Summary and recommendation
Malwarebytes (ThreatDown) does not support SCIM provisioning on any plan, despite pricing that ranges from $49.99/device/year for Teams up to $595/year for ThreatDown Ultimate bundles. While Malwarebytes offers SAML 2.0 SSO integration with identity providers like Okta, Azure AD, and generic SAML providers, this only handles authentication through just-in-time (JIT) provisioning. Users are automatically created on their first login with roles (ReadOnly, Admin, SuperAdmin) assigned via SAML assertions, but there's no automated lifecycle management for user updates, role changes, or deprovisioning.
This JIT-only approach creates significant gaps in user lifecycle management for IT teams. When employees change roles, move departments, or leave the organization, their Malwarebytes access must be manually updated or removed since there's no automated sync from your identity provider. For security-focused platforms like endpoint protection, this manual process introduces compliance risks and potential security exposure from stale accounts that should have been deprovisioned automatically.
The strategic alternative
Malwarebytes has no native SCIM. That leaves a workflow gap in offboarding, access reviews, and license cleanup unless your team handles the app another way. Stitchflow builds and maintains the IT workflows your team still runs manually, across every app, including the ones without APIs.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | No |
| SSO available? | Yes |
| SSO protocol | SAML 2.0 |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | Via third-party | ❌ | SSO via SAML 2.0 with JIT provisioning. Users auto-created on first login with role assignment via SAML assertion (ReadOnly, Admin, SuperAdmin). No SCIM provisioning. |
| Microsoft Entra ID | Via third-party | ❌ | SSO via SAML 2.0 with Azure AD documented for Nebula and OneView platforms. JIT provisioning supported. No SCIM provisioning documented. |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages Malwarebytes accounts manually. Here's what that costs:
The Malwarebytes pricing problem
Malwarebytes gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Teams | $49.99/device/year (1-9 devices) | ||
| Endpoint Protection | $52.49-$69.99/device/year | ||
| ThreatDown bundles | $345-$595/year |
Provisioning options
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Teams | $49.99/device/year (1-9 devices) | ||
| Endpoint Protection | $52.49-$69.99/device/year | ||
| ThreatDown bundles | $345-$595/year |
What this means in practice
Without SCIM, IT teams must rely entirely on JIT provisioning:
Additional constraints
Summary of challenges
- Malwarebytes does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What Malwarebytes actually offers for identity
SAML SSO with JIT Provisioning (Business plans)
Malwarebytes (now ThreatDown) provides SAML 2.0 integration across their Nebula and OneView platforms:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0 only |
| Supported IdPs | Azure AD, Okta, generic SAML providers |
| User creation | Just-In-Time (JIT) provisioning only |
| Role assignment | Via SAML assertion (ReadOnly, Admin, SuperAdmin) |
| Configuration | SP-initiated SSO with metadata exchange |
The provisioning reality: Users are automatically created on their first SSO login, with roles determined by SAML assertions from your IdP. While this handles basic user creation, it provides no ongoing lifecycle management.
What's missing entirely
| Feature | Available? |
|---|---|
| SCIM provisioning | ❌ Not documented |
| User deprovisioning | ❌ Manual only |
| Group synchronization | ❌ No |
| Attribute updates | ❌ No |
| Automated role changes | ❌ SAML assertion only |
Translation: Malwarebytes offers SSO authentication but zero automated user lifecycle management. Once users are created via JIT, all provisioning, deprovisioning, and role changes must be handled manually in the ThreatDown console.
For security platforms where user access changes frequently based on team assignments and security clearances, this creates significant administrative overhead and potential security gaps.
What IT admins are saying
Malwarebytes's lack of SCIM provisioning forces IT teams into manual user management workflows:
- Users must be created through JIT provisioning on first login only
- No way to pre-provision users or manage accounts programmatically
- Role assignments limited to SAML assertion mapping
- No automated deprovisioning when employees leave
Feature request for broader SSO IdP support
Nebula platform supports JIT provisioning - auto-creates users on first login. Roles (ReadOnly, Admin, SuperAdmin) assignable via SAML assertion.
The recurring theme
Security teams are stuck with just-in-time provisioning, meaning users only get created when they first attempt to log in. There's no way to bulk provision users, sync group memberships, or automate deprovisioning - everything happens reactively rather than proactively.
The decision
| Your Situation | Recommendation |
|---|---|
| Small security team (<10 users) | Manual management is acceptable |
| Stable IT team with infrequent changes | Manual management with JIT provisioning for convenience |
| Growing security operations (25+ users) | Use Stitchflow: manual endpoint security management doesn't scale |
| Enterprise with compliance requirements | Use Stitchflow: audit trails essential for security tool access |
| Multi-location security teams | Use Stitchflow: automated provisioning prevents access gaps |
The bottom line
Malwarebytes has no native SCIM. That means one more workflow gap in offboarding, access reviews, and license cleanup unless your team handles it another way.
Close the Malwarebytes workflow gap
Malwarebytes is one gap in a broader workflow. Stitchflow builds and maintains the offboarding, access review, or license workflow across every app in your environment.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- No SCIM provisioning documented
- SAML 2.0 only (no OIDC)
- JIT provisioning for auto user creation
- Role assignment via SAML assertion
Documentation not available.
Configuration for Entra ID
Integration type
Microsoft Entra Gallery app
Where to enable
SSO via SAML 2.0 with Azure AD documented for Nebula and OneView platforms. JIT provisioning supported. No SCIM provisioning documented.
Use Stitchflow for automated provisioning.
Close the workflow gap in
Malwarebytes
Malwarebytes has no native SCIM. That leaves one more workflow gap in offboarding, access reviews, and license cleanup unless your team handles it another way.
Start with the free gap diagnostic


