Summary and recommendation
Kayako, the customer support platform, does not offer native SCIM provisioning on any plan. While Kayako provides SAML 2.0 SSO for both agents and customer portal users, authentication alone doesn't solve the user lifecycle management challenge. The platform relies entirely on manual account creation or third-party workarounds—OneLogin offers a proprietary connector for basic provisioning, but this creates vendor lock-in and doesn't work with other identity providers like Okta or Entra ID.
This creates a significant operational burden for IT teams managing support organizations. Without automated provisioning, every new support agent requires manual account setup in Kayako, and departing employees must be manually deprovisioned to maintain security compliance. For companies with seasonal support staff or rapid team growth, this manual process becomes a major bottleneck and security risk.
The strategic alternative
Kayako has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | Yes |
| SSO available? | Yes |
| SSO protocol | SAML 2.0, JWT |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | Via third-party | ❌ | OIN verified. Supports SAML SSO and SWA. Create provisioning available. |
| Microsoft Entra ID | Via third-party | ❌ | Available in Azure Marketplace. Password vaulting integration, not native SCIM. |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages Kayako accounts manually. Here's what that costs:
The Kayako pricing problem
Kayako gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Standard | Contact for pricing (~$15/agent/month) | ||
| Enterprise | Contact for pricing |
Provisioning structure
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Standard | Contact for pricing (~$15/agent/month) | ||
| Enterprise | Contact for pricing |
What this means in practice
No direct provisioning control: Kayako cannot create, update, or deactivate users automatically. All user lifecycle management happens through:
IdP-dependent functionality: Your provisioning capabilities depend entirely on your identity provider:
Additional constraints
Summary of challenges
- Kayako does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What Kayako actually offers for identity
SAML SSO (Enterprise tier)
Kayako provides SAML 2.0 single sign-on for both agent and customer portals:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0, JWT |
| Supported IdPs | OneLogin, generic SAML providers |
| Agent SSO | Separate configuration from customer portal |
| Customer SSO | Independent SAML setup for end-users |
| JIT provisioning | ❌ Not supported |
Key limitation: No just-in-time provisioning means you still need to manually create user accounts in Kayako before SSO authentication works.
IdP-Specific Provisioning Options
Different identity providers offer varying levels of Kayako integration:
| Identity Provider | Integration Type | User Management |
|---|---|---|
| Okta | OIN connector with SCIM | ✓ Create users |
| Entra ID | Password vaulting only | ❌ Manual sync required |
| OneLogin | Custom connector | ✓ User provisioning |
| Google Workspace | SAML SSO only | ❌ Manual sync required |
The Reality Check
Kayako's identity story is fragmented. You get SAML SSO on Enterprise plans, but automated user provisioning depends entirely on your IdP having built a custom connector. Most organizations end up with a patchwork solution where SSO works but user lifecycle management remains manual.
For teams running Okta or OneLogin, the connector-based provisioning covers basic create/update operations. Everyone else is stuck with manual user management despite paying Enterprise pricing.
What IT admins are saying
Kayako's lack of native SCIM provisioning forces IT teams into workarounds:
The OneLogin connector provides some relief, but teams using other identity providers are left managing users manually across both systems.
- No automated user provisioning - all accounts must be created manually
- SAML SSO only works after manual account setup in Kayako
- Dependence on third-party IdP connectors for any automation
- Separate provisioning workflows for agents vs. customer portal users
User accounts must exist in Kayako to use single sign-on... SSO does not substitute account creation.
The recurring theme
Kayako treats SSO and provisioning as separate problems, creating a two-step process where IT must both configure SAML authentication AND separately manage user accounts for every joiner, mover, and leaver.
The decision
| Your Situation | Recommendation |
|---|---|
| Small support team (<10 agents) | Manual management with Okta's create provisioning |
| OneLogin shop with stable team | Use OneLogin's connector for basic provisioning |
| Growing support organization (25+ agents) | Use Stitchflow: automation essential for scaling |
| Enterprise with compliance requirements | Use Stitchflow: automation essential for audit trail |
| Multi-brand customer support operations | Use Stitchflow: automation strongly recommended |
The bottom line
Kayako offers solid helpdesk capabilities but leaves you with a patchwork of provisioning options—OneLogin's connector works for some, Okta has basic create functionality, but there's no unified SCIM support. For support teams that need reliable provisioning automation across any IdP without vendor lock-in, Stitchflow delivers the consistency Kayako can't.
Make Kayako workflows AI-native
Kayako has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- No native SCIM
- SAML module for v4.50
- OneLogin provides provisioning via connector
- Separate SSO for agents and customers
Documentation not available.
Configuration for Okta
Integration type
Okta Integration Network (OIN) app
Prerequisite
SSO must be configured before enabling SCIM.
Where to enable
Docs
OIN verified. Supports SAML SSO and SWA. Create provisioning available.
Use Stitchflow for automated provisioning.
Configuration for Entra ID
Integration type
Microsoft Entra Gallery app
Prerequisite
SSO must be configured before enabling SCIM.
Where to enable
Available in Azure Marketplace. Password vaulting integration, not native SCIM.
Use Stitchflow for automated provisioning.
Unlock SCIM for
Kayako
Kayako has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.
See how it works


