SCIM

Marketing Automation / Email

ProvisioningNot Supported
Manual Cost$11,754/yr

ActiveCampaign, the marketing automation platform, does not offer native SCIM provisioning on any plan. While the Enterprise plan ($145+/month) includes SAML 2.0 SSO with just-in-time (JIT) provisioning, this only creates user accounts on first login—there's no automated deprovisioning when employees leave or change roles. New SSO users are automatically added to a generic "SSO Users" group with configurable permissions, but IT teams have no way to programmatically manage user lifecycles or enforce granular access controls based on department or role changes. This creates a significant gap for marketing teams that need to manage access to customer data and campaign tools. When employees leave the company or change departments, their ActiveCampaign access must be manually revoked, creating compliance risks and potential data exposure. The lack of automated deprovisioning means former employees could theoretically retain access to sensitive marketing data and customer information until someone manually removes them from the platform.

View full guide
Adyen logo

Adyen

No SCIM

Payments / Fintech

ProvisioningNot Supported
Manual Cost$11,754/yr

Adyen offers SCIM 2.0 provisioning, but only through Okta's integration—there's no native SCIM endpoint. This creates a significant vendor lock-in scenario where your provisioning capabilities are entirely dependent on using Okta as your identity provider. Teams using Azure Entra, Google Workspace, or OneLogin are left with manual user management despite Adyen supporting SAML SSO with these platforms. The Okta integration itself requires maintaining a company account (not just a merchant account) and keeping at least one non-SSO admin for troubleshooting, adding operational complexity. For payment platforms handling sensitive financial data, this provisioning gap creates serious compliance risks. Your finance team, payment operations staff, and developers need timely access to process transactions and manage risk controls, but without automated provisioning, you're stuck with manual onboarding that can delay critical payment operations. The requirement to maintain non-SSO admin accounts also creates a security backdoor that compliance auditors will flag.

View full guide