Summary and recommendation
Malwarebytes (ThreatDown) does not support SCIM provisioning on any plan, despite pricing that ranges from $49.99/device/year for Teams up to $595/year for ThreatDown Ultimate bundles. While Malwarebytes offers SAML 2.0 SSO integration with identity providers like Okta, Azure AD, and generic SAML providers, this only handles authentication through just-in-time (JIT) provisioning. Users are automatically created on their first login with roles (ReadOnly, Admin, SuperAdmin) assigned via SAML assertions, but there's no automated lifecycle management for user updates, role changes, or deprovisioning.
This JIT-only approach creates significant gaps in user lifecycle management for IT teams. When employees change roles, move departments, or leave the organization, their Malwarebytes access must be manually updated or removed since there's no automated sync from your identity provider. For security-focused platforms like endpoint protection, this manual process introduces compliance risks and potential security exposure from stale accounts that should have been deprovisioned automatically.
The strategic alternative
Malwarebytes has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | No |
| SSO available? | Yes |
| SSO protocol | SAML 2.0 |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | Via third-party | ❌ | SSO via SAML 2.0 with JIT provisioning. Users auto-created on first login with role assignment via SAML assertion (ReadOnly, Admin, SuperAdmin). No SCIM provisioning. |
| Microsoft Entra ID | Via third-party | ❌ | SSO via SAML 2.0 with Azure AD documented for Nebula and OneView platforms. JIT provisioning supported. No SCIM provisioning documented. |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages Malwarebytes accounts manually. Here's what that costs:
The Malwarebytes pricing problem
Malwarebytes gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Teams | $49.99/device/year (1-9 devices) | ||
| Endpoint Protection | $52.49-$69.99/device/year | ||
| ThreatDown bundles | $345-$595/year |
Provisioning options
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Teams | $49.99/device/year (1-9 devices) | ||
| Endpoint Protection | $52.49-$69.99/device/year | ||
| ThreatDown bundles | $345-$595/year |
What this means in practice
Without SCIM, IT teams must rely entirely on JIT provisioning:
Additional constraints
Summary of challenges
- Malwarebytes does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What Malwarebytes actually offers for identity
SAML SSO with JIT Provisioning (Business plans)
Malwarebytes (now ThreatDown) provides SAML 2.0 integration across their Nebula and OneView platforms:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0 only |
| Supported IdPs | Azure AD, Okta, generic SAML providers |
| User creation | Just-In-Time (JIT) provisioning only |
| Role assignment | Via SAML assertion (ReadOnly, Admin, SuperAdmin) |
| Configuration | SP-initiated SSO with metadata exchange |
The provisioning reality: Users are automatically created on their first SSO login, with roles determined by SAML assertions from your IdP. While this handles basic user creation, it provides no ongoing lifecycle management.
What's missing entirely
| Feature | Available? |
|---|---|
| SCIM provisioning | ❌ Not documented |
| User deprovisioning | ❌ Manual only |
| Group synchronization | ❌ No |
| Attribute updates | ❌ No |
| Automated role changes | ❌ SAML assertion only |
Translation: Malwarebytes offers SSO authentication but zero automated user lifecycle management. Once users are created via JIT, all provisioning, deprovisioning, and role changes must be handled manually in the ThreatDown console.
For security platforms where user access changes frequently based on team assignments and security clearances, this creates significant administrative overhead and potential security gaps.
What IT admins are saying
Malwarebytes's lack of SCIM provisioning forces IT teams into manual user management workflows:
- Users must be created through JIT provisioning on first login only
- No way to pre-provision users or manage accounts programmatically
- Role assignments limited to SAML assertion mapping
- No automated deprovisioning when employees leave
Feature request for broader SSO IdP support
Nebula platform supports JIT provisioning - auto-creates users on first login. Roles (ReadOnly, Admin, SuperAdmin) assignable via SAML assertion.
The recurring theme
Security teams are stuck with just-in-time provisioning, meaning users only get created when they first attempt to log in. There's no way to bulk provision users, sync group memberships, or automate deprovisioning - everything happens reactively rather than proactively.
The decision
| Your Situation | Recommendation |
|---|---|
| Small security team (<10 users) | Manual management is acceptable |
| Stable IT team with infrequent changes | Manual management with JIT provisioning for convenience |
| Growing security operations (25+ users) | Use Stitchflow: manual endpoint security management doesn't scale |
| Enterprise with compliance requirements | Use Stitchflow: audit trails essential for security tool access |
| Multi-location security teams | Use Stitchflow: automated provisioning prevents access gaps |
The bottom line
Malwarebytes provides solid endpoint protection but offers only basic JIT provisioning through SAML—no SCIM automation whatsoever. For security teams that need reliable user lifecycle management without the manual overhead of adding/removing users from critical security tools, Stitchflow delivers the automation Malwarebytes lacks.
Make Malwarebytes workflows AI-native
Malwarebytes has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- No SCIM provisioning documented
- SAML 2.0 only (no OIDC)
- JIT provisioning for auto user creation
- Role assignment via SAML assertion
Documentation not available.
Configuration for Entra ID
Integration type
Microsoft Entra Gallery app
Where to enable
SSO via SAML 2.0 with Azure AD documented for Nebula and OneView platforms. JIT provisioning supported. No SCIM provisioning documented.
Use Stitchflow for automated provisioning.
Unlock SCIM for
Malwarebytes
Malwarebytes has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.
See how it works


