Stitchflow
Hired logo

Hired SCIM guide

Connector Only

How to automate Hired user provisioning, and what it actually costs

Summary and recommendation

Hired, the tech recruiting marketplace, does not offer SCIM provisioning on any plan. While Hired provides enterprise plans with custom pricing, their public documentation contains no information about SSO or SCIM capabilities. This lack of transparency around enterprise authentication features is problematic for IT teams who need to evaluate identity management options before engaging in lengthy enterprise sales cycles.

The absence of automated provisioning creates significant operational overhead for organizations using Hired for technical recruiting. HR teams must manually provision recruiters, hiring managers, and other stakeholders, then remember to deprovision access when employees leave or change roles. Given that recruiting platforms often contain sensitive candidate data and compensation information, manual user lifecycle management introduces both security risks and compliance gaps.

The strategic alternative

Hired has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolUnknown
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaVia third-partyNo Okta integration found in OIN. Contact Hired for enterprise SSO options.
Microsoft Entra IDVia third-partyNo Microsoft Entra ID integration documentation found. Contact Hired for enterprise options.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Hired accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Hired pricing problem

Hired gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Basic30% finder's fee on annual compensation
StaffingContractor rates
EnterpriseCustom pricing
❓ Contact vendor

Pricing structure

PlanPricingSCIM
Basic30% finder's fee on annual compensation❌ Unknown
StaffingContractor rates❌ Unknown
EnterpriseCustom pricing❓ Contact vendor

Key limitations

No public SSO/SCIM documentation available
Enterprise features require direct vendor contact
Pricing model based on placement fees rather than seat licensing

What this means in practice

Without public documentation on identity management capabilities, IT teams face significant uncertainty when evaluating Hired for enterprise use:

Unknown compliance capabilities
No visibility into SOC 2, GDPR, or other compliance certifications
Unclear user management
No information on how users are provisioned, deprovisioned, or managed at scale
Integration uncertainty
Unknown compatibility with existing identity providers like Okta, Entra ID, or Google Workspace

Additional constraints

Limited transparency
Enterprise features and capabilities require sales engagement to understand
Marketplace model complexity
User roles may vary significantly between hiring companies, recruiters, and candidates
Vertical specialization
Platform designed specifically for tech recruiting rather than general enterprise software needs
Contact-dependent evaluation
Cannot assess technical requirements without vendor discussions

Summary of challenges

  • Hired does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Hired actually offers for identity

No Public SSO or SCIM Documentation

Hired provides no public documentation about single sign-on or user provisioning capabilities. Their website and public resources focus entirely on the recruiting marketplace features.

Enterprise Plans (Custom Pricing Required)

Based on available information:

FeatureAvailability
SCIM provisioningUnknown - contact required
SAML SSOUnknown - contact required
OIDC SSOUnknown - contact required
JIT provisioningUnknown - contact required
Group managementUnknown - contact required

The reality: Hired operates as a recruiting marketplace where most interactions happen between external candidates and your hiring team. The platform's core value is connecting you with tech talent, not managing internal user accounts.

Integration Ecosystem

PlatformStatus
Okta Integration NetworkNo listing found
Microsoft Entra ID GalleryNo integration documented
Google WorkspaceNo SAML app available

Why This Falls Short

For IT teams managing user lifecycle across SaaS applications, Hired's lack of transparency around identity management creates several problems:

No visibility into what identity features actually exist
Custom pricing barrier just to learn about basic SSO capabilities
No self-service setup everything requires vendor contact
Unclear scope of what "Enterprise" features include beyond recruiting tools

Since Hired functions more as an external recruiting service than an internal productivity tool, many organizations find that identity management isn't the primary concern - it's more about integrating recruiting workflows with existing HR systems.

What IT admins are saying

Hired's opaque enterprise authentication approach leaves IT teams in the dark:

  • No public documentation on SSO or SCIM capabilities
  • Must contact sales to understand basic authentication features
  • Unclear what's included in enterprise plans vs. additional cost
  • Limited visibility into integration options before procurement

No public documentation on SSO/SCIM. Contact Hired for enterprise authentication options.

Integration research findings

Contact for enterprise features

Hired's standard response for authentication inquiries

The recurring theme

Hired treats basic IT requirements like SSO and SCIM as black-box enterprise features. IT admins can't evaluate authentication capabilities or plan integrations without lengthy sales conversations, making it impossible to assess technical fit during vendor evaluation.

The decision

Your SituationRecommendation
Small recruiting team (<10 users)Manual management is workable
Limited enterprise requirementsStick with manual provisioning and basic access controls
Growing talent acquisition team (25+ users)Use Stitchflow: automation prevents onboarding delays
Enterprise with compliance requirementsUse Stitchflow: audit trail essential for HR system access
Multi-location recruiting operationsUse Stitchflow: centralized identity management critical

The bottom line

Hired is a tech recruiting marketplace with zero public documentation on enterprise identity management capabilities. Without native SCIM or clear SSO options, IT teams face a complete black box for user provisioning. For organizations that need reliable access management for their recruiting platform, Stitchflow provides the automation and transparency that Hired's enterprise offering lacks.

Make Hired workflows AI-native

Hired has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

Limited public documentationSSO/SCIM capabilities unclearContact for enterprise features

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • Limited public documentation
  • SSO/SCIM capabilities unclear
  • Contact for enterprise features

Documentation not available.

Unlock SCIM for
Hired

Hired has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Hired logo
Hired
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
ActiveCampaign logo

ActiveCampaign

No SCIM

Marketing Automation / Email

ProvisioningNot Supported
Manual Cost$11,754/yr

ActiveCampaign, the marketing automation platform, does not offer native SCIM provisioning on any plan. While the Enterprise plan ($145+/month) includes SAML 2.0 SSO with just-in-time (JIT) provisioning, this only creates user accounts on first login—there's no automated deprovisioning when employees leave or change roles. New SSO users are automatically added to a generic "SSO Users" group with configurable permissions, but IT teams have no way to programmatically manage user lifecycles or enforce granular access controls based on department or role changes. This creates a significant gap for marketing teams that need to manage access to customer data and campaign tools. When employees leave the company or change departments, their ActiveCampaign access must be manually revoked, creating compliance risks and potential data exposure. The lack of automated deprovisioning means former employees could theoretically retain access to sensitive marketing data and customer information until someone manually removes them from the platform.

View full guide
Adyen logo

Adyen

No SCIM

Payments / Fintech

ProvisioningNot Supported
Manual Cost$11,754/yr

Adyen offers SCIM 2.0 provisioning, but only through Okta's integration—there's no native SCIM endpoint. This creates a significant vendor lock-in scenario where your provisioning capabilities are entirely dependent on using Okta as your identity provider. Teams using Azure Entra, Google Workspace, or OneLogin are left with manual user management despite Adyen supporting SAML SSO with these platforms. The Okta integration itself requires maintaining a company account (not just a merchant account) and keeping at least one non-SSO admin for troubleshooting, adding operational complexity. For payment platforms handling sensitive financial data, this provisioning gap creates serious compliance risks. Your finance team, payment operations staff, and developers need timely access to process transactions and manage risk controls, but without automated provisioning, you're stuck with manual onboarding that can delay critical payment operations. The requirement to maintain non-SSO admin accounts also creates a security backdoor that compliance auditors will flag.

View full guide