Stitchflow
KnowBe4 logo

KnowBe4 SCIM guide

Native SCIM

How to automate KnowBe4 user provisioning, and what it actually costs

Native SCIM requires Enterprise (varies by plan) plan

Summary and recommendation

KnowBe4 supports SCIM across all plans (Silver through Diamond), enabling automatic user provisioning from your IdP to their KSAT console. However, SCIM is strictly one-way sync only—changes made within KnowBe4 never sync back to your identity provider. This creates a problematic data flow where user attributes, group memberships, or account status changes made in KnowBe4 remain isolated, forcing IT teams to maintain dual sources of truth.

For security awareness training, this limitation is particularly problematic because compliance tracking requires accurate, centralized user data. When employees complete training, change departments, or have their access modified in KnowBe4, those updates don't flow back to your IdP, creating gaps in your identity governance. SSO alone doesn't solve this—it handles authentication but leaves the provisioning gap that compliance audits will catch.

The strategic alternative

KnowBe4 gates SCIM behind Enterprise (varies by plan). Skip the Enterprise (varies by plan) plan upgrade and automate complete outcomes across your stack. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredEnterprise
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages KnowBe4 accounts manually. Here's what that costs:

Source: Stitchflow customers using KnowBe4, normalized to 500 employees:
Orphaned accounts (ex-employees with access)2
Unused licenses3
IT hours spent on manual management/year166 hours
Unused license cost/year$123
IT labor cost/year$9,937
Cost of compliance misses/year$503
Total annual financial impact$10,564

The KnowBe4 pricing problem

KnowBe4 gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Silver$0.95-$1.50/user/mo
Gold$1.50-$2.00/user/mo
Platinum$2.00-$2.50/user/mo
Diamond$2.50-$3.25/user/mo

Plan Structure

PlanPriceSCIM
Silver$0.95-$1.50/user/mo
Gold$1.50-$2.00/user/mo
Platinum$2.00-$2.50/user/mo
Diamond$2.50-$3.25/user/mo

Note: 25-user minimum across all plans. SCIM available through KSAT console integration.

What this means in practice

The one-way sync limitation creates several operational challenges:

Dual management required
Any user updates in KnowBe4 (role changes, training assignments, etc.) must be manually reflected in your IdP to maintain consistency.
Alias email support lost
Organizations using alias emails lose this functionality when switching from manual provisioning to SCIM.
Training completion data isolation
User training progress and completion status remains locked in KnowBe4 with no way to sync back to your identity system for broader compliance reporting.

Additional constraints

Azure nested groups unsupported
Organizations using nested Azure AD groups for department/role-based training assignments must flatten their group structure or manage assignments manually.
No attribute writeback
User training status, last login, or other KnowBe4-generated attributes cannot be pushed back to your IdP for use in other applications or reporting.
Console-dependent changes
Any bulk user updates or training assignments made directly in the KSAT console create data drift that requires manual reconciliation with your IdP.

Summary of challenges

  • KnowBe4 supports SCIM but only at Enterprise tier (custom pricing)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

KnowBe4 includes SCIM across all pricing tiers—no upgrade required. Here's what comes with their security awareness platform:

SCIM automated provisioning (one-way sync only)
SAML single sign-on (SSO)
Security awareness training content
Phishing simulation campaigns
Compliance reporting and tracking
User training progress dashboards
Basic administrative controls

The catch: KnowBe4's SCIM is fundamentally limited by design. It only syncs from your IdP to KnowBe4—changes made in the KSAT console don't sync back to your identity provider. This breaks the core promise of SCIM: bidirectional synchronization.

Additional limitations include no support for alias email addresses when using SCIM, and nested Azure groups don't work properly. For a security training platform where compliance tracking is critical, these sync gaps create real operational problems.

What IT admins are saying

Community sentiment on KnowBe4's SCIM implementation is mixed, with most complaints focused on functional limitations rather than pricing. Common frustrations:

  • One-way sync only - changes made in KnowBe4 don't sync back to IdP
  • Loss of alias email functionality when enabling SCIM
  • Azure nested groups not supported despite being a common enterprise setup
  • Manual workarounds still required for bi-directional updates

The one-way sync is really limiting - we still have to manually update our IdP when users change roles in KnowBe4, which defeats half the purpose of automation.

Reddit r/sysadmin

Switched to SCIM and immediately lost all our alias emails. Had to choose between automation and email flexibility.

Spiceworks Community

The recurring theme

KnowBe4's SCIM works for basic provisioning but falls short on advanced enterprise requirements, forcing admins to accept functional trade-offs or maintain hybrid manual processes.

The decision

Your SituationRecommendation
Need bidirectional sync or alias email supportUse Stitchflow: KnowBe4's one-way SCIM won't meet your needs
Using nested Azure groups for organizationUse Stitchflow: KnowBe4 doesn't support nested groups
Want changes in KnowBe4 to sync back to IdPUse Stitchflow: native SCIM is one-way only
Happy with one-way sync, have any KnowBe4 planUse native SCIM: it's included across all tiers
Small org with stable workforceManual may work: but security training compliance is critical

The bottom line

KnowBe4's native SCIM works across all plans but forces you into one-way sync only—changes in the KSAT console never flow back to your IdP. For organizations that need full bidirectional provisioning or use complex group structures, Stitchflow provides the automation KnowBe4's native integration can't deliver.

Make KnowBe4 workflows AI-native

KnowBe4 gates SCIM behind Enterprise (varies by plan). We build complete offboarding, user access reviews, and license workflows without that SCIM Tax upgrade.

No Enterprise (varies by plan) upgrade required
Less than a week, start to finish (~2 hours of your time)
We maintain the integration layer underneath
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Enterprise

Prerequisites

SSO must be configured first

Key limitations

  • One-way sync only (IdP to KnowBe4)
  • Changes in KSAT console don't sync back to IdP
  • Alias email addresses not supported with SCIM
  • Nested groups not supported with Azure SCIM

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → KnowBe4 → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

Full SCIM support. One-way sync from Okta to KSAT. Test Mode available before enabling. Nested groups not supported.

KnowBe4 gates SCIM behind Enterprise (varies by plan). Stitchflow automates complete workflows without that SCIM Tax upgrade.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → KnowBe4 → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

Full SCIM with Azure AD/Entra. Microsoft Learn tutorial available. Nested Azure groups not supported.

KnowBe4 gates SCIM behind Enterprise (varies by plan). Stitchflow automates complete workflows without that SCIM Tax upgrade.

Unlock SCIM for
KnowBe4

KnowBe4 gates SCIM behind Enterprise (varies by plan). We automate complete offboarding and access reviews across your stack without that SCIM Tax upgrade.

See how it works
Admin Console
Directory
Applications
KnowBe4 logo
KnowBe4
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Stripe logo

Stripe

SCIM Tax

Payments / Financial Services

SCIM StatusIncluded
Manual Cost$10,366/yr

Stripe supports SCIM 2.0 for automated user provisioning, but only for accounts with SSO enabled—which typically requires a custom enterprise agreement. The SCIM implementation is currently in private preview and limited to basic user lifecycle (create/deactivate), with role management handled separately through SAML attribute statements rather than SCIM groups. This creates a critical gap for payment teams: while users can be provisioned automatically, their Dashboard permissions must be managed through SAML attributes, and deactivated users aren't immediately locked out due to SAML session limitations. For financial systems handling sensitive payment data, this delay in access revocation poses a real compliance risk—especially problematic given PCI requirements for immediate access control.

View full guide
1Password logo

1Password

SCIM Tax
SCIM StatusIncluded
Manual Cost$11,167/yr

1Password supports SCIM provisioning on its Business plan ($7.99/user/month), but requires deploying and managing the 1Password SCIM Bridge on your own infrastructure. This self-hosted approach means you're responsible for maintaining servers, handling updates, and troubleshooting connectivity issues between your identity provider and 1Password's systems. The SCIM Bridge also operates separately from SSO (which uses OIDC only), requiring you to configure and maintain two distinct integrations. This architecture creates operational overhead that many IT teams don't want to manage. Unlike cloud-native SCIM implementations, you're essentially running 1Password's provisioning infrastructure for them. When the SCIM Bridge goes down, provisioning stops working. When 1Password updates their API, you need to update your Bridge deployment. For teams that just want automated user lifecycle management, this becomes an ongoing maintenance burden.

View full guide
Figma logo

Figma

SCIM Tax
SCIM Tax+244%
Manual Cost$11,347/yr

Figma supports SCIM provisioning, but only starting with the Organization plan at $55/user/month—a 244% increase from Professional ($16/user/month). Even then, Organization only provides basic SCIM functionality. Full seat management via SCIM (automatically assigning Editor vs. Admin permissions) requires Enterprise at $90/user/month. This means teams upgrading from Professional face a $74/user/month jump to get complete provisioning automation. The March 2025 billing model changes add another complication: existing SCIM configurations may require migration, creating unexpected technical debt for IT teams who thought their provisioning was settled. For a 100-person Professional team, accessing full SCIM seat management means paying an extra $88,800/year—often just to automate what could be simple user lifecycle management.

View full guide