Summary and recommendation
Material Security, the email security platform that protects against advanced threats, offers no SCIM provisioning support on any plan. Despite supporting SSO through custom SAML integrations with identity providers like Okta and Entra ID, Material Security requires manual user provisioning for all account creation and management. This creates a significant operational burden for IT teams managing email security access, particularly in organizations where rapid onboarding and offboarding are critical for maintaining security posture.
The lack of automated provisioning creates a dangerous gap in email security management. When employees join, change roles, or leave the organization, their Material Security access must be manually updated by administrators. This manual process introduces delays that can leave new employees vulnerable to email threats or, worse, allow departed employees to retain access to sensitive security configurations. For a platform designed to protect against sophisticated email attacks, the inability to automate user lifecycle management undermines the very security objectives it's meant to support.
The strategic alternative
Material Security has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | No |
| SSO available? | Yes |
| SSO protocol | SAML 2.0 |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | ✓ | ❌ | Custom SAML integration |
| Microsoft Entra ID | ✓ | ❌ | Custom SAML integration |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages Material Security accounts manually. Here's what that costs:
The Material Security pricing problem
Material Security gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Pro | Not disclosed | ||
| Business | Not disclosed | ||
| Enterprise | Custom quote |
Pricing structure
| Plan | Price | SCIM |
|---|---|---|
| Pro | Not disclosed | ❌ Not available |
| Business | Not disclosed | ❌ Not available |
| Enterprise | Custom quote | ❌ Not available |
SSO capabilities
What this means in practice
Manual provisioning workflow
1. IT admin manually creates user accounts in Material Security console 2. Configure user permissions and role assignments individually 3. Send login instructions to users via email 4. Users authenticate via SAML SSO (if configured)
Scale limitations
Additional constraints
Summary of challenges
- Material Security does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What Material Security actually offers for identity
Custom SAML Integration
Material Security supports SAML-based single sign-on through custom configuration:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0 |
| Supported IdPs | Okta, Entra ID, Google Workspace, custom SAML providers |
| Configuration | Manual SAML setup with Material Security support team |
| User requirement | Manual user provisioning required |
Critical limitation: Material Security offers no automated user provisioning. Every user account must be manually created, updated, and deprovisioned in the Material Security console.
No Okta Integration Network Listing
Material Security does not have an official Okta Integration Network (OIN) app. Organizations must configure SAML SSO manually through Okta's generic SAML template.
No Azure AD Gallery Listing
Similarly, Material Security is not available in the Azure AD/Entra ID application gallery. Custom SAML configuration is required through Entra ID's non-gallery application process.
What's Missing
For security-focused organizations, this manual approach creates significant operational overhead and potential compliance gaps.
What IT admins are saying
Material Security's lack of automated provisioning forces IT teams into manual workflows for a critical security platform:
- Manual user creation required for every new employee
- No automated deprovisioning when employees leave the organization
- SSO setup requires custom SAML configuration rather than pre-built connectors
- User lifecycle management completely disconnected from identity provider
We have to manually add each user to Material Security, even though we have SSO set up. It's another system to remember when onboarding and offboarding.
The lack of SCIM integration means we can't automate user provisioning like we do with our other security tools. Everything has to be done by hand.
The recurring theme
Despite Material Security's advanced email security capabilities, IT teams are stuck with manual user management that doesn't scale with organizational growth and creates gaps in employee lifecycle automation.
The decision
| Your Situation | Recommendation |
|---|---|
| Small security team (<10 users) | Manual management acceptable for now |
| Growing organization with moderate turnover | Use Stitchflow: automation prevents security gaps |
| Enterprise with strict compliance requirements | Use Stitchflow: essential for audit trail and access control |
| Multi-tenant or complex organizational structure | Use Stitchflow: manual provisioning becomes unmanageable |
| Security-first organization needing rapid onboarding/offboarding | Use Stitchflow: automation critical for zero-delay access revocation |
The bottom line
Material Security offers enterprise-grade email protection but provides no automated provisioning capabilities whatsoever. For security teams that need reliable user lifecycle management without the operational burden of manual account creation and deactivation, Stitchflow delivers the automation that Material Security doesn't offer.
Make Material Security workflows AI-native
Material Security has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- No SCIM support available
- Manual user provisioning required
- SSO via custom SAML configuration
Documentation not available.
Unlock SCIM for
Material Security
Material Security has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.
See how it works


