Stitchflow
Help Scout logo

Help Scout SCIM guide

Native SCIM

How to automate Help Scout user provisioning, and what it actually costs

Native SCIM requires Pro plan

Summary and recommendation

Help Scout supports user provisioning through Okta's integration, which offers Create Users, Update User Attributes, and Deactivate Users capabilities. Help Scout also offers SAML 2.0 SSO on the Pro plan ($65/user/month annually) with JIT provisioning. However, there's a notable inconsistency: Help Scout's own documentation states SCIM is not supported, while Okta's integration does provide provisioning functionality. This creates confusion for IT teams evaluating their options.

The lack of true SCIM support creates significant operational overhead for support teams. While JIT provisioning automatically creates users when they first log in, there's no automated way to remove access when employees leave or change roles. IT admins must manually deactivate users in Help Scout, creating security gaps and compliance risks—especially problematic for customer support platforms that handle sensitive customer data and communications.

The strategic alternative

Help Scout gates SCIM behind Pro. Skip the Pro plan upgrade and automate complete outcomes across your stack. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredPro
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDSSO only
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Help Scout accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Help Scout pricing problem

Help Scout gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Standard$22/user/month
Plus$44/user/month
Pro$65/user/month

Pricing and provisioning support

PlanPriceSSOSCIM
Standard$22/user/month
Plus$44/user/month
Pro$65/user/month

Note: Okta's App Integration Network lists "provisioning supported" for Help Scout, but this only covers basic Create/Update/Deactivate operations through Okta's proprietary connector—not standards-based SCIM.

What this means in practice

Without SCIM support, Help Scout creates significant operational overhead:

No automated deprovisioning
When employees leave, their Help Scout accounts remain active until manually removed
JIT creates security gaps
New users are automatically created on first login, potentially bypassing approval workflows
Manual group management
Role assignments and team memberships must be configured individually in Help Scout
Audit trail complexity
User lifecycle events aren't centrally tracked through your IdP

Additional constraints

Account Owner bypass
The designated Account Owner always retains password login access, even with SSO enforcement enabled
IdP-first requirement
For controlled provisioning, accounts must be pre-created in your identity provider before users can access Help Scout
Limited deprovisioning visibility
No automated alerts when users are removed from Help Scout directly
Pro plan requirement
SSO functionality requires the $65/user/month Pro plan—a 195% increase from Standard pricing

Summary of challenges

  • Help Scout supports SCIM but only at Pro tier (custom pricing)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Help Scout actually offers for identity

Help Scout doesn't offer native SCIM at all. Instead, they provide SAML SSO with limited provisioning options that vary by identity provider:

SAML SSO (Pro plan - $65/user/month):

SAML 2.0 authentication
JIT (Just-In-Time) provisioning creates users automatically on first login
Support for Okta, Azure AD, OneLogin, generic SAML providers
SP-initiated and IdP-initiated login flows
Optional SAML-only enforcement (except Account Owner)

Okta-specific provisioning (via OIN connector):

Create users in Help Scout from Okta
Update user attributes when changed in Okta
Deactivate users when removed from Okta
Basic lifecycle management (not full SCIM standard)

What's missing for complete automation:

No native SCIM 2.0 protocol support
Azure AD and Google Workspace users limited to JIT only
No automated group/role synchronization
Manual cleanup required for non-Okta environments
No centralized audit trail through your IdP

The Pro plan requirement means you're paying 195% more than Standard pricing ($22/month) just to get basic SSO. Most Pro features (advanced reporting, custom fields, workflows) are irrelevant for teams that simply need automated user provisioning. We estimate ~80% of Pro plan features are unnecessary if your primary need is identity management automation.

What IT admins are saying

Community sentiment on Help Scout's lack of SCIM provisioning creates ongoing frustration for IT teams managing customer support platforms. Common complaints:

  • No automated user deprovisioning - employees who leave still have active Help Scout accounts unless manually removed
  • JIT provisioning creates users automatically, but there's no way to automatically disable them when they're deactivated in your IdP
  • Pro plan requirement ($65/user/month) just for basic SSO functionality adds significant cost for larger support teams
  • Manual cleanup required when support agents change roles or departments

Service Provider provisioning is not supported... Accounts must be created first in IdP or Help Scout.

Help Scout official documentation

The Account Owner always has password login available and cannot be forced to use SAML-only login.

Help Scout SSO documentation

The recurring theme

IT teams get the convenience of automatic user creation through JIT, but are left manually cleaning up departed employees and managing role changes. For customer support platforms handling sensitive customer data, this creates both security and compliance risks.

The decision

Your SituationRecommendation
Small support team (<10 agents), low turnoverManual management may work: JIT handles creation, manual cleanup is manageable
Growing support team (10+ agents)Use Stitchflow: manual deprovisioning creates operational overhead
Using Okta as primary IdPConsider native Okta provisioning: Help Scout's connector handles basic lifecycle
Multi-IdP environment (Entra, Google Workspace)Use Stitchflow: only Okta gets provisioning, other IdPs limited to JIT
Compliance requirements or high agent turnoverUse Stitchflow: manual deprovisioning creates security gaps and audit issues

The bottom line

Help Scout offers JIT provisioning but no true SCIM support, creating a one-way street where users are automatically created but never automatically removed. For support teams handling sensitive customer data, this manual deprovisioning requirement creates both security risks and operational overhead that Stitchflow eliminates.

Make Help Scout workflows AI-native

Help Scout gates SCIM behind Pro. We build complete offboarding, user access reviews, and license workflows without that SCIM Tax upgrade.

No Pro upgrade required
Less than a week, start to finish (~2 hours of your time)
We maintain the integration layer underneath
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Pro

Prerequisites

None

Key limitations

  • No SCIM provisioning - Service Provider provisioning not supported
  • Pro plan required for SSO
  • JIT creates new users automatically
  • Account Owner always has password login
  • Accounts must be created first in IdP or Help Scout

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Where to enable

Okta Admin Console → Applications → Help Scout → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

SSO via SAML. Okta integration supports Create Users, Update User Attributes, Deactivate Users. Also available: Aquera connector for additional provisioning.

Help Scout gates SCIM behind Pro. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app

Where to enable

Entra admin center → Enterprise applications → Help Scout → Single sign-on

SSO with JIT provisioning. Full SCIM provisioning not supported - accounts must be created in IdP or Help Scout first.

Use Stitchflow for automated provisioning.

Unlock SCIM for
Help Scout

Help Scout gates SCIM behind Pro plan. We automate complete offboarding and access reviews across your stack without that SCIM Tax upgrade.

See how it works
Admin Console
Directory
Applications
Help Scout logo
Help Scout
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Amplitude logo

Amplitude

SCIM Tax

Product Analytics

SCIM StatusIncluded
Manual Cost$11,754/yr

Amplitude supports SCIM provisioning, but only on Growth plans (starting around $36K/year) or Enterprise plans with custom pricing. While Amplitude's SCIM implementation covers the core functionality—creating, updating, and deactivating users—it requires SCIM to be specifically enabled for your organization, and regenerating the SCIM key immediately invalidates existing integrations without warning. For product teams on Plus plans ($49/month), upgrading to Growth just to unlock SCIM means jumping from under $600/year to $36,000+/year—a 60x increase. That's often more than the entire analytics budget for smaller product teams. The gap becomes particularly problematic for cross-functional product teams where analysts, PMs, and engineers need varying levels of access to user behavior data, but manual provisioning creates security risks around sensitive analytics permissions.

View full guide
Bill.com logo

Bill.com

SCIM Tax

Accounts Payable / Receivable Automation

SCIM StatusIncluded
Manual Cost$11,754/yr

Bill.com offers inconsistent SCIM provisioning support that varies dramatically by identity provider. While Okta users can access SCIM provisioning through the OIN integration, Bill.com doesn't publish native SCIM documentation, and other IdPs like Entra ID are limited to SAML SSO only. This fragmented approach means your provisioning capabilities depend entirely on your IdP choice rather than Bill.com's platform features. For finance teams managing sensitive AP/AR workflows where user access directly impacts invoice approvals and payment processing, this inconsistency creates operational gaps—especially when onboarding new controllers, AP clerks, or accountants requires manual role assignment tied to spending limits and approval hierarchies. The real problem is that Bill.com gates all SSO functionality behind Enterprise plans with custom pricing (typically 2-3x their Corporate plan at $79/user/month), yet still provides no clear path to automated provisioning for most customers. Since financial systems require precise role-based access controls for SOX compliance and segregation of duties, manual user management creates both security risks and administrative overhead. When employees change departments or leave the company, orphaned accounts in payment systems pose significant financial and compliance risks that manual processes often miss.

View full guide
Bitwarden logo

Bitwarden

SCIM Tax

Password Manager / Secrets Management

SCIM StatusIncluded
Manual Cost$11,754/yr

Bitwarden supports SCIM 2.0 provisioning, but only on Teams ($4/user/month) and Enterprise ($6/user/month) plans. While this pricing is reasonable compared to other password managers, the real challenge lies in Bitwarden's zero-knowledge architecture: SCIM can provision user accounts, but users still need to manually accept vault invitations and set up their encryption keys before gaining access to shared passwords. This creates a critical security gap. Your identity provider shows users as "provisioned," but they can't actually access company passwords until they complete manual setup steps. When employees leave, SCIM deprovisioning removes their account, but any locally cached vault data remains accessible until they next sync. For security teams managing hundreds of shared credentials, this manual friction undermines the entire purpose of automated provisioning.

View full guide