Stitchflow
Mimecast logo

Mimecast SCIM guide

Native SCIM

How to automate Mimecast user provisioning, and what it actually costs

Native SCIM requires Enterprise plan

Summary and recommendation

Mimecast supports SCIM 2.0 for automated user provisioning, but only on Enterprise plans with custom pricing. While SCIM functionality is comprehensive (create, update, deactivate users, plus group sync), Mimecast requires separate configuration for SCIM and SSO - meaning IT teams must manage two different integration setups instead of one unified process.

For email security platforms like Mimecast that protect your entire organization, manual user management creates significant security gaps. Without automated provisioning, new employees may lack email protection on day one, while departed employees retain access longer than necessary. SSO alone only handles authentication - it doesn't automatically provision accounts or assign appropriate security policies based on group membership.

The strategic alternative

Mimecast gates SCIM behind Enterprise. Skip the Enterprise plan upgrade and automate complete outcomes across your stack. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredEnterprise
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Mimecast accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Mimecast pricing problem

Mimecast gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Perimeter DefenceCustom (contact sales)
Comprehensive DefenceCustom (contact sales)
EnterpriseCustom (contact sales)

Plan Structure

PlanPriceSCIM
Perimeter DefenceCustom (contact sales)
Comprehensive DefenceCustom (contact sales)
EnterpriseCustom (contact sales)

All enterprise tiers include SCIM 2.0 provisioning with full lifecycle management (create, update, deactivate users, group sync).

What this means in practice

Since Mimecast uses custom enterprise pricing:

No transparent pricing
Organizations must engage sales and go through procurement processes just to understand costs
Enterprise-only barrier
Smaller teams that need automated provisioning are locked out regardless of budget
Bundled features
SCIM comes with comprehensive email security features that may exceed actual requirements

Industry reports suggest Mimecast enterprise pricing often starts at $3-5 per user per month, but can scale significantly higher with advanced threat protection and data loss prevention features.

Additional constraints

Separate SCIM configuration
SCIM and SSO require independent setup processes, adding implementation complexity
Sales-driven process
Multi-year contracts are typically required to lock in pricing, with no month-to-month options
Feature bundling
SCIM access requires purchasing comprehensive email security platform, not just basic email filtering
Implementation overhead
Custom role mapping and authentication profile configuration required for proper SCIM deployment

Summary of challenges

  • Mimecast supports SCIM but only at Enterprise tier (custom pricing)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

Mimecast doesn't sell SCIM separately. It's bundled with their Enterprise tier, which includes comprehensive email security features:

SCIM 2.0 automated provisioning (separate configuration from SSO)
SAML single sign-on (SSO)
Advanced threat protection and sandboxing
Email encryption and data loss prevention
Security awareness training platform
Advanced analytics and reporting
Dedicated customer success management
24/7 technical support

The challenge: SCIM and SSO require separate configurations in Mimecast, adding setup complexity. While Enterprise pricing is custom (contact sales required), you're paying for extensive email security capabilities when you may only need user lifecycle automation.

For organizations already using Mimecast for email security, the Enterprise upgrade makes sense. But if you're evaluating Mimecast primarily for its identity management capabilities, you're paying for a comprehensive security platform when simpler provisioning solutions exist.

What IT admins are saying

Community sentiment on Mimecast's SCIM implementation is mixed, with concerns focused on the separate configuration complexity and enterprise pricing requirements.

  • Having to configure SCIM and SSO separately adds unnecessary setup complexity
  • Enterprise-only SCIM availability excludes smaller organizations from automated provisioning
  • Custom pricing model makes it difficult to budget for identity automation needs
  • Role mapping configuration requires additional administrative overhead

The recurring theme

While Mimecast offers full SCIM functionality, the enterprise pricing gate and split SSO/SCIM configuration create barriers for teams wanting straightforward identity automation.

The decision

Your SituationRecommendation
Need SCIM but don't have Enterprise pricingUse Stitchflow: avoid custom Enterprise sales process
Already on Enterprise with SCIM includedUse native SCIM: you're paying for it
Want to avoid separate SCIM/SSO configurationsUse Stitchflow: unified setup across all your apps
Small team with infrequent user changesManual may work: but watch for security gaps
Need SCIM with non-Okta/Entra IdPsUse Stitchflow: guaranteed compatibility with any IdP

The bottom line

Mimecast's Enterprise requirement and separate SCIM/SSO configuration creates complexity that many IT teams don't need. For organizations wanting streamlined provisioning without enterprise sales cycles, Stitchflow delivers the same automation at predictable flat-rate pricing.

Make Mimecast workflows AI-native

Mimecast gates SCIM behind Enterprise. We build complete offboarding, user access reviews, and license workflows without that SCIM Tax upgrade.

No Enterprise upgrade required
Less than a week, start to finish (~2 hours of your time)
We maintain the integration layer underneath
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Enterprise

Prerequisites

SSO must be configured first

Key limitations

  • SCIM and SSO are separate configurations
  • SSO provides auth only, not user management
  • Custom SCIM role mapping available
  • Mimecast app in IdP catalogs may vary

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Mimecast → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

Mimecast Admin integration with SSO, SCIM, entitlements, workflows. Group linking, schema discovery, attribute writeback supported.

Mimecast gates SCIM behind Enterprise. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → Mimecast → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

Entra ID SCIM provisioning for Incydr. Create users, deactivate, update attributes. OAuth token auth required. Configure via Identity Management admin.

Mimecast gates SCIM behind Enterprise. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Unlock SCIM for
Mimecast

Mimecast gates SCIM behind Enterprise plan. We automate complete offboarding and access reviews across your stack without that SCIM Tax upgrade.

See how it works
Admin Console
Directory
Applications
Mimecast logo
Mimecast
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Amplitude logo

Amplitude

SCIM Tax

Product Analytics

SCIM StatusIncluded
Manual Cost$11,754/yr

Amplitude supports SCIM provisioning, but only on Growth plans (starting around $36K/year) or Enterprise plans with custom pricing. While Amplitude's SCIM implementation covers the core functionality—creating, updating, and deactivating users—it requires SCIM to be specifically enabled for your organization, and regenerating the SCIM key immediately invalidates existing integrations without warning. For product teams on Plus plans ($49/month), upgrading to Growth just to unlock SCIM means jumping from under $600/year to $36,000+/year—a 60x increase. That's often more than the entire analytics budget for smaller product teams. The gap becomes particularly problematic for cross-functional product teams where analysts, PMs, and engineers need varying levels of access to user behavior data, but manual provisioning creates security risks around sensitive analytics permissions.

View full guide
Bill.com logo

Bill.com

SCIM Tax

Accounts Payable / Receivable Automation

SCIM StatusIncluded
Manual Cost$11,754/yr

Bill.com offers inconsistent SCIM provisioning support that varies dramatically by identity provider. While Okta users can access SCIM provisioning through the OIN integration, Bill.com doesn't publish native SCIM documentation, and other IdPs like Entra ID are limited to SAML SSO only. This fragmented approach means your provisioning capabilities depend entirely on your IdP choice rather than Bill.com's platform features. For finance teams managing sensitive AP/AR workflows where user access directly impacts invoice approvals and payment processing, this inconsistency creates operational gaps—especially when onboarding new controllers, AP clerks, or accountants requires manual role assignment tied to spending limits and approval hierarchies. The real problem is that Bill.com gates all SSO functionality behind Enterprise plans with custom pricing (typically 2-3x their Corporate plan at $79/user/month), yet still provides no clear path to automated provisioning for most customers. Since financial systems require precise role-based access controls for SOX compliance and segregation of duties, manual user management creates both security risks and administrative overhead. When employees change departments or leave the company, orphaned accounts in payment systems pose significant financial and compliance risks that manual processes often miss.

View full guide
Bitwarden logo

Bitwarden

SCIM Tax

Password Manager / Secrets Management

SCIM StatusIncluded
Manual Cost$11,754/yr

Bitwarden supports SCIM 2.0 provisioning, but only on Teams ($4/user/month) and Enterprise ($6/user/month) plans. While this pricing is reasonable compared to other password managers, the real challenge lies in Bitwarden's zero-knowledge architecture: SCIM can provision user accounts, but users still need to manually accept vault invitations and set up their encryption keys before gaining access to shared passwords. This creates a critical security gap. Your identity provider shows users as "provisioned," but they can't actually access company passwords until they complete manual setup steps. When employees leave, SCIM deprovisioning removes their account, but any locally cached vault data remains accessible until they next sync. For security teams managing hundreds of shared credentials, this manual friction undermines the entire purpose of automated provisioning.

View full guide