Stitchflow
Iterable logo

Iterable SCIM guide

Connector Only

How to automate Iterable user provisioning, and what it actually costs

Summary and recommendation

Iterable, the marketing automation platform, does not support SCIM provisioning on any plan. While Iterable offers SAML 2.0 SSO with just-in-time (JIT) provisioning that can create user accounts on first login, this creates a one-way flow that leaves IT teams without automated deprovisioning capabilities. Users who lose access in your identity provider won't be automatically removed from Iterable, requiring manual intervention to verify account status and revoke access within the platform itself.

This creates a significant security gap for marketing teams using Iterable. When employees leave or change roles, their Iterable accounts remain active even after IdP access is revoked, potentially allowing continued access to customer data, campaign insights, and marketing automation workflows. For compliance-conscious organizations, this manual deprovisioning requirement creates audit trail gaps and increases the risk of data exposure from dormant accounts.

The strategic alternative

Stitchflow provides SCIM-level provisioning through resilient browser automation for Iterable without requiring enterprise-tier pricing or custom development work. Works with any Iterable plan and any identity provider. Flat pricing under $5K/year, regardless of team size.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaVia third-partyIterable supports SAML SSO with Okta but does NOT support SCIM provisioning. JIT provisioning creates users on first login. Roles can be managed via SAML attributes.
Microsoft Entra IDVia third-partyIterable supports SAML SSO with Azure AD but does NOT support SCIM provisioning. JIT provisioning available.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Iterable accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Iterable pricing problem

Iterable gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Growth$800/month (1K users)
Enterprise$20,000+/year

Pricing and provisioning options

PlanPricingSSOSCIM
Growth$800/month (1K users)❌ Not available❌ Not available
Enterprise$20,000+/year✓ SAML with JIT❌ Not available

Implementation costs

Base Enterprise plan
~$20,000/year minimum
Implementation fees
$5,000-$20,000 additional
No monthly billing
annual/quarterly commitments required

What this means in practice

Without SCIM, Iterable forces IT teams into a hybrid provisioning model that creates security and operational gaps:

User onboarding: New users must first be granted IdP access, then manually log in to trigger JIT account creation. There's no way to pre-provision accounts or assign specific roles before first login.

Role management: User roles are determined solely by SAML attributes passed during login. Any role changes require IdP configuration updates and user re-authentication to take effect.

Deprovisioning gaps: Removing users from your IdP prevents future logins but doesn't automatically disable their Iterable accounts. IT teams must manually verify and potentially revoke access within Iterable itself.

Additional constraints

No automated user removal
Departing employees retain Iterable account access until manually removed
SAML-only dependency
All provisioning relies on SAML authentication flow - no API-based management
Role sync limitations
Complex role hierarchies can't be automatically synchronized from your IdP
Audit trail gaps
No centralized logging of provisioning events across both systems

This creates a compliance risk for marketing automation platforms that often handle sensitive customer data and campaign strategies.

Summary of challenges

  • Iterable does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Iterable actually offers for identity

SAML SSO with JIT provisioning (Enterprise tier)

Iterable provides SAML 2.0 single sign-on with just-in-time account creation:

SettingDetails
ProtocolSAML 2.0
Supported IdPsOkta, Azure AD, Google Workspace, generic SAML
JIT provisioning✓ Creates accounts on first login
Role managementVia SAML attributes
Strict modeOptional - blocks non-SSO logins

Key limitation: There's no automated deprovisioning. When you remove someone from your IdP, their Iterable account remains active. You must manually verify and disable accounts in Iterable after removing IdP access.

What's missing: SCIM provisioning

SCIM FeatureIterable Support
Automated user creation❌ No (JIT only)
Automated user updates❌ No
Automated deprovisioning❌ No
Group/role sync❌ No
Real-time provisioning❌ No

Translation: Iterable gives you federated login but no lifecycle management. For marketing automation platforms handling sensitive customer data and campaign access, this creates security gaps when team members leave or change roles.

The deprovisioning problem

When someone leaves your team: 1. Remove them from your IdP (blocks future logins) 2. Manually check Iterable for active sessions 3. Manually disable their Iterable account if needed

This manual verification step is exactly what SCIM eliminates - and why IT teams often require it for SaaS applications with access to customer data.

What IT admins are saying

Iterable's lack of SCIM provisioning creates ongoing administrative overhead for IT teams:

  • No automated user provisioning - all accounts must be manually created or rely on JIT
  • Deprovisioning requires dual action: removing IdP access AND manually checking Iterable
  • Role management limited to SAML attributes with no granular control
  • No systematic way to audit or sync user access across systems

SAML SSO with strict mode option. JIT creates accounts on first login. Roles via SAML attribute. Deprovisioning via IdP.

Iterable support documentation

User accounts must exist in Iterable to use single sign-on... Deprovisioning requires IdP + manual Iterable check

Implementation requirements

The recurring theme

Even with SAML SSO configured, IT teams must maintain a separate workflow for Iterable user lifecycle management. Every joiner, mover, or leaver requires manual intervention beyond the identity provider.

The decision

Your SituationRecommendation
Small marketing team (<10 users)Manual management with SAML SSO is workable
Growing marketing organization (25+ users)Use Stitchflow: JIT-only provisioning creates security gaps
Enterprise with compliance requirementsUse Stitchflow: manual deprovisioning creates audit risks
High marketing team turnoverUse Stitchflow: automation essential for timely access revocation
Multi-brand or agency environmentsUse Stitchflow: complex user management needs automation

The bottom line

Iterable offers robust marketing automation but relies entirely on SAML JIT provisioning—there's no SCIM support at all. This means deprovisioning requires both IdP removal and manual verification in Iterable, creating security gaps and compliance headaches. For marketing teams that need reliable provisioning automation, Stitchflow eliminates the manual overhead.

Automate Iterable without third-party complexity

Stitchflow delivers SCIM-level provisioning through resilient browser automation, backed by 24/7 human in the loop for Iterable at <$5K/year, flat, regardless of team size.

Works alongside or instead of native SCIM
Syncs with your existing IdP (Okta, Entra ID, Google Workspace)
Automates onboarding and offboarding
SOC 2 Type II certified
24/7 human-in-the-loop monitoring
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No SCIM provisioningJIT provisioning via SAML onlyDeprovisioning requires IdP + manual Iterable checkRoles determined by SAML attribute

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No SCIM provisioning
  • JIT provisioning via SAML only
  • Deprovisioning requires IdP + manual Iterable check
  • Roles determined by SAML attribute

Documentation not available.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → Iterable → Single sign-on

Iterable supports SAML SSO with Azure AD but does NOT support SCIM provisioning. JIT provisioning available.

Use Stitchflow for automated provisioning.

Unlock SCIM for
Iterable

Iterable doesn't offer SCIM. Get an enterprise-grade SCIM endpoint in your IdP, even without native support.

See how it works
Admin Console
Directory
Applications
Iterable logo
Iterable
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Marketo logo

Marketo

No SCIM

Marketing Automation

ProvisioningNot Supported
Manual Cost$11,754/yr

Adobe Marketo Engage does not support native SCIM provisioning with Okta, despite being widely used by marketing teams in Okta environments. While Marketo offers limited SCIM support through Azure AD or Google Workspace via the Adobe Admin Console, this leaves Okta customers with manual user provisioning workflows. Even with Okta's integration offering "Group Linking, Schema Discovery, and Attribute Writeback," users still must be manually created in Marketo before SSO can work—creating a significant operational gap for IT teams managing marketing technology stacks. This limitation is particularly problematic for enterprise organizations where marketing teams frequently change, contractors need temporary access, and compliance requires automated deprovisioning. The lack of Okta SCIM support means IT admins must maintain separate provisioning processes for Marketo while automating everything else through their identity provider. Adobe's focus on their own identity ecosystem through the Adobe Admin Console effectively creates vendor lock-in for automated provisioning capabilities.

View full guide
Pardot logo

Pardot

No SCIM

Marketing Automation

ProvisioningNot Supported
Manual Cost$11,754/yr

Pardot (now Marketing Cloud Account Engagement) does not offer direct SCIM provisioning. Instead, it relies entirely on the Salesforce platform's identity management system. While Salesforce does support SCIM at the platform level, this creates a complex dependency where IT teams must manage Pardot users through Salesforce's broader ecosystem. This means you need Salesforce platform access and must navigate Salesforce's SCIM implementation, which can be unnecessarily complex for teams who only need to provision marketing users into Pardot itself. This platform dependency creates significant operational overhead. IT teams must either grant broad Salesforce admin access to manage marketing users, or constantly handle manual provisioning requests through Salesforce. The integration assumes you're already deep in the Salesforce ecosystem with dedicated platform administrators, which isn't always the case for companies using Pardot as a standalone marketing automation tool.

View full guide
Builder.io logo

Builder.io

No SCIM

Visual CMS / Headless CMS

ProvisioningNot Supported
Manual Cost$11,754/yr

Builder.io, the visual CMS platform used by developers and content teams, does not offer SCIM provisioning on any plan. While Builder.io provides SAML 2.0 SSO integration on their Enterprise tier with identity providers like Okta, Azure AD, and Google Workspace, this only handles authentication—not the automated provisioning and deprovisioning of user accounts. IT teams must manually create and manage user accounts in Builder.io, then separately assign appropriate permissions for different Spaces and projects. This creates a significant operational gap for organizations using Builder.io across multiple content teams. Without SCIM, departing employees retain access to Builder.io Spaces until manually removed, creating security risks around content management systems that often contain sensitive marketing materials and website code. The manual overhead becomes particularly problematic when managing access across multiple Builder.io Spaces, each requiring individual permission management for developers, marketers, and content editors.

View full guide