Stitchflow
Medusa logo

Medusa SCIM guide

Connector Only

How to automate Medusa user provisioning, and what it actually costs

Summary and recommendation

Medusa, the open-source headless commerce platform, does not offer native SCIM provisioning on any plan—including their Cloud Enterprise tier. While Medusa's modular authentication system allows for custom OAuth/OIDC implementations (they even provide an Okta auth module for admin authentication), this only handles login authentication, not automated user lifecycle management. Organizations must manually provision and deprovision admin dashboard users, regardless of whether they're using the free open-source version or paying for Medusa Cloud Enterprise.

This creates a significant operational burden for IT teams managing e-commerce operations. Without automated provisioning, every new developer, admin, or contractor requires manual account creation in Medusa's admin dashboard. When team members leave or change roles, IT must remember to manually revoke access—a process that becomes increasingly error-prone as teams scale. For companies building mission-critical e-commerce platforms on Medusa, this manual approach creates both security risks and operational inefficiency.

The strategic alternative

Medusa has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?Yes
SSO available?Yes
SSO protocolCustom (OAuth/OIDC possible)
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaVia third-partyMedusa has an Okta auth module integration for admin authentication via OIDC. No SCIM provisioning - requires custom development.
Microsoft Entra IDVia third-partyNo native Microsoft Entra integration. Custom OAuth/OIDC implementation possible using Medusa's modular auth system.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Medusa accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Medusa pricing problem

Medusa gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Open SourceFree (MIT license)
Custom implementation
Medusa Cloud Hobby$29/month
Custom implementation
Medusa Cloud Pro$299/month
Custom implementation
Medusa Cloud EnterpriseCustom pricing
Custom implementation

Pricing structure

PlanPriceSSOSCIM
Open SourceFree (MIT license)
Custom implementation
Medusa Cloud Hobby$29/month
Custom implementation
Medusa Cloud Pro$299/month
Custom implementation
Medusa Cloud EnterpriseCustom pricing
Custom implementation

What this means in practice

Even though Medusa's core platform is free, the total cost of ownership for enterprise deployments includes significant development work:

Custom SSO development
Building OAuth/OIDC integration using Medusa's modular auth system
No SCIM support
User provisioning requires manual account creation or custom API development
Development resources
Engineering time to implement, test, and maintain authentication modules
Ongoing maintenance
Updates to custom auth code when Medusa core changes

The lack of native enterprise identity features means organizations need dedicated development resources or must accept manual user management processes.

Additional constraints

Self-hosted complexity
Open-source deployment requires infrastructure management and security hardening
Limited documentation
SSO implementation guidance is minimal compared to commercial platforms
No JIT provisioning
Users must be manually created before they can authenticate via SSO
Module dependencies
Custom auth modules may conflict with future Medusa updates
No centralized user management
Admin dashboard users are managed separately from storefront customers

Summary of challenges

  • Medusa does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Medusa actually offers for identity

No Native SSO or SCIM

Medusa is an open-source headless commerce platform (MIT license) with no built-in identity management features:

FeatureSupport Level
Native SSO❌ None
SAML 2.0❌ Custom implementation required
OIDC/OAuth❌ Custom implementation required
SCIM provisioning❌ Custom implementation required
JIT provisioning❌ Not supported

The reality: Medusa's modular auth system is extensible, but you're starting from scratch for any enterprise identity features.

Available Authentication Options

Medusa does provide some building blocks for custom implementations:

Okta auth module
Basic OIDC integration for admin authentication (not provisioning)
Google OAuth
Custom implementation possible using external IdPs
Modular auth system
Extensible architecture for custom SSO development
Admin dashboard
Free unlimited users, but no access controls beyond basic authentication

What This Means for Enterprise Teams

Even on Medusa Cloud Enterprise (custom pricing), you're looking at:

Custom development required for any SSO implementation
No automated user provisioning manual account creation only
Self-hosted complexity if running the open-source version
Developer resources needed for ongoing identity management maintenance

For e-commerce teams that need enterprise identity features, Medusa's flexibility comes at the cost of significant development overhead.

What IT admins are saying

Medusa's open-source nature creates significant authentication overhead for IT teams managing e-commerce platforms:

  • No native SSO support requires custom development work
  • Authentication must be built from scratch using OAuth/OIDC modules
  • Self-hosted deployments add complexity to identity management
  • Enterprise teams need dedicated development resources for basic auth features

No out-of-the-box SSO. Can be implemented using external IdPs like Google or Keycloak with custom development.

Medusa documentation

Modular auth system is extensible

While flexible, this translates to "you'll need to build it yourself" for most IT teams.

The recurring theme

Medusa's flexibility comes at the cost of requiring significant development effort for enterprise authentication features that come standard in other e-commerce platforms. IT teams either need in-house developers or must accept manual user management.

The decision

Your SituationRecommendation
Small dev team with self-hosted setupManual management is acceptable for simple deployments
Growing e-commerce business (20+ team members)Use Stitchflow: automation essential for scaling operations
Enterprise with compliance requirementsUse Stitchflow: automation essential for audit trail and security
Multi-store or headless commerce setupUse Stitchflow: automation strongly recommended for complex deployments
Team with limited development resourcesUse Stitchflow: avoid custom SSO/SCIM implementation overhead

The bottom line

Medusa is a powerful open-source e-commerce platform, but it requires custom development for any SSO or provisioning automation. For growing businesses that need identity management without the engineering overhead, Stitchflow delivers enterprise-grade automation at a fraction of the development cost.

Make Medusa workflows AI-native

Medusa has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No native SSO for Admin DashboardRequires custom implementationModular auth system is extensibleNo built-in SCIM/SAML

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No native SSO for Admin Dashboard
  • Requires custom implementation
  • Modular auth system is extensible
  • No built-in SCIM/SAML

Documentation not available.

Unlock SCIM for
Medusa

Medusa has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Medusa logo
Medusa
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Magento logo

Magento

No SCIM

E-commerce Platform

ProvisioningNot Supported
Manual Cost$11,754/yr

Adobe Commerce (Magento) does not offer native SCIM provisioning on any plan. While the platform supports SSO through third-party marketplace extensions (like miniOrange SAML SP), these only handle authentication for storefront access. User provisioning must be handled manually through the admin panel or via custom API integrations. Even Adobe's Admin Console—used for managing Adobe product access—only supports SCIM with Azure AD and Google Workspace, leaving Okta and OneLogin users without automated provisioning options. This creates a significant operational gap for IT teams managing e-commerce operations. Without automated provisioning, onboarding new store managers, developers, and customer service staff requires manual account creation in both the identity provider and Magento. When employees leave or change roles, IT must remember to manually deprovision access across both systems. For enterprises running multiple Magento instances or managing seasonal staff fluctuations, this manual process becomes a compliance risk and administrative burden.

View full guide
Oracle Commerce logo

Oracle Commerce

No SCIM

E-commerce Platform

ProvisioningNot Supported
Manual Cost$11,754/yr

Oracle Commerce (CX Commerce) does not provide native SCIM provisioning. While the platform supports SAML 2.0 SSO through Oracle Identity Cloud Service (IDCS), SCIM functionality is only available indirectly through Oracle's broader IAM ecosystem, requiring IDCS as an intermediary layer. This architecture creates significant complexity for IT teams managing user provisioning, as you must configure and maintain Oracle's identity infrastructure even if you don't use other Oracle cloud services. The platform's enterprise-grade pricing (starting at $180,000-$300,000 annually) makes this limitation particularly problematic for organizations that need streamlined user lifecycle management. This creates a critical gap for e-commerce teams where Oracle Commerce handles the storefront but user provisioning remains a manual process. Without direct SCIM support, IT admins must manually create, update, and deactivate user accounts for merchants, administrators, and e-commerce team members. The reliance on IDCS as an intermediary adds another layer of complexity and potential failure points, making what should be automated provisioning workflows dependent on Oracle's broader cloud architecture.

View full guide
Saleor logo

Saleor

No SCIM

E-commerce Platform

ProvisioningNot Supported
Manual Cost$11,754/yr

Saleor Commerce, the open-source headless e-commerce platform, does not support SCIM provisioning on any plan. While Saleor offers SSO integration via OpenID Connect (OIDC) with identity providers like Okta and Microsoft Entra ID, this only handles authentication—not user lifecycle management. IT teams must manually provision, deprovision, and manage user accounts in Saleor's dashboard, even when paying $1,500+/month for Enterprise plans. This creates a significant operational burden for organizations scaling their e-commerce operations with multiple developers, merchants, and e-commerce managers who need platform access. The absence of automated provisioning creates a dangerous security gap. When employees leave or change roles, their Saleor accounts remain active until manually disabled, potentially exposing sensitive customer data, order information, and payment processing capabilities. For organizations subject to PCI-DSS compliance requirements—critical for e-commerce platforms—manual user management introduces audit risks and potential compliance violations.

View full guide