Stitchflow
Mailjet logo

Mailjet SCIM guide

Connector Only

How to automate Mailjet user provisioning, and what it actually costs

Summary and recommendation

Mailjet, the email delivery platform, does not support SCIM provisioning on any plan. While Mailjet offers SAML 2.0 SSO integration on Premium 100k+ and Custom plans, this only handles authentication for existing users—not user lifecycle management. IT teams must manually create, update, and deactivate user accounts in Mailjet, creating significant operational overhead for organizations managing email marketing teams and developers across multiple projects.

This gap between authentication and provisioning creates real compliance risks. Without automated deprovisioning, former employees retain access to email campaigns, subscriber lists, and API keys until someone manually removes them. For organizations using Mailjet to send transactional emails or manage customer communications, this manual process violates basic access management principles and creates potential data exposure.

The strategic alternative

Mailjet has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaVia third-partySSO via SAML 2.0 available on Premium plans. No SCIM provisioning documented. Domain verification required via TXT record.
Microsoft Entra IDVia third-partySSO via SAML 2.0 supported using Azure AD as IdP on Premium plans. No SCIM provisioning documented.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Mailjet accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Mailjet pricing problem

Mailjet gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Free$0/month
Essential$17/month
Premium$27-470/month
Custom/EnterpriseQuote required

Pricing and provisioning structure

PlanPriceSSOSCIM
Free$0/month
Essential$17/month
Premium$27-470/month
Custom/EnterpriseQuote required

What this means in practice

For smaller email teams: If you're sending under 100k emails monthly on Premium ($27/month), you can't use SSO at all. You'll need to upgrade to Premium 100k+ (starting at $280/month) just to get SAML authentication - a 10x cost increase purely for SSO access.

For all teams: Even with enterprise pricing, there's no automated user provisioning. Every new developer, marketer, or operations team member requires manual account creation, role assignment, and offboarding management.

Additional constraints

SSO and 2FA are mutually exclusive
enabling SSO disables two-factor authentication for all users
Domain verification required
IT must configure TXT records before SSO can be activated
Admin-only configuration
only account administrators can enable SSO, creating bottlenecks
No JIT provisioning
users must be manually created in Mailjet before they can authenticate via SSO
Manual role management
no automated role assignment based on IdP groups or attributes

Summary of challenges

  • Mailjet does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Mailjet actually offers for identity

SAML SSO (Premium 100k+ or Custom plans only)

Mailjet provides basic SAML 2.0 single sign-on integration, but only on their highest-tier plans:

SettingDetails
ProtocolSAML 2.0
Supported IdPsAny SAML 2.0 compliant provider (Okta, Entra ID, OneLogin)
ConfigurationManual setup via IdP metadata exchange
Domain verificationRequired via DNS TXT record
User requirementManual user creation - no JIT provisioning

Critical limitations:

SSO and two-factor authentication are mutually exclusive you can't use both
No just-in-time (JIT) provisioning users must be manually created before SSO login
Only account administrators can enable SSO

No SCIM Provisioning

Mailjet has zero documented SCIM support:

FeatureSupported?
Create users❌ No
Update user attributes❌ No
Deactivate users❌ No
Group management❌ No
Automated provisioning❌ No

This means all user lifecycle management is completely manual - creating accounts, updating permissions, and removing access when people leave your organization.

The Real Problem

For email delivery platforms, manual user management creates operational overhead and security gaps. When developers or marketing team members need Mailjet access, IT has to manually create accounts. When they leave, manual deprovisioning is required to maintain security.

The Premium 100k+ pricing requirement means you're paying for high-volume email capacity just to get basic SSO - not practical for teams that need identity management without massive email volumes.

What IT admins are saying

Mailjet's limited enterprise identity features create challenges for IT teams managing email marketing infrastructure:

  • No SCIM provisioning means manual user management for all team changes
  • SSO requires upgrading to Premium 100k+ plan ($470+/month), forcing costly overprovisioning
  • Cannot use SSO and 2FA simultaneously - security teams must choose between authentication methods
  • Domain verification via TXT records adds deployment complexity

SAML 2.0 SSO with any compliant IdP. Domain verification required. Only admins can enable. SSO and 2FA are mutually exclusive.

Mailjet documentation

User management is completely manual since there's no SCIM support documented anywhere.

IT administrator implementing Mailjet

The recurring theme

Marketing teams want Mailjet for email delivery, but IT teams face expensive SSO requirements and zero automation for user lifecycle management. Every joiner, mover, or leaver requires manual intervention.

The decision

Your SituationRecommendation
Small marketing team (<10 users)Manual management is acceptable
Email campaigns with stable teamManual management with domain SSO if budget allows
Growing marketing organization (25+ users)Use Stitchflow: no native SCIM available
Enterprise with compliance requirementsUse Stitchflow: automation essential for audit trail
Multiple brands/subsidiaries using emailUse Stitchflow: automation strongly recommended

The bottom line

Mailjet offers solid email delivery capabilities but lacks any SCIM provisioning support, and even SAML SSO requires expensive Premium 100k+ plans. For marketing teams that need user provisioning automation without the premium tier costs, Stitchflow provides the missing automation layer.

Make Mailjet workflows AI-native

Mailjet has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

SSO requires Premium 100k+ or Custom planNo SCIM provisioning documentedCannot use SSO and 2FA simultaneouslyDomain verification required via TXT record

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • SSO requires Premium 100k+ or Custom plan
  • No SCIM provisioning documented
  • Cannot use SSO and 2FA simultaneously
  • Domain verification required via TXT record

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Where to enable

Okta Admin Console → Applications → Mailjet → Sign On

SSO via SAML 2.0 available on Premium plans. No SCIM provisioning documented. Domain verification required via TXT record.

Use Stitchflow for automated provisioning.

Unlock SCIM for
Mailjet

Mailjet has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Mailjet logo
Mailjet
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
Aha! logo

Aha!

No SCIM

Product Management / Roadmapping

ProvisioningNot Supported
Manual Cost$11,754/yr

Aha! Roadmaps, the product roadmapping platform, does not support SCIM provisioning on any plan. While Aha! offers SAML 2.0 SSO integration with identity providers like Okta, Entra ID, and OneLogin, this only handles authentication through JIT (Just-In-Time) provisioning. The critical limitation: JIT provisioning creates user accounts with no default role or access permissions, requiring administrators to manually configure access for each user after they first sign in. For product teams managing strategic roadmaps and stakeholder access, this creates significant operational overhead. Since product roadmaps contain sensitive strategic information and stakeholder access typically varies by product area, IT administrators must manually assign appropriate roles and workspace permissions after each user is provisioned. There's no automatic deprovisioning when users leave the organization, creating potential security gaps. This manual process becomes particularly problematic for larger product organizations where dozens of stakeholders across different business units need carefully managed access to specific roadmaps.

View full guide
Appcues logo

Appcues

No SCIM

Product Adoption / User Onboarding

ProvisioningNot Supported
Manual Cost$11,754/yr

Appcues, the product adoption platform used by product managers and growth teams, explicitly does not support SCIM provisioning on any plan—not even Enterprise. While Appcues offers SAML 2.0 SSO integration starting at the Enterprise tier with just-in-time (JIT) provisioning, this only creates users during first login and provides no automated deprovisioning capabilities. For product teams where access needs change frequently as people move between projects or leave the company, this creates a significant security gap. The lack of SCIM means IT teams must manually manage user lifecycle for Appcues accounts, even though the platform handles sensitive product analytics and user flow data. When employees leave or change roles, their Appcues access remains active until manually revoked—a compliance risk that's particularly problematic given Appcues' role in tracking user behavior and product metrics. With MAU-based pricing starting at $300/month and scaling significantly with usage, paying for orphaned accounts also creates unnecessary cost bloat.

View full guide