Stitchflow
Gorgias logo

Gorgias SCIM guide

Connector Only

How to automate Gorgias user provisioning, and what it actually costs

Summary and recommendation

Gorgias, the e-commerce helpdesk platform, does not support SCIM provisioning on any plan. While Gorgias offers comprehensive SSO support across all plans—including Google/Microsoft SSO and custom SAML for providers like Okta and JumpCloud—this only handles authentication. User accounts are created automatically via Just-in-Time (JIT) provisioning on first login, but there's no automated deprovisioning when employees leave or change roles.

This creates a significant security and compliance gap for IT teams managing customer support operations. When support agents are terminated or transferred, their Gorgias access remains active until manually removed. For companies processing customer data through their support tickets, this represents both a data security risk and potential compliance violation. The manual deprovisioning burden becomes particularly problematic for growing e-commerce companies with frequent support staff changes.

The strategic alternative

Gorgias has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0, Google SSO, Microsoft SSO
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaVia third-partyCustom SAML SSO supported with Okta. JIT provisioning creates accounts on first login. No SCIM provisioning.
Microsoft Entra IDVia third-partyMicrosoft SSO supported on all plans. JIT provisioning only. No SCIM provisioning.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Gorgias accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Gorgias pricing problem

Gorgias gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Starter$10/mo (50 tickets, 3 agents)
Basic$60/mo (300 tickets)
Pro$360/mo (2,000 tickets)
Advanced$900/mo (5,000 tickets)
EnterpriseCustom (6,000+ tickets)

Provisioning capabilities

PlanPriceSSOSCIM
Starter$10/mo (50 tickets, 3 agents)
Basic$60/mo (300 tickets)
Pro$360/mo (2,000 tickets)
Advanced$900/mo (5,000 tickets)
EnterpriseCustom (6,000+ tickets)

What this means in practice

User onboarding requires two-step process

1. IT admin manually creates Gorgias account and assigns role 2. User logs in via SSO for the first time (JIT provisioning only handles authentication)

Deprovisioning is entirely manual

When support agents leave, IT must manually disable their Gorgias accounts
No automated sync when users change departments or roles
Risk of orphaned accounts with continued access to customer data

No group or attribute sync

Support team roles must be manually assigned in Gorgias
Department changes require manual updates across systems
No automated assignment to specific helpdesk queues or permissions

Additional constraints

Mobile app SSO limitation
Mobile users cannot use SSO login, requiring separate password management
E-commerce data sensitivity
Manual deprovisioning delays create compliance risks with customer PII access
Support team turnover
High-volume support environments with frequent staffing changes amplify manual provisioning overhead
Ticket-based pricing model
User provisioning errors can impact ticket allocation and billing accuracy

Summary of challenges

  • Gorgias does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Gorgias actually offers for identity

SAML SSO (All Plans)

Gorgias provides decent SSO options across all pricing tiers:

SettingDetails
ProtocolSAML 2.0, Google SSO, Microsoft SSO
Supported IdPsGoogle, Microsoft (native), Okta, JumpCloud (SAML)
JIT Provisioning✓ Yes - creates accounts on first login
ConfigurationContact support for custom SAML setup
Mobile SSO❌ No - mobile app doesn't support SSO login

Key strength: Unlike many helpdesk tools, Gorgias includes SSO on all plans starting at $10/month, not just enterprise tiers.

What's Missing: User Lifecycle Management

Identity FeatureSupported?
SSO Authentication✓ Yes
JIT User Creation✓ Yes
SCIM Provisioning❌ No
Automated Deprovisioning❌ No
Group/Role Sync❌ No
Attribute Updates❌ No

The gap: While Gorgias creates users automatically when they first log in via SSO, there's no automated way to remove access when employees leave or change roles. Support managers must manually deactivate users in the Gorgias admin panel.

Why this matters for e-commerce teams: Customer support agents often have high turnover, and they handle sensitive customer data. Manual deprovisioning creates security risks and administrative overhead that scales poorly as your support team grows.

What IT admins are saying

Gorgias's lack of SCIM provisioning forces IT teams into manual user management workflows:

  • Manual deprovisioning required - When support agents leave, their Gorgias accounts must be manually disabled since SCIM isn't available
  • JIT-only provisioning - New users can only be created through first-time SSO login, with no pre-provisioning capabilities
  • Mobile app SSO gap - Support agents can't use SSO on mobile devices, requiring separate password management
  • No automated lifecycle management - User role changes and team assignments require manual updates in Gorgias

SSO creates accounts on first login through just-in-time provisioning, but there's no way to automate deprovisioning when people leave.

IT admin managing e-commerce support team

The mobile app not supporting SSO is frustrating - our support agents are constantly on mobile helping customers, but they have to manage separate passwords.

Support operations manager

The recurring theme

While Gorgias offers solid SSO integration across identity providers, the absence of SCIM means IT teams must manually track and manage user lifecycle changes in yet another system, creating security gaps when former employees retain access.

The decision

Your SituationRecommendation
Small support team (<10 agents)Manual management with SSO is acceptable
Stable customer service team with low turnoverUse SSO for authentication, manage users manually
Growing e-commerce business (25+ support agents)Use Stitchflow: manual deprovisioning creates security gaps
Enterprise with seasonal support scalingUse Stitchflow: automation essential for rapid team changes
Multi-brand e-commerce with distributed teamsUse Stitchflow: automation strongly recommended for compliance

The bottom line

Gorgias excels at e-commerce customer support but offers no SCIM provisioning—only SSO with JIT account creation. When support agents leave, you must manually deprovision their access, creating security risks for customer data. For growing support teams that need proper lifecycle management, Stitchflow eliminates the manual deprovisioning burden.

Make Gorgias workflows AI-native

Gorgias has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No SCIM provisioningJIT provisioning via SSO onlyMobile app doesn't support SSO login

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No SCIM provisioning
  • JIT provisioning via SSO only
  • Mobile app doesn't support SSO login

Documentation not available.

Unlock SCIM for
Gorgias

Gorgias has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Gorgias logo
Gorgias
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
ActiveCampaign logo

ActiveCampaign

No SCIM

Marketing Automation / Email

ProvisioningNot Supported
Manual Cost$11,754/yr

ActiveCampaign, the marketing automation platform, does not offer native SCIM provisioning on any plan. While the Enterprise plan ($145+/month) includes SAML 2.0 SSO with just-in-time (JIT) provisioning, this only creates user accounts on first login—there's no automated deprovisioning when employees leave or change roles. New SSO users are automatically added to a generic "SSO Users" group with configurable permissions, but IT teams have no way to programmatically manage user lifecycles or enforce granular access controls based on department or role changes. This creates a significant gap for marketing teams that need to manage access to customer data and campaign tools. When employees leave the company or change departments, their ActiveCampaign access must be manually revoked, creating compliance risks and potential data exposure. The lack of automated deprovisioning means former employees could theoretically retain access to sensitive marketing data and customer information until someone manually removes them from the platform.

View full guide
Adyen logo

Adyen

No SCIM

Payments / Fintech

ProvisioningNot Supported
Manual Cost$11,754/yr

Adyen offers SCIM 2.0 provisioning, but only through Okta's integration—there's no native SCIM endpoint. This creates a significant vendor lock-in scenario where your provisioning capabilities are entirely dependent on using Okta as your identity provider. Teams using Azure Entra, Google Workspace, or OneLogin are left with manual user management despite Adyen supporting SAML SSO with these platforms. The Okta integration itself requires maintaining a company account (not just a merchant account) and keeping at least one non-SSO admin for troubleshooting, adding operational complexity. For payment platforms handling sensitive financial data, this provisioning gap creates serious compliance risks. Your finance team, payment operations staff, and developers need timely access to process transactions and manage risk controls, but without automated provisioning, you're stuck with manual onboarding that can delay critical payment operations. The requirement to maintain non-SSO admin accounts also creates a security backdoor that compliance auditors will flag.

View full guide