Stitchflow
LearnUpon logo

LearnUpon SCIM guide

Connector Only

How to automate LearnUpon user provisioning, and what it actually costs

Summary and recommendation

LearnUpon, the enterprise learning management system, does not offer native SCIM provisioning on any plan. While LearnUpon provides SAML 2.0 SSO with just-in-time (JIT) provisioning that can create users automatically on first login, this approach creates significant gaps for IT teams managing learner access at scale. The platform requires IdP-initiated SSO only and limits organizations to a single SAML configuration per portal, making multi-tenant or complex organizational structures challenging to manage.

The JIT-only approach means IT teams have no systematic way to provision users in advance, assign them to specific courses or learning paths, or bulk-manage user lifecycle events like role changes or terminations. For L&D teams running compliance training or onboarding programs, this creates operational overhead and potential security risks when users can only be created reactively rather than proactively managed through your identity provider.

The strategic alternative

LearnUpon has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaVia third-partyOIN app supports provisioning with schema discovery and attribute writeback. Create/update/deactivate users. Integration verified by Okta.
Microsoft Entra IDVia third-partySSO only with JIT provisioning - users created on first login. Group sync works only with SAML SSO, not native Azure. Azure sends group GUID only, not names.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages LearnUpon accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The LearnUpon pricing problem

LearnUpon gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Essential~$900-1,350/month (150 users)
PremiumCustom, starts ~$15,000/year

Pricing and provisioning options

PlanPricingSCIMSSO
Essential~$900-1,350/month (150 users)❌ Not available✓ SAML SSO with JIT
PremiumCustom, starts ~$15,000/year❌ Not available*✓ SAML SSO with JIT

*Okta users may have SCIM access through the OIN app, but this isn't documented in LearnUpon's official materials.

What this means in practice

For most IdPs: You're stuck with JIT provisioning, which means:

Users only get created when they first log in
No proactive account creation for onboarding workflows
Can't provision accounts before granting system access
No automated deprovisioning when employees leave

For Okta users: There's conflicting information. Okta's integration directory shows SCIM support, but LearnUpon's own documentation only mentions SAML JIT. This creates uncertainty about what actually works.

Additional constraints

IdP-initiated SSO only
Users must start their login from the identity provider, not from LearnUpon directly
Single SAML configuration per portal
Multi-tenant deployments require separate LearnUpon instances
Group assignment limitations
Role and group mapping happens through SAML attributes, not dedicated provisioning protocols
API dependency
Bulk user operations require custom API integration work outside the SSO flow

Summary of challenges

  • LearnUpon does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What LearnUpon actually offers for identity

SAML SSO with JIT Provisioning (All Plans)

LearnUpon provides SAML 2.0 integration with just-in-time user provisioning:

SettingDetails
ProtocolSAML 2.0
Supported IdPsOkta, Azure AD, Google Workspace, Salesforce, ADFS
User creationAutomatic on first login (JIT)
Group assignmentVia SAML attributes
InitiationIdP-initiated only (no SP-initiated)
Portal limitationSingle SAML config per portal

Critical limitation: LearnUpon requires IdP-initiated SSO only. Users cannot start from LearnUpon and authenticate via their IdP—they must click through from their identity provider dashboard.

Okta Integration (via OIN)

The official Okta Integration Network app provides more than SAML alone:

FeatureSupported?
SAML SSO✓ Yes
Create users✓ Yes (via SCIM)
Update users✓ Yes
Deactivate users✓ Yes
Group push✓ Yes
Schema discovery✓ Yes
Attribute writeback✓ Yes

The disconnect: LearnUpon's own documentation shows no SCIM support, but their verified Okta integration clearly supports full SCIM provisioning with schema discovery and writeback capabilities.

Azure AD Integration

Microsoft's official integration guide confirms more limited functionality:

FeatureSupported?
SAML SSO✓ Yes
Create users❌ No (JIT only)
Update users❌ No
Deactivate users❌ No
Group sync⚠️ Partial (GUIDs only, not names)

Translation: With Azure AD, you get basic SSO with JIT provisioning, but group synchronization only passes GUIDs rather than readable group names, limiting its practical value.

What IT admins are saying

LearnUpon's limited provisioning options create ongoing headaches for IT teams managing learning platforms:

  • No true SCIM support - Despite Okta's integration app showing "SCIM provisioning," LearnUpon's own documentation only mentions SAML SSO with JIT provisioning
  • IdP-initiated SSO only - Users can't log in directly from LearnUpon; they must always start from the identity provider
  • Separate SAML configs per portal - Multi-tenant organizations need individual SSO setups for each LearnUpon portal
  • Manual group management - While SAML attributes can assign groups, any changes require coordinating between IdP settings and LearnUpon configuration

Set up SAML SSO for your portal... Users auto-created on first login.

LearnUpon Support Documentation

Azure sends group GUID only, not names... Group sync works only with SAML SSO, not native Azure.

Microsoft Entra Integration Notes

The recurring theme

LearnUpon forces IT teams into a patchwork of JIT provisioning and manual processes, with conflicting information about actual SCIM capabilities that leaves admins unsure what automation is actually possible.

The decision

Your SituationRecommendation
Small training team (<25 users) with OktaUse Okta's native SCIM integration
Stable L&D team with infrequent changesManual management with SAML SSO
Enterprise learning programs (100+ learners)Use Stitchflow: automation essential for scale
Multi-portal deployments across business unitsUse Stitchflow: manages complex SAML configurations
Non-Okta IdP (Entra, Google Workspace)Use Stitchflow: fills the provisioning gap

The bottom line

LearnUpon offers solid learning management capabilities but creates an identity management split: Okta users get SCIM provisioning while everyone else relies on JIT and manual processes. For organizations that need consistent provisioning automation across any IdP—or want to avoid the complexity of managing multiple SAML configurations—Stitchflow delivers unified automation at enterprise scale.

Make LearnUpon workflows AI-native

LearnUpon has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No explicit SCIM documentedIdP-initiated SSO onlySingle SAML config per portalJIT provisioning for user creation

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No explicit SCIM documented
  • IdP-initiated SSO only
  • Single SAML config per portal
  • JIT provisioning for user creation

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Where to enable

Okta Admin Console → Applications → LearnUpon → Sign On

OIN app supports provisioning with schema discovery and attribute writeback. Create/update/deactivate users. Integration verified by Okta.

Use Stitchflow for automated provisioning.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app

Where to enable

Entra admin center → Enterprise applications → LearnUpon → Single sign-on

SSO only with JIT provisioning - users created on first login. Group sync works only with SAML SSO, not native Azure. Azure sends group GUID only, not names.

Use Stitchflow for automated provisioning.

Unlock SCIM for
LearnUpon

LearnUpon has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
LearnUpon logo
LearnUpon
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Builder.io logo

Builder.io

No SCIM

Visual CMS / Headless CMS

ProvisioningNot Supported
Manual Cost$11,754/yr

Builder.io, the visual CMS platform used by developers and content teams, does not offer SCIM provisioning on any plan. While Builder.io provides SAML 2.0 SSO integration on their Enterprise tier with identity providers like Okta, Azure AD, and Google Workspace, this only handles authentication—not the automated provisioning and deprovisioning of user accounts. IT teams must manually create and manage user accounts in Builder.io, then separately assign appropriate permissions for different Spaces and projects. This creates a significant operational gap for organizations using Builder.io across multiple content teams. Without SCIM, departing employees retain access to Builder.io Spaces until manually removed, creating security risks around content management systems that often contain sensitive marketing materials and website code. The manual overhead becomes particularly problematic when managing access across multiple Builder.io Spaces, each requiring individual permission management for developers, marketers, and content editors.

View full guide
Culture Amp logo

Culture Amp

No SCIM

Employee Engagement / People Analytics

ProvisioningNot Supported
Manual Cost$11,754/yr

Culture Amp, the employee engagement and people analytics platform, explicitly does not support SCIM provisioning on any plan. This is an intentional design decision - Culture Amp separates authentication (handled via SAML SSO) from employee data management (handled via HRIS integrations). While this approach works for their core HR use case, it creates a significant gap for IT teams managing user lifecycle across multiple SaaS applications through their identity provider. The lack of SCIM support means IT admins cannot automate user provisioning, deprovisioning, or attribute updates through standard identity governance workflows. Since Culture Amp contains sensitive employee feedback data and organizational hierarchy information that affects survey visibility, manual user management creates both security risks and operational overhead. Organizations are forced to rely on separate HRIS integrations or manual processes, breaking the unified provisioning model that most enterprises expect from their SaaS stack.

View full guide
Gladly logo

Gladly

No SCIM

Customer Service / Contact Center

ProvisioningNot Supported
Manual Cost$11,754/yr

Gladly, the customer service platform, does not support SCIM provisioning on any plan. While Gladly offers SAML 2.0 SSO integration with enterprise identity providers like Okta and Azure AD, this only handles authentication—users must still be manually created in Gladly's admin panel before they can sign in via SSO. Even on Enterprise plans with custom pricing, there's no automated user lifecycle management, meaning IT teams must manually provision and deprovision every customer service agent. This creates a significant operational burden for contact centers, where staff turnover rates are notoriously high and seasonal scaling is common. Without automated provisioning, IT teams face delays onboarding new agents during peak seasons, and security risks from lingering accounts when agents leave. The manual process becomes particularly problematic for organizations running large support teams or multiple contact centers, where dozens of agents may need to be onboarded weekly.

View full guide