Summary and recommendation
HaloPSA, the MSP-focused PSA/ITSM platform, does not support SCIM provisioning on any plan, despite charging $90/agent/month annually. While HaloPSA offers SAML 2.0 SSO integration with Azure AD and WatchGuard AuthPoint, this only handles authentication—not user lifecycle management. IT teams must manually create, update, and deactivate user accounts in HaloPSA, or rely on custom API integrations to automate provisioning workflows.
For managed service providers managing dozens of technicians and support staff, this creates significant operational overhead. Without automated deprovisioning, former employees retain access to client data and service tickets until manually removed—a serious compliance and security risk in the MSP industry. The lack of SCIM also makes onboarding new technicians slower, as IT admins must provision accounts across multiple systems manually rather than through their identity provider's standard workflows.
The strategic alternative
HaloPSA has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | No |
| SSO available? | Yes |
| SSO protocol | SAML 2.0 |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | Via third-party | ❌ | No Okta OIN integration found. SAML SSO can be configured manually. |
| Microsoft Entra ID | Via third-party | ❌ | Azure AD SSO via SAML. Users can be deactivated in HaloPSA when not found in Azure (via Halo Integrator). Multi-tenant Azure support available. |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages HaloPSA accounts manually. Here's what that costs:
The HaloPSA pricing problem
HaloPSA gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Standard | $90/agent/month | ||
| Enterprise | ~$13,500/year (5+ agents) |
Provisioning options
| Plan | Pricing | SSO | SCIM |
|---|---|---|---|
| Standard | $90/agent/month | ✓ SAML 2.0 | ❌ Not available |
| Enterprise | ~$13,500/year (5+ agents) | ✓ SAML 2.0 | ❌ Not available |
Key limitation: No plan includes automated user provisioning. HaloPSA relies on manual account creation or custom API workflows.
What this means in practice
For MSP environments: HaloPSA serves managed service providers who frequently onboard/offboard technicians and contractors. Without SCIM:
User lifecycle gaps
Additional constraints
Summary of challenges
- HaloPSA does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What HaloPSA actually offers for identity
SAML SSO (All plans)
HaloPSA supports SAML 2.0 integration with identity providers:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0 |
| Supported IdPs | Azure AD, WatchGuard AuthPoint, custom SAML providers |
| Configuration | Manual setup via HaloPSA admin panel |
| User matching | Email-based attribute mapping |
| JIT provisioning | ❌ Not supported |
Key feature: Self-Service Portal SSO is available, allowing end-users to authenticate via SAML for ticket submission and status checks.
What's missing: User provisioning
HaloPSA has no native SCIM provisioning capabilities. User lifecycle management options are limited to:
The reality for MSPs: You get SSO authentication, but onboarding new technicians, updating roles, or deprovisioning departing staff requires manual intervention or custom API development. For service providers managing hundreds of client accounts, this creates significant administrative overhead.
Okta Integration
No official Okta Integration Network listing exists for HaloPSA. SAML SSO can be configured manually, but requires:
| Feature | Status |
|---|---|
| SAML SSO | ✓ Manual configuration |
| User provisioning | ❌ Not available |
| Group sync | ❌ Not available |
| Automated deprovisioning | ❌ Not available |
What IT admins are saying
HaloPSA's lack of SCIM provisioning forces MSPs into manual user management workflows:
- Manual user creation required even with SAML SSO configured
- No automated deprovisioning when technicians leave the organization
- API-based workarounds require custom development and maintenance
- User lifecycle management becomes a separate task from identity provider workflows
User accounts must be manually created or provisioned via API before SSO authentication can work
While Azure AD SSO works well, we still have to remember to manually add and remove users in HaloPSA separately
The recurring theme
Even with SAML SSO working smoothly, IT teams at MSPs must maintain a separate user management process for HaloPSA, creating security gaps when employees are terminated but not immediately deprovisioned from critical PSA systems.
The decision
| Your Situation | Recommendation |
|---|---|
| Small MSP (<10 technicians) | Manual management acceptable, use SAML SSO |
| MSP with moderate turnover (20+ users) | Use Stitchflow: automation prevents security gaps |
| Enterprise IT teams (50+ support staff) | Use Stitchflow: automation essential for compliance |
| Multi-tenant MSPs serving multiple clients | Use Stitchflow: automation critical for operational efficiency |
| Organizations requiring audit trails | Use Stitchflow: automated provisioning provides complete visibility |
The bottom line
HaloPSA is a comprehensive PSA platform but offers no SCIM provisioning—only SAML SSO with manual user management. For MSPs and IT teams that need automated provisioning to maintain security and operational efficiency, Stitchflow eliminates the manual overhead entirely.
Make HaloPSA workflows AI-native
HaloPSA has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- No native SCIM provisioning
- SAML SSO for agents and users
- Manual or API-based user provisioning
Documentation not available.
Configuration for Entra ID
Integration type
Microsoft Entra Gallery app
Where to enable
Azure AD SSO via SAML. Users can be deactivated in HaloPSA when not found in Azure (via Halo Integrator). Multi-tenant Azure support available.
Use Stitchflow for automated provisioning.
Unlock SCIM for
HaloPSA
HaloPSA has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.
See how it works


