Stitchflow
Google Meet logo

Google Meet SCIM guide

Native SCIM

How to automate Google Meet user provisioning, and what it actually costs

Native SCIM requires Google Workspace plan

Summary and recommendation

Google Meet doesn't offer SCIM provisioning as a standalone service because it's integrated into Google Workspace, where SCIM is handled at the organization level. While Google Workspace Business Standard and above plans ($14+/user/month) support SCIM provisioning, this manages entire Google Workspace accounts—not granular Google Meet access controls. IT teams can provision users into the broader Workspace environment, but can't control specific Meet features like recording permissions, meeting hosting capabilities, or attendance policies through SCIM. This creates a significant gap for organizations that need fine-grained control over video conferencing access without managing full Google Workspace lifecycles.

The real-world implication is that IT teams must either provision entire Google Workspace accounts (expensive and potentially excessive for Meet-only users) or manually manage Meet-specific permissions and features. This becomes particularly problematic for organizations with contractors, temporary staff, or role-based access requirements where different user types need different Meet capabilities. The lack of granular provisioning also creates compliance challenges for industries requiring audit trails of who can record meetings or host sensitive discussions.

The strategic alternative

Google Meet gates SCIM behind Google Workspace. Skip the Google Workspace plan upgrade and automate complete outcomes across your stack. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredCustom
SSO required first?No
SSO available?Yes
SSO protocolGoogle Workspace SSO
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Google Meet accounts manually. Here's what that costs:

Source: Stitchflow customers using Google Meet, normalized to 500 employees:
Orphaned accounts (ex-employees with access)36
Unused licenses27
IT hours spent on manual management/year129 hours
Unused license cost/year$3,958
IT labor cost/year$7,751
Cost of compliance misses/year$8,595
Total annual financial impact$20,304

The Google Meet pricing problem

Google Meet gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Google Workspace Starter$7/user/mo
Google Workspace Standard$14/user/mo
Google Workspace Plus$22/user/mo
Google Workspace EnterpriseCustom pricing

Pricing structure

PlanPriceSCIM
Google Workspace Starter$7/user/mo❌ Not available
Google Workspace Standard$14/user/mo✓ Available
Google Workspace Plus$22/user/mo✓ Available
Google Workspace EnterpriseCustom pricing✓ Available

Note: Google Meet is included in all Google Workspace plans. Free personal accounts allow up to 100 participants for 60 minutes.

What this means in practice

No direct provisioning control: IT admins cannot provision users specifically for Google Meet. All provisioning happens through Google Workspace, meaning:

Users must have Google Workspace accounts to access Meet features
Meeting recordings, advanced controls, and enterprise features require appropriate Workspace licenses
You're paying for full Workspace functionality even if you only need video conferencing

Minimum tier requirements for SCIM: Organizations using Starter plans ($7/user/month) cannot use automated provisioning and must manually manage user accounts. Upgrading to Standard ($14/user/month) doubles the per-user cost just to enable SCIM.

For a 100-user organization, this means an additional $8,400/year ($700/month) solely to enable automated provisioning.

Additional constraints

Google Workspace dependency
Cannot use Google Meet enterprise features without full Google Workspace licenses
Admin role requirements
SCIM configuration requires Google Workspace super-admin privileges
Domain verification needed
Organizations must verify domain ownership before enabling directory sync
All-or-nothing licensing
No way to provision Meet-only access—users need full Workspace accounts

Summary of challenges

  • Google Meet supports SCIM but only at Custom tier (Custom pricing)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Google Meet actually offers for identity

Google Workspace Integration Only

Google Meet doesn't offer standalone SCIM provisioning—it's managed entirely through Google Workspace at the organization level:

SettingDetails
Provisioning methodSCIM 2.0 via Google Workspace
Minimum tierBusiness Standard ($14/user/mo)
Meet-specific controlsNone—provisioned with Workspace account
User managementGoogle Admin Console only

The core limitation: You can't provision Google Meet separately from Google Workspace. Meet access is automatically bundled with every Workspace account, meaning you're paying for the entire Google Workspace suite just to manage video conferencing access.

What Google Workspace SCIM includes

When you configure SCIM at the Workspace level, you get:

User lifecycle management
Create, update, and deactivate accounts
Group synchronization
Sync organizational units and groups
Meet access control
Users with Workspace accounts automatically get Meet access
Admin role assignment
Provision users with appropriate Workspace permissions

The real-world problem

Most organizations want to provision Meet access without forcing users into the full Google ecosystem. But Google's architecture means:

No granular Meet controls
Can't provision Meet-only access
Workspace dependency
Must pay for Gmail, Drive, Docs, etc. even if unused
Domain verification required
Complex setup for non-Google organizations
Super admin privileges needed
Your IdP service account needs broad Workspace permissions

This works fine if you're already a Google shop, but creates unnecessary complexity and cost for teams that just want managed video conferencing provisioning.

What IT admins are saying

Google Meet's integration into the broader Google Workspace ecosystem creates unique provisioning challenges for IT teams:

  • No standalone SCIM support - Google Meet provisioning is entirely dependent on Google Workspace organization-level configuration
  • All-or-nothing Workspace access - Can't provision Meet access without full Google Workspace account creation
  • Domain verification complexity - Setting up cross-domain provisioning from other IdPs requires extensive domain ownership verification
  • Super-admin role requirements - Both Okta and Entra ID integrations require Google Workspace super-admin privileges, creating security concerns

Provisioning configured at Google Workspace level. Domain verification required. Entra ID user needs super-admin role.

Microsoft Entra ID documentation

Okta admin needs super-admin role. Full SCIM provisioning for users and groups.

Okta Integration Network

The recurring theme

Google Meet can't be provisioned independently—it's always part of a larger Google Workspace deployment. This forces IT teams to either give users full Workspace access when they only need video conferencing, or manage complex cross-domain integrations that require elevated administrative privileges.

The decision

Your SituationRecommendation
Small team (<20 users) with Google WorkspaceManual management via Google Admin Console
Google Workspace Business Standard+ with stable teamNative Google Workspace SCIM if your IdP supports it well
Mixed environment (Google Meet + other video platforms)Use Stitchflow: unified provisioning across all platforms
Enterprise with compliance requirementsUse Stitchflow: automation essential for audit trail
Frequent team changes or complex access patternsUse Stitchflow: Google Workspace-level SCIM too broad for granular control

The bottom line

Google Meet provisioning happens at the Google Workspace organization level, not per-application, making it impossible to control Meet access independently from other Google services. For organizations that need granular video conferencing access control or want to manage Google Meet alongside other platforms, Stitchflow provides the precision and automation that workspace-level SCIM can't deliver.

Make Google Meet workflows AI-native

Google Meet gates SCIM behind Google Workspace. We build complete offboarding, user access reviews, and license workflows without that SCIM Tax upgrade.

No Google Workspace upgrade required
Less than a week, start to finish (~2 hours of your time)
We maintain the integration layer underneath
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Custom

Prerequisites

None

Key limitations

  • Part of Google Workspace
  • Access via Google account
  • SCIM at Workspace level, not Meet-specific

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Where to enable

Okta Admin Console → Applications → Google Meet → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

Google Meet access provisioned via Google Workspace. Okta admin needs super-admin role. Full SCIM provisioning for users and groups.

Google Meet gates SCIM behind Google Workspace. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Where to enable

Entra admin center → Enterprise applications → Google Meet → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

Provisioning configured at Google Workspace level. Domain verification required. Entra ID user needs super-admin role.

Google Meet gates SCIM behind Google Workspace. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Unlock SCIM for
Google Meet

Google Meet gates SCIM behind Google Workspace plan. We automate complete offboarding and access reviews across your stack without that SCIM Tax upgrade, avoiding a 100% markup.

See how it works
Admin Console
Directory
Applications
Google Meet logo
Google Meet
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

BlueJeans logo

BlueJeans

SCIM Tax

Video Conferencing

SCIM StatusIncluded
Manual Cost$11,754/yr

BlueJeans by Verizon supported SCIM for automated user provisioning, but the service was discontinued in early 2024. When operational, SCIM was only available on Enterprise plans at custom pricing, and remained in perpetual BETA status—meaning limited functionality and no production-grade support guarantees. This left IT teams managing video conferencing access manually or accepting beta-level reliability for critical identity management workflows. The beta SCIM limitation created real operational challenges. Video conferencing platforms require immediate access provisioning for new hires and prompt deprovisioning for departing employees to maintain security compliance. With SCIM stuck in beta, organizations couldn't rely on automated workflows and had to maintain manual processes alongside their identity provider automation.

View full guide
GoTo Meeting logo

GoTo Meeting

No SCIM

Video Conferencing

ProvisioningNot Supported
Manual Cost$11,754/yr

GoTo Meeting does not support SCIM provisioning on any plan. While the platform offers SAML 2.0 SSO integration with major identity providers including Okta, Entra ID, and others, this only handles authentication—not user lifecycle management. GoTo Meeting previously supported Azure AD automatic provisioning, but this feature has been deprecated, leaving IT teams with only manual provisioning or GoTo's AD Connector v2 for limited automation. For organizations seeking true SCIM provisioning, GoTo recommends upgrading to GoToConnect (their unified communications platform that includes GoToMeeting functionality), but this forces teams into a completely different product suite. This creates a significant gap for organizations that need GoTo Meeting specifically for video conferencing but require automated user provisioning. IT teams must either manually manage user accounts—creating compliance risks and operational overhead—or invest in GoToConnect's broader platform just to access SCIM capabilities. The deprecated Azure provisioning particularly impacts Microsoft-centric organizations that were relying on this integration for user lifecycle management.

View full guide
Lifesize logo

Lifesize

No SCIM

Video Conferencing

ProvisioningNot Supported
Manual Cost$11,754/yr

Lifesize, the video conferencing platform now owned by Enghouse, does not offer SCIM provisioning on any plan. While Lifesize supports SAML 2.0 SSO integration with identity providers like Okta, Azure AD, and generic SAML providers, this only handles authentication—not user lifecycle management. IT teams must manually create, update, and deactivate user accounts in the Lifesize admin console, even though SSO can authenticate users once they exist in the system. This creates a significant operational gap for organizations using Lifesize for company-wide video conferencing. Without automated provisioning, IT teams face the ongoing burden of manually managing user accounts as employees join, change roles, or leave the organization. For video conferencing platforms where user access needs to scale with organizational changes, this manual overhead becomes particularly problematic during onboarding/offboarding cycles and can create security risks when former employees retain access to meeting capabilities.

View full guide