Stitchflow
Jet Brains logo

Jet Brains SCIM guide

Native SCIM

How to automate Jet Brains user provisioning, and what it actually costs

Native SCIM requires Enterprise plan

Summary and recommendation

JetBrains supports SCIM 2.0 through its Hub identity management platform, which handles user provisioning across the entire JetBrains ecosystem (IntelliJ IDEA, PyCharm, WebStorm, YouTrack, etc.). However, the implementation has several problematic quirks that create headaches for IT teams: Okta integration requires a workaround due to URL loop issues, SCIM doesn't work with OIDC authentication (forcing you to set up separate SAML apps just for provisioning), and there's risk of unwanted license allocation when users are automatically provisioned.

These technical complications mean what should be straightforward automated provisioning becomes a multi-step configuration challenge. You're dealing with separate authentication and provisioning workflows, managing multiple JetBrains products with different configurations, and navigating integration-specific workarounds that increase your risk of misconfiguration. Add in JetBrains' upcoming price increases (up to 30% starting October 2025) and discontinued continuity discounts, and you're looking at both higher complexity and higher costs.

The strategic alternative

Stitchflow provides SCIM-level provisioning through resilient browser automation for JetBrains that eliminates these configuration headaches. We handle the complex Hub setup, IdP-specific workarounds, and multi-product coordination. Flat pricing under $5K/year, regardless of your JetBrains product mix or team size.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredEnterprise
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0, OIDC
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Jet Brains accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Jet Brains pricing problem

Jet Brains gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
JetBrains Hub✓ Full SCIM 2.0
Individual IDEs
YouTrack✓ Full SCIM 2.0
TeamCity/SpaceVia Hub
Via Hub

SCIM Access Structure

ComponentSCIM SupportNotes
JetBrains Hub✓ Full SCIM 2.0Central identity management
Individual IDEsManaged through Hub
YouTrack✓ Full SCIM 2.0Separate configuration
TeamCity/SpaceVia HubDepends on Hub setup

Hub acts as the central identity provider for the JetBrains ecosystem, but this creates a dependency chain that complicates provisioning workflows.

What this means in practice

Multi-product complexity: IT teams must configure and maintain SCIM connections for each JetBrains product separately, even though they're part of the same ecosystem. Hub manages IDE access, but YouTrack requires its own SCIM setup.

License allocation risks: SCIM provisioning can automatically allocate expensive IDE licenses when users are created, potentially burning through license budgets without approval workflows.

IdP-specific workarounds: Different identity providers require different approaches—Okta users must work around URL loop issues, while OIDC setups require creating separate SAML applications just for provisioning.

Additional constraints

Okta URL loop issue
Requires manual workaround during setup that's not documented in standard Okta integration guides.
OIDC/SCIM incompatibility
Teams using OIDC for SSO must maintain separate SAML applications specifically for SCIM provisioning—doubling the configuration overhead.
License management disconnect
No granular control over which provisioned users receive paid licenses versus free viewer access through SCIM attributes.
Upcoming price increases
With JetBrains announcing up to 30% price increases starting October 2025, accidental license allocation through SCIM becomes a more expensive mistake.

Summary of challenges

  • Jet Brains supports SCIM but only at Enterprise tier (custom pricing)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

JetBrains doesn't sell SCIM as a standalone feature. It comes bundled with JetBrains Hub, which serves as the identity management layer for their entire product suite:

SCIM 2.0 automated provisioning across all JetBrains tools
SAML single sign-on (SSO) and OIDC authentication
Centralized user management for IntelliJ IDEA, PyCharm, WebStorm, etc.
Cross-domain SSO capabilities
Team collaboration tools integration
Project and resource access controls
Audit logging and user activity tracking

The challenge: JetBrains Hub pricing isn't transparently published, and it often gets bundled with team tool packages. You're essentially paying for a comprehensive identity platform when you might just need basic user provisioning. Additionally, the October 2025 price increases (up to 30%) across JetBrains subscriptions will make this bundle even more expensive.

For organizations that only need automated user lifecycle management for their development tools, roughly 60% of Hub's identity and collaboration features will go unused.

What IT admins are saying

Community sentiment on JetBrains's SCIM implementation is mixed, with praise for functionality but frustration over complexity. Common complaints:

  • Okta integration requires non-intuitive workarounds due to URL loop issues
  • Risk of accidentally allocating expensive licenses during user provisioning
  • SCIM doesn't work with OIDC - requires separate SAML app configuration
  • Managing multiple JetBrains products (Hub, YouTrack, IDEs) with different configs

The Okta setup is more complex than it should be - you have to work around the URL loop which isn't documented well.

Reddit r/sysadmin

Be careful with SCIM provisioning - it can automatically assign licenses and you'll get hit with unexpected costs if you're not monitoring it closely.

JetBrains Community Forum

The recurring theme

JetBrains offers solid SCIM functionality, but the implementation complexity and license allocation risks make it challenging for IT teams to deploy confidently.

The decision

Your SituationRecommendation
Need SCIM but concerned about license costsUse Stitchflow: avoid JetBrains' complex licensing per IDE
Using Okta and want simple setupUse Stitchflow: skip the URL loop workarounds and SAML complications
Already have JetBrains Hub deployedUse native SCIM: you have the infrastructure in place
Multiple JetBrains products to manageEvaluate Stitchflow: centralized provisioning across all tools
Small dev team with low turnoverManual may work: but prepare for 30% price increases in Oct 2025

The bottom line

JetBrains' native SCIM works through Hub but comes with license allocation risks, Okta integration complexity, and the looming 30% price increase in October 2025. For teams wanting straightforward provisioning without navigating JetBrains' multi-product licensing maze, Stitchflow delivers simple automation at predictable flat-rate pricing.

Automate Jet Brains without the tier upgrade

Stitchflow delivers SCIM-level provisioning through resilient browser automation, backed by 24/7 human in the loop for Jet Brains at <$5K/year, flat, regardless of team size.

Works alongside or instead of native SCIM
Syncs with your existing IdP (Okta, Entra ID, Google Workspace)
Automates onboarding and offboarding
SOC 2 Type II certified
24/7 human-in-the-loop monitoring
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Enterprise

Prerequisites

SSO must be configured first

Key limitations

  • Okta setup requires workaround due to URL loop
  • License allocation concerns when provisioning
  • SCIM endpoint URL must be stored in IdP settings
  • SCIM provisioning not supported with OIDC - requires SAML workaround

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Jet Brains → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

SCIM 2.0 supported but requires SAML app for provisioning (OIDC doesn't support SCIM in Okta). Permanent token authentication. Watch for license allocation when provisioning users.

Native SCIM is available on Enterprise. Use Stitchflow if you need provisioning without the tier upgrade.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → Jet Brains → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

Microsoft Entra ID supported as OAuth2/OIDC provider. SCIM provisioning available - recommend mapping userName to mailNickname instead of userPrincipalName. Use Provision on demand to test before full sync.

Native SCIM is available on Enterprise. Use Stitchflow if you need provisioning without the tier upgrade.

Unlock SCIM for
Jet Brains

Jet Brains gates automation behind Enterprise plan. Stitchflow delivers the same SCIM outcomes for a flat fee.

See how it works
Admin Console
Directory
Applications
Jet Brains logo
Jet Brains
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Amplitude logo

Amplitude

SCIM Tax

Product Analytics

SCIM StatusIncluded
Manual Cost$11,754/yr

Amplitude supports SCIM provisioning, but only on Growth plans (starting around $36K/year) or Enterprise plans with custom pricing. While Amplitude's SCIM implementation covers the core functionality—creating, updating, and deactivating users—it requires SCIM to be specifically enabled for your organization, and regenerating the SCIM key immediately invalidates existing integrations without warning. For product teams on Plus plans ($49/month), upgrading to Growth just to unlock SCIM means jumping from under $600/year to $36,000+/year—a 60x increase. That's often more than the entire analytics budget for smaller product teams. The gap becomes particularly problematic for cross-functional product teams where analysts, PMs, and engineers need varying levels of access to user behavior data, but manual provisioning creates security risks around sensitive analytics permissions.

View full guide
Bill.com logo

Bill.com

SCIM Tax

Accounts Payable / Receivable Automation

SCIM StatusIncluded
Manual Cost$11,754/yr

Bill.com offers inconsistent SCIM provisioning support that varies dramatically by identity provider. While Okta users can access SCIM provisioning through the OIN integration, Bill.com doesn't publish native SCIM documentation, and other IdPs like Entra ID are limited to SAML SSO only. This fragmented approach means your provisioning capabilities depend entirely on your IdP choice rather than Bill.com's platform features. For finance teams managing sensitive AP/AR workflows where user access directly impacts invoice approvals and payment processing, this inconsistency creates operational gaps—especially when onboarding new controllers, AP clerks, or accountants requires manual role assignment tied to spending limits and approval hierarchies. The real problem is that Bill.com gates all SSO functionality behind Enterprise plans with custom pricing (typically 2-3x their Corporate plan at $79/user/month), yet still provides no clear path to automated provisioning for most customers. Since financial systems require precise role-based access controls for SOX compliance and segregation of duties, manual user management creates both security risks and administrative overhead. When employees change departments or leave the company, orphaned accounts in payment systems pose significant financial and compliance risks that manual processes often miss.

View full guide
Bitwarden logo

Bitwarden

SCIM Tax

Password Manager / Secrets Management

SCIM StatusIncluded
Manual Cost$11,754/yr

Bitwarden supports SCIM 2.0 provisioning, but only on Teams ($4/user/month) and Enterprise ($6/user/month) plans. While this pricing is reasonable compared to other password managers, the real challenge lies in Bitwarden's zero-knowledge architecture: SCIM can provision user accounts, but users still need to manually accept vault invitations and set up their encryption keys before gaining access to shared passwords. This creates a critical security gap. Your identity provider shows users as "provisioned," but they can't actually access company passwords until they complete manual setup steps. When employees leave, SCIM deprovisioning removes their account, but any locally cached vault data remains accessible until they next sync. For security teams managing hundreds of shared credentials, this manual friction undermines the entire purpose of automated provisioning.

View full guide