Stitchflow
Keeper logo

Keeper SCIM guide

Native SCIM

How to automate Keeper user provisioning, and what it actually costs

Native SCIM requires Enterprise plan

Summary and recommendation

Keeper Security supports full SCIM 2.0 provisioning, but only on Enterprise plans with custom pricing (typically ~$60/user/year for 100+ users). Teams on Business plans ($3.75/user/month) get SSO but no automated provisioning - meaning IT admins must manually invite, assign teams, and manage vault access for every user. When employees leave, deprovisioning only locks their vault rather than deleting the account, creating ongoing security visibility gaps.

This creates a significant gap for password management governance. SSO alone doesn't solve the provisioning problem - you still need manual processes for onboarding, role assignments, and vault permissions. For security-critical applications like password managers, manual user lifecycle management introduces compliance risks and delays that undermine the zero-trust model most organizations are trying to achieve.

The strategic alternative

Stitchflow provides SCIM-level provisioning through resilient browser automation for Keeper without requiring Enterprise tier upgrades. Works with Business plans and any identity provider. Flat pricing under $5K/year with SOC 2 Type II certification and 24/7 human-in-the-loop support.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredEnterprise
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Keeper accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Keeper pricing problem

Keeper gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Plan Structure

PlanPriceSSOSCIM
Business Starter$2/user/mo
Business$3.75/user/mo
EnterpriseCustom (~$5/user/mo)

Note: Enterprise pricing is quoted individually but typically runs around $60/user/year for 100+ user deployments. Full SCIM 2.0 support includes user creation, attribute updates, deactivation, and team provisioning across all major IdPs.

What this means in practice

Using typical Enterprise pricing compared to Business tier:

Team SizeAnnual Upgrade CostBusiness TotalEnterprise Total
50 users+$6,750/year$2,250/year$9,000/year
100 users+$13,500/year$4,500/year$18,000/year
200 users+$27,000/year$9,000/year$36,000/year

Calculation: ($5 - $3.75) × users × 12 months for upgrade cost

Additional constraints

Custom sales process
Enterprise pricing requires going through Keeper's sales team rather than self-service signup.
Zero-knowledge limitations
Users cannot be fully deleted via SCIM due to Keeper's zero-knowledge architecture—deactivation locks their vault instead.
SSO dependency
SCIM requires Keeper SSO Connect, which adds architectural complexity for the zero-knowledge encryption model.
Volume commitments
Enterprise contracts typically include minimum user commitments and annual terms.

Summary of challenges

  • Keeper supports SCIM but only at Enterprise tier (custom pricing)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

Keeper doesn't sell SCIM à la carte. It's bundled with Enterprise features that most teams won't use:

SCIM 2.0 automated provisioning (create, update, deactivate users)
Team provisioning and role mapping
Keeper SSO Connect for SAML single sign-on
Zero-knowledge encryption architecture
Advanced security policies and compliance
KeeperPAM privileged access management
24/7 dedicated support
Advanced reporting and audit logs

Stitchflow Insight

The challenge? Enterprise pricing starts around $60/user/year for 100+ users, but most organizations just need the password manager with automated provisioning. You're forced to buy advanced security features, PAM modules, and enterprise support you likely don't need. We estimate ~60% of Enterprise features are irrelevant for teams that just want SCIM automation with their existing password management workflows.

What IT admins are saying

Community sentiment on Keeper's SCIM implementation is mixed but generally positive. While the Enterprise tier requirement creates some friction, most admins appreciate the robust zero-knowledge architecture. Common observations:

  • Enterprise pricing can be steep for smaller teams (100+ users typically needed for reasonable rates)
  • Zero-knowledge architecture adds complexity but provides superior security
  • User deletion not supported - deactivation locks vaults instead
  • Keeper SSO Connect requirement adds another moving part to manage

The zero-knowledge approach means you can't just delete users like other apps - when you deprovision someone, their vault gets locked but the data stays encrypted. It's secure but different from what most IT teams expect.

Reddit r/sysadmin

Keeper's SCIM works well once you understand the architecture. The Enterprise requirement is annoying for mid-size companies, but the security model is solid.

Spiceworks Community

The recurring theme

Keeper's security-first approach creates some provisioning quirks, but most IT teams accept the tradeoffs once they understand the zero-knowledge benefits.

The decision

Your SituationRecommendation
On Business plan, need SCIMUse Stitchflow: avoid the Enterprise upgrade and custom pricing
On any plan but need zero-knowledge SSOUpgrade to Enterprise: SCIM comes with Keeper SSO Connect
Already on Enterprise with SCIMUse native SCIM: you're paying for it and it's fully featured
Need advanced PAM features beyond passwordsEvaluate Enterprise: KeeperPAM and SCIM come bundled
Small team with basic password management needsManual may work: but monitor vault access for departed users

The bottom line

Keeper's Enterprise-only SCIM means custom pricing for provisioning automation. For teams on Business plans that need SCIM without the Enterprise feature overhead, Stitchflow delivers managed provisioning at predictable pricing while Keeper handles the password security.

Automate Keeper without the tier upgrade

Stitchflow delivers SCIM-level provisioning through resilient browser automation, backed by 24/7 human in the loop for Keeper at <$5K/year, flat, regardless of team size.

Works alongside or instead of native SCIM
Syncs with your existing IdP (Okta, Entra ID, Google Workspace)
Automates onboarding and offboarding
SOC 2 Type II certified
24/7 human-in-the-loop monitoring
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Enterprise

Prerequisites

SSO must be configured first

Key limitations

  • User delete not supported - disable locks vault
  • Zero-knowledge architecture affects provisioning
  • Keeper SSO Connect required for SSO

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Keeper → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

Full SCIM 2.0. One-click provisioning/deprovisioning. Users in pending state until invite accepted. Ranked #1 fastest growing app in EMEA by Okta.

Native SCIM is available on Enterprise. Use Stitchflow if you need provisioning without the tier upgrade.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → Keeper → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

Full SCIM 2.0 with Azure AD/Entra. Supports both commercial and Azure Government Cloud. Microsoft Learn tutorial available.

Native SCIM is available on Enterprise. Use Stitchflow if you need provisioning without the tier upgrade.

Unlock SCIM for
Keeper

Keeper gates automation behind Enterprise plan. Stitchflow delivers the same SCIM outcomes for a flat fee.

See how it works
Admin Console
Directory
Applications
Keeper logo
Keeper
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

LastPass logo

LastPass

SCIM Tax

Password Management / Security

SCIM Tax+75%
Manual Cost$9,705/yr

LastPass supports SCIM provisioning starting at the Business tier ($7/user/month), with integration support for all major identity providers including Okta, Entra ID, Google Workspace, and OneLogin. However, LastPass SCIM has critical limitations around deprovisioning: when users are removed, their vault access isn't immediately revoked, and shared folder permissions become complex to manage at scale. This creates a significant security gap for IT teams. Password vaults contain the most sensitive credentials in your organization—API keys, service accounts, privileged access passwords. When employees leave or change roles, their access to these credentials must be revoked immediately, not left accessible while IT manually cleans up vault permissions. SSO alone doesn't solve this because it only controls login authentication, not ongoing vault access or shared resource permissions.

View full guide
Dashlane logo

Dashlane

SCIM Tax

Password Management / Security

SCIM StatusIncluded
Manual Cost$11,754/yr

Dashlane supports SCIM (the protocol that lets your identity provider automatically create, update, and remove user accounts). But there's a catch: Google Workspace users are locked out of SCIM entirely, limited to JIT provisioning only. For Okta, Entra ID, and PingIdentity users, full SCIM provisioning is available starting at $8/user/month on Business plans. The Google Workspace limitation creates a significant gap for organizations using Google as their primary IdP. Without SCIM, IT teams must manually provision password manager access for every employee onboarding and offboarding - a critical security workflow that should never rely on manual processes. JIT provisioning only works when users first attempt to log in, leaving your password security incomplete until then.

View full guide
Amplitude logo

Amplitude

SCIM Tax

Product Analytics

SCIM StatusIncluded
Manual Cost$11,754/yr

Amplitude supports SCIM provisioning, but only on Growth plans (starting around $36K/year) or Enterprise plans with custom pricing. While Amplitude's SCIM implementation covers the core functionality—creating, updating, and deactivating users—it requires SCIM to be specifically enabled for your organization, and regenerating the SCIM key immediately invalidates existing integrations without warning. For product teams on Plus plans ($49/month), upgrading to Growth just to unlock SCIM means jumping from under $600/year to $36,000+/year—a 60x increase. That's often more than the entire analytics budget for smaller product teams. The gap becomes particularly problematic for cross-functional product teams where analysts, PMs, and engineers need varying levels of access to user behavior data, but manual provisioning creates security risks around sensitive analytics permissions.

View full guide