Stitchflow
Lever logo

Lever SCIM guide

Connector Only

How to automate Lever user provisioning, and what it actually costs

Summary and recommendation

Lever, the recruiting platform, does not offer native SCIM provisioning on any plan. While Lever provides SAML 2.0 SSO for authentication and supports an integration with Aquera for SCIM provisioning, this requires Enterprise pricing (~$36,778-$72,114/year for 500 employees) and adds complexity through a third-party integration. Even with SSO enabled, IT teams must manually provision user accounts in Lever or rely on the Aquera connector, which introduces another integration point to manage and troubleshoot.

For recruiting teams that frequently onboard hiring managers, interviewers, and temporary contractors, the lack of native SCIM creates ongoing administrative overhead. Manual provisioning becomes particularly problematic when dealing with candidate data—a highly sensitive area where access needs to be tightly controlled and quickly revoked. SSO provides secure authentication, but without automated provisioning, IT teams face the dual burden of manual user management and potential compliance gaps when access isn't promptly removed.

The strategic alternative

Lever has no native SCIM. That leaves a workflow gap in offboarding, access reviews, and license cleanup unless your team handles the app another way. Stitchflow builds and maintains the IT workflows your team still runs manually, across every app, including the ones without APIs.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOProvisioningNotes
OktaVia third-partyVia APISCIM provisioning via Aquera integration. Supports SSO, Identity Governance, Identity Lifecycle Management use cases.
Microsoft Entra IDVia third-partyVia APISAML SSO with Entra. SCIM provisioning requires Aquera integration for automated user lifecycle management.
Google WorkspaceVia third-partySSO only, no provisioning
OneLoginVia third-partySSO only

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Lever accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Lever pricing problem

Lever gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Starter~$19,185/year (200 employees)
Enterprise~$36,778-$72,114/year (500 employees)

Pricing structure

PlanPricingSSOSCIM
Starter~$19,185/year (200 employees)❌ Not available❌ Not available
Enterprise~$36,778-$72,114/year (500 employees)✓ SAML 2.0✓ Via Aquera only

Key pricing details

Pricing based on total company headcount, not active Lever users
Enterprise tier required for any identity management features
Custom pricing means actual costs vary significantly by negotiation

What this means in practice

Without native SCIM, IT teams face significant operational overhead:

Manual provisioning workflow

1. HR requests new recruiter access via ticket 2. IT admin manually creates Lever account 3. User receives separate credentials to manage 4. Offboarding requires manual account deactivation

Third-party dependency risks

Aquera integration adds another vendor relationship
Additional costs for the integration service
Extra failure points in your identity stack

Additional constraints

Support-gated SSO
Must contact Lever Support to enable SAML, creating deployment delays
JIT limitations
While Just-in-Time provisioning works, it only creates accounts on first login - no proactive provisioning
Attribute mapping issues
Without firstName attribute configured, Lever defaults to using email addresses as display names
No self-service
Enterprise features require support intervention rather than admin-controlled configuration

For recruiting teams with frequent contractor and temporary access needs, this manual overhead becomes particularly problematic during high-volume hiring periods.

Summary of challenges

  • Lever does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Lever actually offers for identity

SAML SSO (Enterprise plan required)

Lever supports SAML 2.0 integration but requires contacting support to enable:

SettingDetails
ProtocolSAML 2.0
Supported IdPsOkta, Azure AD, Google Workspace, generic SAML
ConfigurationMust contact Lever Support to enable
JIT Provisioning✓ Yes
User requirementUsers must be assigned to app in IdP

Key limitation: There's no self-service SAML setup. Enterprise customers must open a support ticket and wait for Lever to manually enable SSO.

No Native SCIM Support

Lever does not offer native SCIM provisioning. The only automated user lifecycle management option is through a third-party integration:

FeatureNative SupportVia Aquera Integration
Create users❌ No✓ Yes
Update users❌ No✓ Yes
Deactivate users❌ No✓ Yes
Group sync❌ No✓ Yes

The Aquera workaround: Lever partners with Aquera to provide SCIM-like functionality through API connectors. This adds another vendor relationship and potential point of failure to your identity stack.

What Enterprise actually includes

Beyond SSO, Lever's Enterprise plan bundles recruiting features most teams don't need for identity management:

Advanced analytics and reporting
Custom recruiting workflows
API access for integrations
Premium support SLAs
Advanced candidate sourcing tools

Bottom line: You're paying $36,000-$72,000/year primarily for recruiting functionality when you just want reliable user provisioning. The identity features feel like an afterthought—manual SAML setup and outsourced SCIM through a third party.

What IT admins are saying

Lever's lack of native SCIM support forces IT teams into manual user management workflows:

  • No automated provisioning means manual account creation for every new hire
  • Must contact Lever Support just to enable basic SAML SSO functionality
  • SCIM only available through third-party Aquera integration, adding complexity
  • Limited self-service options for enterprise identity features

No SCIM means manual provisioning

IT admin feedback on Lever's identity limitations

Must contact support to enable SAML

Common complaint about Lever's SSO setup process

Users must be assigned to app in IdP to login

Lever documentation requirement

The recurring theme

For recruiting teams with frequent hiring manager and interviewer turnover, the lack of native SCIM creates ongoing manual work. IT teams must remember to provision/deprovision users in Lever separately from their identity provider, or pay for an additional third-party integration to automate what should be standard functionality.

The decision

Your SituationRecommendation
Small recruiting team (<10 users)Manual management with SSO is workable
Stable hiring team with low turnoverManual provisioning, use Enterprise plan for SSO
Growing company with frequent hiringUse Stitchflow: automation essential for scaling
Large organization (100+ employees)Use Stitchflow: manual management becomes unmanageable
Multi-department recruiting with compliance needsUse Stitchflow: automation required for audit trail

The bottom line

Lever has no native SCIM. That means one more workflow gap in offboarding, access reviews, and license cleanup unless your team handles it another way.

Close the Lever workflow gap

Lever is one gap in a broader workflow. Stitchflow builds and maintains the offboarding, access review, or license workflow across every app in your environment.

Across every app in the workflow, including the ones without APIs
Built in less than a week, with roughly 2 hours from your team
You review the exceptions. Stitchflow maintains the workflow underneath
Start with the free gap diagnostic

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No native SCIM support foundMust contact Lever Support to enable SAMLUsers must be assigned to app in IdP to loginWithout firstName attribute, email used as name

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No native SCIM support found
  • Must contact Lever Support to enable SAML
  • Users must be assigned to app in IdP to login
  • Without firstName attribute, email used as name

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Lever → Sign On

SCIM provisioning via Aquera integration. Supports SSO, Identity Governance, Identity Lifecycle Management use cases.

Use Stitchflow for automated provisioning.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → Lever → Single sign-on

SAML SSO with Entra. SCIM provisioning requires Aquera integration for automated user lifecycle management.

Use Stitchflow for automated provisioning.

Close the workflow gap in
Lever

Lever has no native SCIM. That leaves one more workflow gap in offboarding, access reviews, and license cleanup unless your team handles it another way.

Start with the free gap diagnostic
Admin Console
Directory
Applications
Lever logo
Lever
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Workable logo

Workable

No SCIM

HR / Recruiting

ProvisioningNot Supported
Manual Cost$11,754/yr

Workable, the applicant tracking system used by hiring teams, does not support SCIM provisioning on any plan. While Workable offers SAML 2.0 SSO integration starting with the Standard plan (plus add-on fees) or Premier plan, this only handles authentication—not user lifecycle management. Users granted access through SSO can join the Workable account automatically via JIT provisioning, but they still require manual job assignment and role configuration within the platform. This creates a significant gap for IT teams managing hiring workflows across multiple departments. Without SCIM, administrators must manually provision recruiters and hiring managers, assign them to appropriate job requisitions, and remember to deprovision access when employees change roles or leave. For an ATS platform that handles sensitive candidate data and hiring decisions, this manual process introduces compliance risks and operational overhead that scales poorly as organizations grow.

View full guide
Greenhouse logo

Greenhouse

SCIM Tax

HR / Recruiting

SCIM StatusIncluded
Manual Cost$11,754/yr

Greenhouse supports SCIM provisioning, but only on Advanced or Expert tiers (starting around $6,000/year, quote-based). The bigger issue: Greenhouse's SCIM implementation only provisions users—not groups—meaning you lose the organizational structure and permission inheritance that makes identity management scalable. Additionally, you cannot fully delete users via SCIM (only deactivate), and Azure Entra users face a 40-minute sync delay. For recruiting teams managing hiring managers, interviewers, and HR staff across different departments and access levels, the lack of group provisioning creates a significant operational burden. You're forced to manually assign permissions and manage access changes for every user individually. With recruiting involving sensitive candidate data and frequent access changes during hiring cycles, this manual overhead increases both security risk and administrative workload.

View full guide
Builder.io logo

Builder.io

No SCIM

Visual CMS / Headless CMS

ProvisioningNot Supported
Manual Cost$11,754/yr

Builder.io, the visual CMS platform used by developers and content teams, does not offer SCIM provisioning on any plan. While Builder.io provides SAML 2.0 SSO integration on their Enterprise tier with identity providers like Okta, Azure AD, and Google Workspace, this only handles authentication—not the automated provisioning and deprovisioning of user accounts. IT teams must manually create and manage user accounts in Builder.io, then separately assign appropriate permissions for different Spaces and projects. This creates a significant operational gap for organizations using Builder.io across multiple content teams. Without SCIM, departing employees retain access to Builder.io Spaces until manually removed, creating security risks around content management systems that often contain sensitive marketing materials and website code. The manual overhead becomes particularly problematic when managing access across multiple Builder.io Spaces, each requiring individual permission management for developers, marketers, and content editors.

View full guide