Stitchflow
Hotjar logo

Hotjar SCIM guide

Connector Only

How to automate Hotjar user provisioning, and what it actually costs

Summary and recommendation

Hotjar, the behavior analytics platform used by UX teams and product managers, does not clearly support SCIM provisioning despite offering SAML SSO on Scale plans. While Okta's integration catalog suggests some provisioning capabilities, Hotjar's official documentation makes no mention of SCIM support, leaving IT teams in the dark about automated user lifecycle management. This creates a significant gap for organizations managing UX analytics access across product teams, designers, and analysts who need timely provisioning and deprovisioning as projects and roles change.

The absence of clear SCIM support means IT admins must manually create, update, and remove user accounts in Hotjar—a time-consuming process that becomes problematic as teams scale. With behavior analytics containing sensitive user interaction data, manual provisioning introduces compliance risks and delays that can impact product development cycles. SSO authentication alone doesn't address the operational burden of managing user lifecycles across multiple Hotjar workspaces and team permissions.

The strategic alternative

Hotjar has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaVia third-partyOIN integration with SSO and provisioning. Supports Group Linking, Schema Discovery, Attribute Writeback. Full SCIM capabilities unclear.
Microsoft Entra IDVia third-partyNo Microsoft Entra ID provisioning documentation found. SSO may be possible via custom SAML app.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Hotjar accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Hotjar pricing problem

Hotjar gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
ObserveFree-$213/month
AskFree-$159/month
EngageFree-$550/month
Scale (any product)Custom quote
⚠️ Okta only, unclear scope

Pricing structure

PlanPriceSSOSCIM
ObserveFree-$213/month
AskFree-$159/month
EngageFree-$550/month
Scale (any product)Custom quote
⚠️ Okta only, unclear scope

What this means in practice

Manual user management is the norm: Without clear SCIM documentation, most IT teams resort to manual user creation and deactivation in Hotjar, even on expensive Scale plans.

Okta users get limited provisioning: Okta's integration claims to support provisioning with features like Group Linking and Schema Discovery, but the actual SCIM capabilities aren't documented by Hotjar. This creates uncertainty about what actually works.

Other IdPs get nothing: Teams using Microsoft Entra ID, Google Workspace, or OneLogin have no provisioning options beyond manual processes.

Additional constraints

Account Owner dependency
Only the Account Owner can configure SSO, creating a bottleneck for IT teams
Product-specific pricing
Hotjar's three separate products (Observe, Ask, Engage) have different pricing tiers, complicating cost calculations for Scale plan upgrades
Documentation gaps
The lack of clear SCIM documentation makes it difficult to assess what provisioning features actually work
IdP-specific limitations
Provisioning appears limited to Okta integration, excluding other major identity providers

Summary of challenges

  • Hotjar does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Hotjar actually offers for identity

SAML SSO (Scale plans)

Hotjar provides SAML 2.0 single sign-on on their Scale tier across all three products (Observe, Ask, Engage):

SettingDetails
ProtocolSAML 2.0
Supported IdPsOkta, CyberArk, generic SAML providers
ConfigurationAccount Owner must configure via settings
InitiationBoth SP-initiated and IdP-initiated
JIT provisioningNot supported

Key limitation: Only Account Owners can configure SSO, and there's no just-in-time provisioning. Users must be manually added to Hotjar before they can authenticate.

Okta Integration (partial provisioning)

The Okta Integration Network listing shows some provisioning capabilities:

FeatureSupported?
SAML SSO✓ Yes
Create users✓ Yes (via Okta provisioning)
Update users✓ Yes
Deactivate users✓ Yes
Group push✓ Yes (Group Linking)
Schema Discovery✓ Yes
Attribute Writeback✓ Yes

The catch: Hotjar's own documentation doesn't mention SCIM or automated provisioning. The Okta integration appears to provide basic user lifecycle management, but it's unclear if this works reliably across all Hotjar products or requires manual intervention.

What's missing

No native SCIM endpoint
No standardized provisioning API documented
Limited IdP support
Provisioning features only confirmed for Okta
Unclear documentation
SSO is documented, but provisioning capabilities aren't clearly explained
Manual dependency
Account Owner must handle SSO configuration

For UX and product teams using multiple identity providers or requiring reliable automated provisioning, Hotjar's current offerings create operational gaps.

What IT admins are saying

Hotjar's unclear provisioning capabilities leave IT teams guessing about automation options:

  • SSO requires Scale plan pricing, but SCIM provisioning documentation is virtually non-existent
  • Okta integration claims provisioning support, but Hotjar's own help docs don't mention automated user management
  • Account Owners must manually configure SSO, creating dependency bottlenecks for IT teams
  • No clear path for automated deprovisioning when UX team members leave

Account Owner must configure SSO

Hotjar documentation, highlighting the manual setup burden placed on business users rather than IT.

The recurring theme

Hotjar treats provisioning as an afterthought. While they've built SAML SSO for Scale customers, the lack of clear SCIM documentation means IT teams can't confidently plan for automated user lifecycle management across their behavior analytics tools.

The decision

Your SituationRecommendation
Small UX team (<10 users) on Observe planManual management is acceptable
Design team using Scale plan with stable membershipUse Okta provisioning if available, manual otherwise
Product organization (25+ users) across multiple Hotjar productsUse Stitchflow: automation essential for cross-product management
Enterprise with compliance requirementsUse Stitchflow: automation essential for audit trail
Growing company switching between Hotjar productsUse Stitchflow: automation handles product transitions seamlessly

The bottom line

Hotjar offers behavior analytics insights but leaves user management in the dark ages. While Okta users may have some provisioning options, the documentation is unclear and limited to specific IdPs. For product teams that need reliable provisioning automation across Hotjar's three-product suite, Stitchflow eliminates the guesswork.

Make Hotjar workflows AI-native

Hotjar has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

Account Owner must configure SSOSCIM provisioning status unclear from public docsOkta integration may support provisioningSSO only on Scale plans

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • Account Owner must configure SSO
  • SCIM provisioning status unclear from public docs
  • Okta integration may support provisioning
  • SSO only on Scale plans

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Where to enable

Okta Admin Console → Applications → Hotjar → Sign On

OIN integration with SSO and provisioning. Supports Group Linking, Schema Discovery, Attribute Writeback. Full SCIM capabilities unclear.

Use Stitchflow for automated provisioning.

Unlock SCIM for
Hotjar

Hotjar has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Hotjar logo
Hotjar
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
ActiveCampaign logo

ActiveCampaign

No SCIM

Marketing Automation / Email

ProvisioningNot Supported
Manual Cost$11,754/yr

ActiveCampaign, the marketing automation platform, does not offer native SCIM provisioning on any plan. While the Enterprise plan ($145+/month) includes SAML 2.0 SSO with just-in-time (JIT) provisioning, this only creates user accounts on first login—there's no automated deprovisioning when employees leave or change roles. New SSO users are automatically added to a generic "SSO Users" group with configurable permissions, but IT teams have no way to programmatically manage user lifecycles or enforce granular access controls based on department or role changes. This creates a significant gap for marketing teams that need to manage access to customer data and campaign tools. When employees leave the company or change departments, their ActiveCampaign access must be manually revoked, creating compliance risks and potential data exposure. The lack of automated deprovisioning means former employees could theoretically retain access to sensitive marketing data and customer information until someone manually removes them from the platform.

View full guide
Adyen logo

Adyen

No SCIM

Payments / Fintech

ProvisioningNot Supported
Manual Cost$11,754/yr

Adyen offers SCIM 2.0 provisioning, but only through Okta's integration—there's no native SCIM endpoint. This creates a significant vendor lock-in scenario where your provisioning capabilities are entirely dependent on using Okta as your identity provider. Teams using Azure Entra, Google Workspace, or OneLogin are left with manual user management despite Adyen supporting SAML SSO with these platforms. The Okta integration itself requires maintaining a company account (not just a merchant account) and keeping at least one non-SSO admin for troubleshooting, adding operational complexity. For payment platforms handling sensitive financial data, this provisioning gap creates serious compliance risks. Your finance team, payment operations staff, and developers need timely access to process transactions and manage risk controls, but without automated provisioning, you're stuck with manual onboarding that can delay critical payment operations. The requirement to maintain non-SSO admin accounts also creates a security backdoor that compliance auditors will flag.

View full guide