Stitchflow
Heroku logo

Heroku SCIM guide

Connector Only

How to automate Heroku user provisioning, and what it actually costs

Summary and recommendation

Heroku, Salesforce's cloud platform service, does not support SCIM provisioning on any plan. While Heroku offers SAML 2.0 SSO integration with just-in-time (JIT) provisioning across all plans—including standard development tiers—this only creates users on first login and provides no automated lifecycle management. Users must be manually removed from teams and the platform when they leave the organization, creating a significant security gap for development teams managing cloud infrastructure access.

This limitation is particularly problematic for DevOps and platform teams who need to maintain strict access controls over production deployments and cloud resources. Without automated deprovisioning, former employees may retain access to critical infrastructure, violating compliance requirements and creating potential security vulnerabilities. The manual overhead of tracking and removing users from Heroku teams becomes unmanageable as development organizations scale.

The strategic alternative

Heroku has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaVia third-partyHeroku SAML integration in OIN. Supports SP and IdP-initiated SSO with JIT provisioning. No SCIM.
Microsoft Entra IDVia third-partySSO with JIT provisioning. User created on first authentication if doesn't exist. No SCIM provisioning.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Heroku accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Heroku pricing problem

Heroku gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Eco$5/month (shared 1000 hrs)
Basic$7/dyno/month
Standard$25-50/dyno/month
Performance$500/dyno/month
Teams$10/user/month (5+ users)
Enterprise$15,000+/year

Pricing and provisioning options

PlanPriceSSOSCIM
Eco$5/month (shared 1000 hrs)
Basic$7/dyno/month
Standard$25-50/dyno/month
Performance$500/dyno/month
Teams$10/user/month (5+ users)
Enterprise$15,000+/year

What this means in practice

No automated deprovisioning: When developers leave your organization, their Heroku access remains active until manually removed. There's no SCIM endpoint to automatically disable accounts or remove team memberships when users are deprovisioned in your IdP.

Manual team management: Adding users to specific Heroku teams and apps requires manual configuration by admins. Even with SSO enabled, newly provisioned users land in a basic state and need manual assignment to the right teams and permissions.

Email verification friction: JIT-provisioned users receive email verification requests on first login, creating an additional step in the onboarding process that can't be bypassed programmatically.

Additional constraints

Keep emergency admin access
Heroku strongly recommends maintaining at least one admin account outside of SSO for backup access if IdP integration fails
Limited SSO certificate management
Maximum of 3 SAML certificates supported, which can create rotation challenges for large organizations
MFA dependency
Multi-factor authentication must be enforced entirely at the IdP level since Heroku doesn't provide native MFA options for SSO users
No API-based user management
Unlike platforms with SCIM, there's no standardized API for automated user lifecycle management beyond basic team invitations

Summary of challenges

  • Heroku does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Heroku actually offers for identity

SAML SSO with JIT Provisioning (Team Plans)

Heroku provides SAML 2.0 integration starting with Team plans ($10/user/mo for 5+ users):

FeatureDetails
ProtocolSAML 2.0
Supported IdPsOkta, Entra ID, OneLogin, PingOne, PingFederate, Salesforce Identity
User creationJIT provisioning on first SSO login
Certificate supportUp to 3 SSO certificates
Access flowsBoth SP-initiated and IdP-initiated

The JIT limitation: Users are automatically created when they first authenticate through your IdP, but there's no automated deprovisioning. When someone leaves your organization, you must manually remove them from Heroku teams and applications.

What's Actually Missing

SCIM CapabilityHeroku Status
Automated user provisioning❌ JIT only
Automated deprovisioning❌ Manual removal required
Group/team sync❌ No group mapping
Attribute updates❌ No ongoing sync
Bulk operations❌ Not supported

Real-world impact: For development teams using Heroku, you get basic SSO but lose the security benefit of automated deprovisioning. Former employees retain access until manually removed from each Heroku team and app - a significant security gap for platform access.

Heroku's documentation explicitly recommends keeping at least one admin account outside of SSO for backup access, acknowledging the limitations of their JIT-only approach.

What IT admins are saying

Heroku's JIT-only provisioning creates ongoing administrative overhead for platform teams:

  • Manual deprovisioning required when developers leave the company
  • No automated group/team assignments through SCIM
  • User verification emails on first login can confuse new team members
  • Admin accounts must be kept outside SSO for emergency access

User receives verification email on first JIT login

Heroku SSO documentation

Keep admin account outside SSO for backup access

Heroku best practices guide

MFA must be enforced at IdP

IT admin on Reddit discussing Heroku security requirements

The recurring theme

While JIT gets users in the door, IT teams are left manually cleaning up when developers leave and can't automate team assignments. For dev platforms handling sensitive deployments, the lack of proper deprovisioning automation is a significant security gap.

The decision

Your SituationRecommendation
Small dev team (<10 developers)Manual management with SSO is acceptable
Stable development team with low turnoverManual management with JIT provisioning
Large engineering organization (25+ developers)Use Stitchflow: manual deprovisioning is a security risk
Enterprise with compliance requirementsUse Stitchflow: automated lifecycle management essential
Multi-team platform with frequent role changesUse Stitchflow: manual team management doesn't scale

The bottom line

Heroku provides solid SAML SSO with JIT provisioning, but zero automation for user lifecycle management. When developers leave or change teams, IT has to manually remove access—a significant security and operational burden for larger organizations. Stitchflow eliminates this manual overhead with full provisioning automation.

Make Heroku workflows AI-native

Heroku has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No SCIM provisioningJIT provisioning on first SSO loginMFA must be enforced at IdPKeep admin account outside SSO for backup accessUser receives verification email on first JIT login

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No SCIM provisioning
  • JIT provisioning on first SSO login
  • MFA must be enforced at IdP
  • Keep admin account outside SSO for backup access
  • User receives verification email on first JIT login

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Where to enable

Okta Admin Console → Applications → Heroku → Sign On

Heroku SAML integration in OIN. Supports SP and IdP-initiated SSO with JIT provisioning. No SCIM.

Use Stitchflow for automated provisioning.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app

Where to enable

Entra admin center → Enterprise applications → Heroku → Single sign-on

SSO with JIT provisioning. User created on first authentication if doesn't exist. No SCIM provisioning.

Use Stitchflow for automated provisioning.

Unlock SCIM for
Heroku

Heroku has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Heroku logo
Heroku
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
Aha! logo

Aha!

No SCIM

Product Management / Roadmapping

ProvisioningNot Supported
Manual Cost$11,754/yr

Aha! Roadmaps, the product roadmapping platform, does not support SCIM provisioning on any plan. While Aha! offers SAML 2.0 SSO integration with identity providers like Okta, Entra ID, and OneLogin, this only handles authentication through JIT (Just-In-Time) provisioning. The critical limitation: JIT provisioning creates user accounts with no default role or access permissions, requiring administrators to manually configure access for each user after they first sign in. For product teams managing strategic roadmaps and stakeholder access, this creates significant operational overhead. Since product roadmaps contain sensitive strategic information and stakeholder access typically varies by product area, IT administrators must manually assign appropriate roles and workspace permissions after each user is provisioned. There's no automatic deprovisioning when users leave the organization, creating potential security gaps. This manual process becomes particularly problematic for larger product organizations where dozens of stakeholders across different business units need carefully managed access to specific roadmaps.

View full guide
Appcues logo

Appcues

No SCIM

Product Adoption / User Onboarding

ProvisioningNot Supported
Manual Cost$11,754/yr

Appcues, the product adoption platform used by product managers and growth teams, explicitly does not support SCIM provisioning on any plan—not even Enterprise. While Appcues offers SAML 2.0 SSO integration starting at the Enterprise tier with just-in-time (JIT) provisioning, this only creates users during first login and provides no automated deprovisioning capabilities. For product teams where access needs change frequently as people move between projects or leave the company, this creates a significant security gap. The lack of SCIM means IT teams must manually manage user lifecycle for Appcues accounts, even though the platform handles sensitive product analytics and user flow data. When employees leave or change roles, their Appcues access remains active until manually revoked—a compliance risk that's particularly problematic given Appcues' role in tracking user behavior and product metrics. With MAU-based pricing starting at $300/month and scaling significantly with usage, paying for orphaned accounts also creates unnecessary cost bloat.

View full guide