Stitchflow
Mediaocean logo

Mediaocean SCIM guide

Native SCIM

How to automate Mediaocean user provisioning, and what it actually costs

Native SCIM requires Custom plan

Summary and recommendation

Mediaocean supports SCIM provisioning, but only through a specific integration pathway that limits your identity provider options. While the platform accepts SAML SSO from any IdP (Okta, Entra, Google Workspace), SCIM provisioning is exclusively available through OneLogin's connector. This creates a problematic vendor lock-in scenario where your SSO and provisioning must be split across different systems, or you're forced to migrate your entire identity stack to OneLogin just to enable automated user management.

This fragmented approach creates operational complexity and potential security gaps. IT teams must either manually provision users in Mediaocean (defeating the purpose of automated provisioning) or maintain dual identity systems. For organizations standardized on Okta or Entra, this means accepting manual user lifecycle management for a critical advertising operations platform, increasing administrative overhead and compliance risk.

The strategic alternative

Mediaocean gates SCIM behind Custom. Skip the Custom plan upgrade and automate complete outcomes across your stack. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredCustom
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDSSO only
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Mediaocean accounts manually. Here's what that costs:

Source: Stitchflow research, normalized to 500 employees:
Orphaned accounts (ex-employees with access)5
Unused licenses12
IT hours spent on manual management/year85 hours
Unused license cost/year$3,500
IT labor cost/year$5,100
Cost of compliance misses/year$890
Total annual financial impact$9,490

The Mediaocean pricing problem

Mediaocean gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
StandardCustom
ProfessionalCustom
EnterpriseCustom

Plan Structure

PlanPriceSCIM
StandardCustom
ProfessionalCustom
EnterpriseCustom✓ (via OneLogin)

Note: All Mediaocean pricing is custom quote-based. SCIM provisioning is only available on Enterprise plans and requires coordination with OneLogin's connector system.

What this means in practice

The custom pricing model creates several challenges:

No transparency
You can't evaluate ROI without going through a full sales cycle
Negotiation required
SCIM access becomes part of broader contract discussions
OneLogin dependency
Even with Enterprise access, provisioning flows through OneLogin's infrastructure, not direct SCIM endpoints
Limited IdP support
While SSO works with any SAML provider, automated provisioning is tied to OneLogin's connector ecosystem

Additional constraints

Third-party dependency
SCIM provisioning relies on OneLogin's connector, creating an additional point of failure and vendor relationship to manage.
Connector maintenance
OneLogin maintains the SCIM translation layer, meaning updates and bug fixes are outside your direct vendor relationship with Mediaocean.
Limited IdP flexibility
Organizations using Okta, Entra ID, or Google Workspace as primary IdP still need OneLogin integration for provisioning.
Enterprise sales cycle
Custom pricing typically involves lengthy procurement processes, delaying SCIM implementation.

Summary of challenges

  • Mediaocean supports SCIM but only at Custom tier (Custom)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

Mediaocean doesn't sell SCIM à la carte. It's bundled with Enterprise features and requires custom pricing:

SCIM automated provisioning (via OneLogin integration)
SAML single sign-on with any IdP
Enterprise-grade media planning tools
Advanced workflow automation
Custom reporting and analytics
Dedicated account management
Premium support services

The catch: Mediaocean's SCIM is primarily designed to work through OneLogin's connector. While they support SAML SSO with any IdP, the automated provisioning path is limited to organizations using OneLogin as their identity provider.

Stitchflow Insight

If you need enterprise media planning capabilities anyway, the upgrade may make sense. If you just want automated user provisioning with Okta, Entra, or Google Workspace, you're constrained by their OneLogin-centric approach and paying custom enterprise rates for advertising workflow features you may not need. We estimate ~80% of Enterprise features are irrelevant for teams that only need SCIM provisioning.

What IT admins are saying

Community sentiment on Mediaocean's SCIM implementation reveals significant frustration with vendor lock-in and limited IdP support. Common complaints:

  • Being locked into OneLogin for user provisioning when already using Okta or Entra
  • Having to maintain multiple IdP relationships just for one application
  • Custom enterprise pricing with no transparency on SCIM costs
  • Limited documentation and support for non-OneLogin environments

We're an Okta shop but had to set up a separate OneLogin instance just for Mediaocean provisioning. It's messy and adds another vendor relationship we don't want.

IT Director, Reddit

The fact that they only support SCIM through OneLogin is incredibly limiting. We can do SSO with any SAML provider but provisioning is locked to one vendor.

SysAdmin, Spiceworks

The recurring theme

SCIM functionality is artificially constrained to a single IdP vendor, forcing organizations into unwanted vendor relationships or manual user management.

The decision

Your SituationRecommendation
Need SCIM but not on Enterprise tierUse Stitchflow: avoid custom pricing negotiations
Using Entra ID or Google WorkspaceUse Stitchflow: no native provisioning support
Want provisioning without OneLogin dependencyUse Stitchflow: works with any IdP
Already on Enterprise with OneLoginUse native SCIM: you're paying for it
Small team, infrequent user changesManual may work: but watch for access creep

The bottom line

Mediaocean's SCIM support is locked behind custom Enterprise pricing and primarily works through OneLogin, creating barriers for teams using other identity providers. Stitchflow delivers the same provisioning capabilities at a predictable cost regardless of your Mediaocean plan or IdP choice.

Make Mediaocean workflows AI-native

Mediaocean gates SCIM behind Custom. We build complete offboarding, user access reviews, and license workflows without that SCIM Tax upgrade.

No Custom upgrade required
Less than a week, start to finish (~2 hours of your time)
We maintain the integration layer underneath
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Custom

Prerequisites

None

Key limitations

  • User provisioning primarily via OneLogin
  • SSO supported with any SAML IdP
  • Custom enterprise pricing

Documentation not available.

Unlock SCIM for
Mediaocean

Mediaocean gates SCIM behind Custom plan. We automate complete offboarding and access reviews across your stack without that SCIM Tax upgrade.

See how it works
Admin Console
Directory
Applications
Mediaocean logo
Mediaocean
via Stitchflow

Last updated: 2026-01-20

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Alteryx logo

Alteryx

SCIM Tax
SCIM StatusIncluded
Manual Cost$9,490/yr

Alteryx supports native SCIM 2.0 provisioning, but only on Enterprise plans with custom pricing (7+ users minimum). The feature requires SSO (SAML or OIDC) to be configured first and completely overrides manual user management. For teams on Professional ($5,000/user/year) or Business ($10,000-$20,000/user/year) plans, accessing SCIM means upgrading to Enterprise - often a significant cost increase for functionality that should be table stakes. This creates a provisioning gap for most Alteryx deployments. Without automated user lifecycle management, IT teams face manual onboarding/offboarding workflows, delayed access provisioning, and compliance risks around orphaned accounts. The high per-user costs make Alteryx particularly expensive to scale, and forcing an Enterprise upgrade just for basic provisioning automation compounds that challenge.

View full guide
Atlan logo

Atlan

SCIM Tax
SCIM StatusIncluded
Manual Cost$9,490/yr

Atlan supports native SCIM 2.0 provisioning with full user and group management capabilities. However, SCIM is only available on Enterprise tier, which requires custom pricing negotiations. Additionally, SSO must be enabled before SCIM can be configured, and Atlan's pricing tiers (Starter, Premier, Enterprise) are not publicly disclosed, making cost planning difficult for IT teams. This creates a significant barrier for organizations wanting automated provisioning without committing to enterprise-level contracts. For data teams evaluating Atlan, the lack of transparent pricing means you can't budget for provisioning capabilities upfront. The SSO prerequisite also forces organizations into a specific implementation sequence that may not align with their rollout timeline.

View full guide
Benchling logo

Benchling

SCIM Tax
SCIM StatusIncluded
Manual Cost$9,490/yr

Benchling supports SCIM provisioning, but only on Enterprise plans with custom pricing that typically starts at $1M+ annually. This creates a massive barrier: organizations on Professional plans ($20,000+/year) face a 50x+ price increase to unlock automated user provisioning. Even mid-sized life sciences teams end up paying enterprise-level licensing just to automate basic user lifecycle management. The pricing gap is so extreme that most organizations either stick with manual provisioning or delay Benchling adoption entirely. This creates a significant operational burden for IT teams managing researchers across multiple lab environments. Manual user provisioning in a platform that handles sensitive R&D data introduces compliance risks and delays researcher onboarding. When a scientist joins or leaves, IT must manually coordinate access across Benchling's complex permission structure for notebooks, entities, and workflows. For organizations with frequent collaborator access or seasonal research teams, this becomes unmanageable.

View full guide