Stitchflow
Lessonly logo

Lessonly SCIM guide

Native SCIM

How to automate Lessonly user provisioning, and what it actually costs

Native SCIM requires Enterprise plan

Summary and recommendation

Seismic Learning (formerly Lessonly) supports SCIM provisioning, but only on Enterprise plans at ~$111k/year for 500 seats. While SCIM works well with Okta and OneLogin, it has critical limitations: Azure SCIM is completely unsupported (requiring manual customer configuration), all provisioned users import only as "learners" regardless of their actual role, and special characters in names cause provisioning errors.

For L&D teams managing diverse user types—trainers, administrators, and learners across different business units—these limitations create significant operational overhead. You'll still need manual intervention to assign proper roles after SCIM provisioning, and Azure AD shops are left with essentially no automated provisioning option. The high Enterprise pricing barrier means many organizations stick with manual user management or basic JIT provisioning, creating compliance gaps and administrative burden.

The strategic alternative

Lessonly gates SCIM behind Enterprise. Skip the Enterprise plan upgrade and automate complete outcomes across your stack. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredEnterprise
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0, Google OAuth
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDSSO only
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Lessonly accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Lessonly pricing problem

Lessonly gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
StandardStarting ~$300/mo base
Enterprise~$362/seat/year list price

Plan Structure

PlanPriceSCIM
StandardStarting ~$300/mo base
Enterprise~$362/seat/year list price

Note: Enterprise pricing scales with seat count. A 500-seat deployment runs approximately $111,000/year after typical discounts, though bundling with other Seismic products can reduce costs by 15-25%.

What this means in practice

For teams evaluating Seismic Learning, the Enterprise requirement creates immediate budget pressure:

Team SizeAnnual Enterprise CostMonthly Cost
100 users~$36,200/year~$3,017/mo
250 users~$90,500/year~$7,542/mo
500 users~$111,000/year~$9,250/mo

These figures reflect typical enterprise discounts but exclude potential Seismic Content bundling discounts.

Additional constraints

Azure SCIM unsupported
Microsoft Entra ID customers cannot use native SCIM - only Okta and OneLogin are officially supported.
Role limitations
SCIM imports all users as learners regardless of their intended role. Admin and trainer roles must be assigned manually after provisioning.
Character encoding issues
Special characters in user names cause SCIM errors, requiring data cleanup before sync.
Limited attribute mapping
Standard SCIM attributes work, but custom field mapping requires workarounds through supported fields like costCenter and division.

Summary of challenges

  • Lessonly supports SCIM but only at Enterprise tier (custom pricing)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

Seismic Learning (formerly Lessonly) doesn't sell SCIM à la carte. It's bundled with Enterprise features:

SCIM automated provisioning (Okta and OneLogin only)
SAML single sign-on (SSO)
Advanced reporting and analytics
Custom branding and themes
Advanced content authoring tools
Dedicated customer success manager
Priority support channels
Integration marketplace access

The Enterprise tier starts around $300/month minimum, with per-seat pricing reaching ~$362/year list price. For 500 seats, expect ~$111k/year after typical discounts.

Plus, there's a major catch: Azure SCIM is unsupported, and all SCIM users import as basic learners regardless of their actual roles. You'll still need manual role assignments.

Stitchflow Insight

If you need learning management capabilities anyway, the upgrade includes valuable L&D features. But if you just want automated user provisioning, you're paying for extensive training platform functionality you may not use. We estimate ~60% of Enterprise features are irrelevant for teams that only need identity management.

What IT admins are saying

Community sentiment on Seismic Learning's SCIM implementation is mixed, with Azure AD users expressing particular frustration. Common complaints:

  • Azure SCIM being unsupported despite Azure AD being a major enterprise IdP
  • All SCIM users importing as learners regardless of their actual role
  • Special characters in names causing provisioning errors
  • Having to contact support for SCIM credential setup instead of self-service

Azure AD SCIM is unsupported/customer-configured... Contact support@lessonly.com for SCIM configuration guidance.

Microsoft Entra Documentation

Special characters in names cause errors

Seismic Learning Support Documentation

The recurring theme

While SCIM works well for Okta and OneLogin users, the Azure AD gap and role limitation create ongoing manual work for IT teams managing diverse user populations.

The decision

Your SituationRecommendation
Need SCIM but can't justify ~$111K/year Enterprise pricingUse Stitchflow: build complete workflows across every app in less than a week (~2 hours of your time).
Using Azure/Entra ID for identity managementUse Stitchflow: Azure SCIM is unsupported by Seismic Learning
Need role-based provisioning (not just learners)Use Stitchflow: native SCIM only imports users as learners
Already on Enterprise with other Seismic productsUse native SCIM: you're paying for it and have Okta/OneLogin
Small L&D team with minimal user changesManual may work: but watch for special character name issues

The bottom line

Seismic Learning's Enterprise-only SCIM pricing (~$111K/year) and unsupported Azure integration create major barriers for most L&D teams. Stitchflow delivers the same provisioning automation at a fraction of the cost, with full Azure support and proper role management.

Make Lessonly workflows AI-native

Lessonly gates SCIM behind Enterprise. We build complete offboarding, user access reviews, and license workflows without that SCIM Tax upgrade.

No Enterprise upgrade required
Less than a week, start to finish (~2 hours of your time)
We maintain the integration layer underneath
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Enterprise

Prerequisites

SSO must be configured first

Key limitations

  • Azure SCIM is unsupported/customer-configured
  • SCIM doesn't set user roles - all imported as learners
  • Special characters in names cause errors
  • Name changes must be in IdP, not Learning app

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Lessonly → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

Real-time SCIM provisioning: create, update, deactivate, reactivate users. Contact Learning Support for credentials. Standard Okta sync runs twice daily; SCIM is real-time. Use costCenter for Location, division for Business Unit.

Lessonly gates SCIM behind Enterprise. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → Lessonly → Single sign-on

Azure AD SCIM is unsupported/customer-configured. SSO available. Contact support@lessonly.com for SCIM configuration guidance. Special characters in names cause errors.

Use Stitchflow for automated provisioning.

Unlock SCIM for
Lessonly

Lessonly gates SCIM behind Enterprise plan. We automate complete offboarding and access reviews across your stack without that SCIM Tax upgrade.

See how it works
Admin Console
Directory
Applications
Lessonly logo
Lessonly
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Amplitude logo

Amplitude

SCIM Tax

Product Analytics

SCIM StatusIncluded
Manual Cost$11,754/yr

Amplitude supports SCIM provisioning, but only on Growth plans (starting around $36K/year) or Enterprise plans with custom pricing. While Amplitude's SCIM implementation covers the core functionality—creating, updating, and deactivating users—it requires SCIM to be specifically enabled for your organization, and regenerating the SCIM key immediately invalidates existing integrations without warning. For product teams on Plus plans ($49/month), upgrading to Growth just to unlock SCIM means jumping from under $600/year to $36,000+/year—a 60x increase. That's often more than the entire analytics budget for smaller product teams. The gap becomes particularly problematic for cross-functional product teams where analysts, PMs, and engineers need varying levels of access to user behavior data, but manual provisioning creates security risks around sensitive analytics permissions.

View full guide
Bill.com logo

Bill.com

SCIM Tax

Accounts Payable / Receivable Automation

SCIM StatusIncluded
Manual Cost$11,754/yr

Bill.com offers inconsistent SCIM provisioning support that varies dramatically by identity provider. While Okta users can access SCIM provisioning through the OIN integration, Bill.com doesn't publish native SCIM documentation, and other IdPs like Entra ID are limited to SAML SSO only. This fragmented approach means your provisioning capabilities depend entirely on your IdP choice rather than Bill.com's platform features. For finance teams managing sensitive AP/AR workflows where user access directly impacts invoice approvals and payment processing, this inconsistency creates operational gaps—especially when onboarding new controllers, AP clerks, or accountants requires manual role assignment tied to spending limits and approval hierarchies. The real problem is that Bill.com gates all SSO functionality behind Enterprise plans with custom pricing (typically 2-3x their Corporate plan at $79/user/month), yet still provides no clear path to automated provisioning for most customers. Since financial systems require precise role-based access controls for SOX compliance and segregation of duties, manual user management creates both security risks and administrative overhead. When employees change departments or leave the company, orphaned accounts in payment systems pose significant financial and compliance risks that manual processes often miss.

View full guide
Bitwarden logo

Bitwarden

SCIM Tax

Password Manager / Secrets Management

SCIM StatusIncluded
Manual Cost$11,754/yr

Bitwarden supports SCIM 2.0 provisioning, but only on Teams ($4/user/month) and Enterprise ($6/user/month) plans. While this pricing is reasonable compared to other password managers, the real challenge lies in Bitwarden's zero-knowledge architecture: SCIM can provision user accounts, but users still need to manually accept vault invitations and set up their encryption keys before gaining access to shared passwords. This creates a critical security gap. Your identity provider shows users as "provisioned," but they can't actually access company passwords until they complete manual setup steps. When employees leave, SCIM deprovisioning removes their account, but any locally cached vault data remains accessible until they next sync. For security teams managing hundreds of shared credentials, this manual friction undermines the entire purpose of automated provisioning.

View full guide