Stitchflow
Kayako logo

Kayako SCIM guide

Connector Only

How to automate Kayako user provisioning, and what it actually costs

Summary and recommendation

Kayako, the customer support platform, does not offer native SCIM provisioning on any plan. While Kayako provides SAML 2.0 SSO for both agents and customer portal users, authentication alone doesn't solve the user lifecycle management challenge. The platform relies entirely on manual account creation or third-party workarounds—OneLogin offers a proprietary connector for basic provisioning, but this creates vendor lock-in and doesn't work with other identity providers like Okta or Entra ID.

This creates a significant operational burden for IT teams managing support organizations. Without automated provisioning, every new support agent requires manual account setup in Kayako, and departing employees must be manually deprovisioned to maintain security compliance. For companies with seasonal support staff or rapid team growth, this manual process becomes a major bottleneck and security risk.

The strategic alternative

Kayako has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0, JWT
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaVia third-partyOIN verified. Supports SAML SSO and SWA. Create provisioning available.
Microsoft Entra IDVia third-partyAvailable in Azure Marketplace. Password vaulting integration, not native SCIM.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Kayako accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Kayako pricing problem

Kayako gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
StandardContact for pricing (~$15/agent/month)
EnterpriseContact for pricing

Provisioning structure

PlanPriceSSOSCIM
StandardContact for pricing (~$15/agent/month)
EnterpriseContact for pricing

What this means in practice

No direct provisioning control: Kayako cannot create, update, or deactivate users automatically. All user lifecycle management happens through:

Manual admin work in Kayako's interface
Third-party connector workarounds (OneLogin has one, others may not)
API-based custom scripts your team builds

IdP-dependent functionality: Your provisioning capabilities depend entirely on your identity provider:

Okta
Has a verified OIN integration with "Create" provisioning
Entra ID
Only password vaulting available, no user provisioning
Google Workspace
No documented provisioning connector
OneLogin
Native connector provides user provisioning

Additional constraints

Separate SSO domains
Kayako uses different authentication for agents vs. customer portal users, complicating identity management
Enterprise gate
SAML SSO requires Enterprise pricing, which uses custom quotes with no public pricing
Connector reliability
Third-party provisioning depends on IdP connector maintenance and compatibility with Kayako updates
Limited automation
No group-based access controls or role mapping through SCIM standards

Summary of challenges

  • Kayako does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Kayako actually offers for identity

SAML SSO (Enterprise tier)

Kayako provides SAML 2.0 single sign-on for both agent and customer portals:

SettingDetails
ProtocolSAML 2.0, JWT
Supported IdPsOneLogin, generic SAML providers
Agent SSOSeparate configuration from customer portal
Customer SSOIndependent SAML setup for end-users
JIT provisioning❌ Not supported

Key limitation: No just-in-time provisioning means you still need to manually create user accounts in Kayako before SSO authentication works.

IdP-Specific Provisioning Options

Different identity providers offer varying levels of Kayako integration:

Identity ProviderIntegration TypeUser Management
OktaOIN connector with SCIM✓ Create users
Entra IDPassword vaulting only❌ Manual sync required
OneLoginCustom connector✓ User provisioning
Google WorkspaceSAML SSO only❌ Manual sync required

The Reality Check

Kayako's identity story is fragmented. You get SAML SSO on Enterprise plans, but automated user provisioning depends entirely on your IdP having built a custom connector. Most organizations end up with a patchwork solution where SSO works but user lifecycle management remains manual.

For teams running Okta or OneLogin, the connector-based provisioning covers basic create/update operations. Everyone else is stuck with manual user management despite paying Enterprise pricing.

What IT admins are saying

Kayako's lack of native SCIM provisioning forces IT teams into workarounds:

The OneLogin connector provides some relief, but teams using other identity providers are left managing users manually across both systems.

  • No automated user provisioning - all accounts must be created manually
  • SAML SSO only works after manual account setup in Kayako
  • Dependence on third-party IdP connectors for any automation
  • Separate provisioning workflows for agents vs. customer portal users

User accounts must exist in Kayako to use single sign-on... SSO does not substitute account creation.

Kayako SSO documentation

The recurring theme

Kayako treats SSO and provisioning as separate problems, creating a two-step process where IT must both configure SAML authentication AND separately manage user accounts for every joiner, mover, and leaver.

The decision

Your SituationRecommendation
Small support team (<10 agents)Manual management with Okta's create provisioning
OneLogin shop with stable teamUse OneLogin's connector for basic provisioning
Growing support organization (25+ agents)Use Stitchflow: automation essential for scaling
Enterprise with compliance requirementsUse Stitchflow: automation essential for audit trail
Multi-brand customer support operationsUse Stitchflow: automation strongly recommended

The bottom line

Kayako offers solid helpdesk capabilities but leaves you with a patchwork of provisioning options—OneLogin's connector works for some, Okta has basic create functionality, but there's no unified SCIM support. For support teams that need reliable provisioning automation across any IdP without vendor lock-in, Stitchflow delivers the consistency Kayako can't.

Make Kayako workflows AI-native

Kayako has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No native SCIMSAML module for v4.50OneLogin provides provisioning via connectorSeparate SSO for agents and customers

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No native SCIM
  • SAML module for v4.50
  • OneLogin provides provisioning via connector
  • Separate SSO for agents and customers

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Kayako → Sign On

OIN verified. Supports SAML SSO and SWA. Create provisioning available.

Use Stitchflow for automated provisioning.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → Kayako → Single sign-on

Available in Azure Marketplace. Password vaulting integration, not native SCIM.

Use Stitchflow for automated provisioning.

Unlock SCIM for
Kayako

Kayako has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Kayako logo
Kayako
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Help Scout logo

Help Scout

SCIM Tax

Customer Support / Helpdesk

SCIM StatusIncluded
Manual Cost$11,754/yr

Help Scout supports user provisioning through Okta's integration, which offers Create Users, Update User Attributes, and Deactivate Users capabilities. Help Scout also offers SAML 2.0 SSO on the Pro plan ($65/user/month annually) with JIT provisioning. However, there's a notable inconsistency: Help Scout's own documentation states SCIM is not supported, while Okta's integration does provide provisioning functionality. This creates confusion for IT teams evaluating their options. The lack of true SCIM support creates significant operational overhead for support teams. While JIT provisioning automatically creates users when they first log in, there's no automated way to remove access when employees leave or change roles. IT admins must manually deactivate users in Help Scout, creating security gaps and compliance risks—especially problematic for customer support platforms that handle sensitive customer data and communications.

View full guide
6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
Aha! logo

Aha!

No SCIM

Product Management / Roadmapping

ProvisioningNot Supported
Manual Cost$11,754/yr

Aha! Roadmaps, the product roadmapping platform, does not support SCIM provisioning on any plan. While Aha! offers SAML 2.0 SSO integration with identity providers like Okta, Entra ID, and OneLogin, this only handles authentication through JIT (Just-In-Time) provisioning. The critical limitation: JIT provisioning creates user accounts with no default role or access permissions, requiring administrators to manually configure access for each user after they first sign in. For product teams managing strategic roadmaps and stakeholder access, this creates significant operational overhead. Since product roadmaps contain sensitive strategic information and stakeholder access typically varies by product area, IT administrators must manually assign appropriate roles and workspace permissions after each user is provisioned. There's no automatic deprovisioning when users leave the organization, creating potential security gaps. This manual process becomes particularly problematic for larger product organizations where dozens of stakeholders across different business units need carefully managed access to specific roadmaps.

View full guide