Stitchflow
JustCall logo

JustCall SCIM guide

Connector Only

How to automate JustCall user provisioning, and what it actually costs

Summary and recommendation

JustCall, the cloud phone system for sales and support teams, does not support SCIM provisioning on any plan. While JustCall offers SAML 2.0 SSO with just-in-time provisioning on Business plans (custom pricing for 10+ users), this only creates user accounts during first login—it doesn't handle ongoing lifecycle management like role updates, team assignments, or automated deprovisioning. For organizations with frequent sales team changes or strict compliance requirements, this creates a significant operational burden.

The gap between SSO and provisioning becomes particularly problematic for contact centers and sales organizations that need to rapidly onboard agents, update call routing permissions, or ensure former employees lose access immediately upon termination. JustCall's manual user management approach forces IT teams to coordinate directly with business users for every permission change, creating both security risks and administrative overhead. Note that while Okta's integration catalog shows SCIM support for JustCall, the official JustCall documentation only references SAML SSO, suggesting this may be outdated or limited functionality.

The strategic alternative

JustCall has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaVia third-partyOIN verified integration. Supports SSO and provisioning with Group Push, Schema Discovery, Attribute Writeback.
Microsoft Entra IDVia third-partyAzure AD SSO supported. No native SCIM provisioning documented.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages JustCall accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The JustCall pricing problem

JustCall gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Essentials$19/user/month
Team$29/user/month
Pro$49/user/month
Pro Plus$89/user/month
BusinessCustom pricing (10+ users)

Pricing structure

PlanPriceSSOSCIM
Essentials$19/user/month
Team$29/user/month
Pro$49/user/month
Pro Plus$89/user/month
BusinessCustom pricing (10+ users)

Note: There's conflicting information about JustCall's SCIM support. While the Okta Integration Network lists SCIM provisioning features, JustCall's official documentation only mentions SAML SSO with JIT provisioning.

What this means in practice

For sales and support teams using JustCall

Users must be manually created or rely on JIT provisioning on first login
No automated deprovisioning when employees leave
No group-based access management
Contact center managers must manually adjust user permissions and phone number assignments

Business plan barrier

Teams on Team ($29/user/month) or Pro ($49/user/month) plans cannot use SSO at all
Upgrading to Business plan requires custom pricing negotiation for 10+ users
SSO forces all users to SSO-only login (no mixed authentication)

Additional constraints

Manual provisioning overhead
IT must manually create accounts for each new sales rep or support agent
Deprovisioning risk
No automated removal of users when employees leave, creating security gaps
Mixed authentication complexity
Enabling SSO forces all users to SSO-only login, complicating mixed environments
Documentation gaps
Conflicting information between Okta's integration listing and JustCall's official docs creates uncertainty

Summary of challenges

  • JustCall does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What JustCall actually offers for identity

SAML SSO (Business plan only)

JustCall supports SAML 2.0 integration with enterprise identity providers:

SettingDetails
ProtocolSAML 2.0
Supported IdPsOkta, Azure AD, Google Workspace, OneLogin, JumpCloud, Rippling
User provisioningJIT (Just-in-Time) only
Plan requirementBusiness (custom pricing, 10+ users minimum)
Login enforcementForces SSO-only login for all users when enabled

Critical limitation: JustCall has no native SCIM provisioning. Users are only created on first login through JIT provisioning, meaning you can't pre-provision accounts or manage user lifecycles programmatically.

Okta Integration (via OIN)

The official Okta Integration Network listing shows SCIM provisioning support, but this contradicts JustCall's own documentation:

FeatureOkta ClaimsReality
SAML SSO✓ Yes✓ Yes (Business plan)
SCIM provisioning✓ Yes❌ No native SCIM documented
Group Push✓ Yes❌ JIT provisioning only
Schema Discovery✓ Yes❌ No SCIM API available

The disconnect: Okta's listing suggests full SCIM capabilities, but JustCall's documentation and support materials only reference SAML SSO with JIT provisioning. This likely means the OIN integration is outdated or the SCIM functionality is not generally available.

What you're actually paying for

The Business plan includes enterprise security features beyond SSO:

SOC 2 Type 2 and ISO 27001 compliance
Advanced call routing and IVR
Custom integrations
Dedicated customer success manager

But if you just need automated user provisioning, you're paying custom enterprise pricing for a cloud phone system when the actual identity management capabilities are limited to basic JIT provisioning.

What IT admins are saying

JustCall's lack of automated provisioning creates ongoing manual work for IT teams managing sales and support staff:

  • Manual user creation required even with SSO enabled
  • No SCIM support means no automated deprovisioning when employees leave
  • Business plan requirement adds cost pressure for smaller teams needing basic security
  • SSO forces all users into SSO-only login, removing flexibility for external contractors

SAML SSO with Okta, Azure, Google, OneLogin, JumpCloud, Rippling. Business plan only. Forces SSO-only login when enabled.

JustCall documentation

User provisioning is handled through Just-In-Time (JIT) provisioning when users first log in via SSO.

JustCall support documentation

The recurring theme

While JustCall offers JIT provisioning through SSO, the lack of SCIM means IT teams must manually track and deprovision users when they leave, creating security risks in a platform that handles customer phone calls and sensitive sales data.

The decision

Your SituationRecommendation
Small sales/support team (<10 users)Manual management is workable with JIT provisioning
Growing contact center (10-50 agents)Use Stitchflow: manual onboarding slows agent deployment
Enterprise with high agent turnoverUse Stitchflow: automation essential for rapid scaling
Multi-location call centersUse Stitchflow: centralized provisioning prevents inconsistencies
Compliance-focused organizationUse Stitchflow: audit trail required for user lifecycle management

The bottom line

JustCall offers solid cloud telephony features but zero SCIM provisioning—even with their Business plan, you're stuck with manual user management or basic JIT. For sales teams and contact centers that need rapid agent onboarding and offboarding, Stitchflow delivers the automation JustCall doesn't provide.

Make JustCall workflows AI-native

JustCall has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No SCIM provisioning documentedBusiness plan required for SSOSSO forces all users to SSO-only login

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No SCIM provisioning documented
  • Business plan required for SSO
  • SSO forces all users to SSO-only login

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Where to enable

Okta Admin Console → Applications → JustCall → Sign On

OIN verified integration. Supports SSO and provisioning with Group Push, Schema Discovery, Attribute Writeback.

Use Stitchflow for automated provisioning.

Unlock SCIM for
JustCall

JustCall has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
JustCall logo
JustCall
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
Aha! logo

Aha!

No SCIM

Product Management / Roadmapping

ProvisioningNot Supported
Manual Cost$11,754/yr

Aha! Roadmaps, the product roadmapping platform, does not support SCIM provisioning on any plan. While Aha! offers SAML 2.0 SSO integration with identity providers like Okta, Entra ID, and OneLogin, this only handles authentication through JIT (Just-In-Time) provisioning. The critical limitation: JIT provisioning creates user accounts with no default role or access permissions, requiring administrators to manually configure access for each user after they first sign in. For product teams managing strategic roadmaps and stakeholder access, this creates significant operational overhead. Since product roadmaps contain sensitive strategic information and stakeholder access typically varies by product area, IT administrators must manually assign appropriate roles and workspace permissions after each user is provisioned. There's no automatic deprovisioning when users leave the organization, creating potential security gaps. This manual process becomes particularly problematic for larger product organizations where dozens of stakeholders across different business units need carefully managed access to specific roadmaps.

View full guide
Appcues logo

Appcues

No SCIM

Product Adoption / User Onboarding

ProvisioningNot Supported
Manual Cost$11,754/yr

Appcues, the product adoption platform used by product managers and growth teams, explicitly does not support SCIM provisioning on any plan—not even Enterprise. While Appcues offers SAML 2.0 SSO integration starting at the Enterprise tier with just-in-time (JIT) provisioning, this only creates users during first login and provides no automated deprovisioning capabilities. For product teams where access needs change frequently as people move between projects or leave the company, this creates a significant security gap. The lack of SCIM means IT teams must manually manage user lifecycle for Appcues accounts, even though the platform handles sensitive product analytics and user flow data. When employees leave or change roles, their Appcues access remains active until manually revoked—a compliance risk that's particularly problematic given Appcues' role in tracking user behavior and product metrics. With MAU-based pricing starting at $300/month and scaling significantly with usage, paying for orphaned accounts also creates unnecessary cost bloat.

View full guide