Stitchflow
Guru logo

Guru SCIM guide

Native SCIM

How to automate Guru user provisioning, and what it actually costs

Native SCIM requires Enterprise plan

Summary and recommendation

Guru supports full SCIM 2.0 provisioning for users and groups, but only on Enterprise plans with custom pricing. The implementation has several operational restrictions: SSO must be configured before SCIM can be enabled, and once SCIM is active, users cannot be removed directly from the Guru web interface—only deactivated through your identity provider. Additionally, all synced users and groups become read-only in Guru's interface, removing local management flexibility.

This creates a management gap for IT teams who need provisioning automation but don't require Enterprise-level features or can't justify custom pricing for a knowledge management tool. The SSO prerequisite adds complexity to deployment, and the loss of local user management means your IdP becomes a single point of control—problematic for organizations that need hybrid management approaches or want to maintain emergency access capabilities.

The strategic alternative

Guru gates SCIM behind Enterprise. Skip the Enterprise plan upgrade and automate complete outcomes across your stack. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredEnterprise
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0, Google SSO
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Guru accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Guru pricing problem

Guru gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Plan Structure

PlanPriceSSOSCIM
StarterFree
BuilderContact for pricing
EnterpriseCustom pricing

Note: Enterprise includes full SCIM 2.0 provisioning for users and groups, plus dedicated customer success management and advanced integrations.

What this means in practice

Since Guru uses custom Enterprise pricing, exact costs vary by organization size and negotiation. However, the pricing structure creates several financial pressure points:

No middle ground
Teams outgrowing the free Starter plan face a jump directly to Enterprise-level pricing for SCIM access
Bundled features
SCIM comes packaged with enterprise features many organizations don't need (CSM, advanced ticket linking)
Custom pricing opacity
No public pricing means lengthy sales cycles just to understand costs

Additional constraints

SSO prerequisite
SCIM cannot be enabled without first configuring SAML SSO, adding implementation complexity.
One-way sync lock-in
Once SCIM is enabled, users cannot be removed through Guru's web interface—only through your IdP.
Read-only enforcement
All SCIM-synced users and groups become uneditable in Guru's interface, removing local admin flexibility.
Office 365 limitation
Automatic provisioning specifically doesn't work with Office 365, despite Azure AD SCIM support.

Summary of challenges

  • Guru supports SCIM but only at Enterprise tier (Custom pricing (includes CSM, ticket linking))
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

Guru doesn't sell SCIM à la carte. It's bundled with Enterprise features:

SCIM 2.0 automated provisioning (users and groups)
SAML single sign-on (SSO) - required prerequisite
Customer success manager
Ticket linking integrations
Advanced analytics and reporting
Priority support
Enhanced security controls

The catch: SSO must be configured before you can enable SCIM. Once SCIM is active, users become locked to your IdP - you can't remove them through Guru's web interface, and all synced users/groups become read-only in the platform.

If you need knowledge management controls and dedicated support anyway, Enterprise may work. If you just want automated user provisioning, you're paying custom pricing for a bundle where ~60% of features are irrelevant for teams that only need SCIM automation.

What IT admins are saying

Community sentiment on Guru's SCIM implementation reveals frustration with the SSO prerequisite and management restrictions. Common complaints:

  • Having to configure SSO before SCIM can be enabled
  • Users becoming locked to IdP management once SCIM is activated
  • Inability to remove users through the web interface after SCIM enablement
  • Synced users and groups becoming read-only in the Guru admin panel

Once SCIM enabled, users can't be removed from web app... Synced users/groups become uneditable in Guru

Guru Documentation

Office 365 automatic provisioning not supported

Azure AD Integration Docs

The recurring theme

While Guru offers full SCIM 2.0 functionality, the rigid SSO requirement and loss of manual user management flexibility creates operational constraints that many IT teams find restrictive.

The decision

Your SituationRecommendation
On Starter/Builder, need SCIMUse Stitchflow: avoid the Enterprise upgrade and custom pricing
Already on EnterpriseUse native SCIM: you're paying for it
Need Enterprise features beyond SCIMEvaluate Enterprise: SCIM comes bundled
SSO not yet configuredConsider Stitchflow: skip the SSO prerequisite complexity
Need flexibility to manage users in GuruUse Stitchflow: avoid the read-only lock-in that comes with native SCIM

The bottom line

Guru gates SCIM behind Enterprise. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Make Guru workflows AI-native

Guru gates SCIM behind Enterprise. We build complete offboarding, user access reviews, and license workflows without that SCIM Tax upgrade.

No Enterprise upgrade required
Less than a week, start to finish (~2 hours of your time)
We maintain the integration layer underneath
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Enterprise

Prerequisites

SSO must be configured first

Key limitations

  • SSO must be configured before SCIM
  • Once SCIM enabled, users can't be removed from web app
  • Synced users/groups become uneditable in Guru
  • Office 365 automatic provisioning not supported

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Guru → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

Full SCIM 2.0 provisioning for users and groups. SSO must be configured first. Once SCIM enabled, users cannot be removed from web app. Synced items show sync icon and become read-only.

Guru gates SCIM behind Enterprise. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → Guru → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

Full SCIM 2.0 provisioning. SSO required before SCIM. Users deactivated when removed from Entra if Deactivate Users enabled.

Guru gates SCIM behind Enterprise. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Unlock SCIM for
Guru

Guru gates SCIM behind Enterprise plan. We automate complete offboarding and access reviews across your stack without that SCIM Tax upgrade.

See how it works
Admin Console
Directory
Applications
Guru logo
Guru
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Amplitude logo

Amplitude

SCIM Tax

Product Analytics

SCIM StatusIncluded
Manual Cost$11,754/yr

Amplitude supports SCIM provisioning, but only on Growth plans (starting around $36K/year) or Enterprise plans with custom pricing. While Amplitude's SCIM implementation covers the core functionality—creating, updating, and deactivating users—it requires SCIM to be specifically enabled for your organization, and regenerating the SCIM key immediately invalidates existing integrations without warning. For product teams on Plus plans ($49/month), upgrading to Growth just to unlock SCIM means jumping from under $600/year to $36,000+/year—a 60x increase. That's often more than the entire analytics budget for smaller product teams. The gap becomes particularly problematic for cross-functional product teams where analysts, PMs, and engineers need varying levels of access to user behavior data, but manual provisioning creates security risks around sensitive analytics permissions.

View full guide
Bill.com logo

Bill.com

SCIM Tax

Accounts Payable / Receivable Automation

SCIM StatusIncluded
Manual Cost$11,754/yr

Bill.com offers inconsistent SCIM provisioning support that varies dramatically by identity provider. While Okta users can access SCIM provisioning through the OIN integration, Bill.com doesn't publish native SCIM documentation, and other IdPs like Entra ID are limited to SAML SSO only. This fragmented approach means your provisioning capabilities depend entirely on your IdP choice rather than Bill.com's platform features. For finance teams managing sensitive AP/AR workflows where user access directly impacts invoice approvals and payment processing, this inconsistency creates operational gaps—especially when onboarding new controllers, AP clerks, or accountants requires manual role assignment tied to spending limits and approval hierarchies. The real problem is that Bill.com gates all SSO functionality behind Enterprise plans with custom pricing (typically 2-3x their Corporate plan at $79/user/month), yet still provides no clear path to automated provisioning for most customers. Since financial systems require precise role-based access controls for SOX compliance and segregation of duties, manual user management creates both security risks and administrative overhead. When employees change departments or leave the company, orphaned accounts in payment systems pose significant financial and compliance risks that manual processes often miss.

View full guide
Bitwarden logo

Bitwarden

SCIM Tax

Password Manager / Secrets Management

SCIM StatusIncluded
Manual Cost$11,754/yr

Bitwarden supports SCIM 2.0 provisioning, but only on Teams ($4/user/month) and Enterprise ($6/user/month) plans. While this pricing is reasonable compared to other password managers, the real challenge lies in Bitwarden's zero-knowledge architecture: SCIM can provision user accounts, but users still need to manually accept vault invitations and set up their encryption keys before gaining access to shared passwords. This creates a critical security gap. Your identity provider shows users as "provisioned," but they can't actually access company passwords until they complete manual setup steps. When employees leave, SCIM deprovisioning removes their account, but any locally cached vault data remains accessible until they next sync. For security teams managing hundreds of shared credentials, this manual friction undermines the entire purpose of automated provisioning.

View full guide