Stitchflow
Murex logo

Murex SCIM guide

Connector Only

How to automate Murex user provisioning, and what it actually costs

Native SCIM not available

Summary and recommendation

Murex, the enterprise capital markets platform serving 60,000+ daily users across trading, treasury, risk, and post-trade operations, does not support SCIM provisioning on any plan. While Murex MX.3 supports SAML 2.0 for SSO integration, this only handles authentication for existing users—not automated user lifecycle management. For a platform handling sensitive financial data and regulatory compliance requirements, this creates a significant operational burden where IT teams must manually provision and deprovision users across what is typically a mission-critical system.

This gap is particularly problematic for financial institutions where rapid onboarding/offboarding is essential for compliance and risk management. Manual user management in a platform processing millions of transactions daily increases both operational overhead and security risk, especially during employee transitions where delayed deprovisioning could expose sensitive market data.

The strategic alternative

Murex has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaVia third-partyNo Murex integration found in Okta OIN catalog
Microsoft Entra IDMurex MX.3 supports SAML for SSO integration per their documentation, but no SCIM provisioning found
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Murex accounts manually. Here's what that costs:

Source: Stitchflow research, normalized to 500 employees:
Orphaned accounts (ex-employees with access)5
Unused licenses12
IT hours spent on manual management/year85 hours
Unused license cost/year$3,500
IT labor cost/year$5,100
Cost of compliance misses/year$890
Total annual financial impact$9,490

The Murex pricing problem

Murex gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
EnterpriseCustom quote (enterprise only)

Pricing structure

PlanPriceSCIM
EnterpriseCustom quote (enterprise only)❌ Not available

Murex operates exclusively on custom enterprise pricing with no public rates. The platform supports SAML SSO integration but provides no automated provisioning capabilities.

What this means in practice

Without SCIM provisioning, IT teams managing Murex deployments face:

Manual account creation
for every new trader, risk analyst, or operations user
No automated deprovisioning
when employees leave or change roles
Potential compliance gaps
in high-regulation financial environments where access must be immediately revoked
Scaling bottlenecks
as the organization grows its trading desk or expands to new markets

For a platform processing thousands of trades daily, manual user management creates operational risk and audit trail gaps that regulators scrutinize heavily.

Additional constraints

Enterprise-only deployment
No lower-tier options for testing or smaller implementations
Financial services compliance requirements
Stricter audit trails needed for user access changes
High-stakes environment
Trading platform downtime or access issues directly impact revenue
Complex role structures
Risk, trading, and post-trade roles require precise permission mapping that manual processes can't reliably maintain

Summary of challenges

  • Murex does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Murex actually offers for identity

SAML SSO (Enterprise only)

Murex MX.3 supports SAML 2.0 integration for single sign-on:

SettingDetails
ProtocolSAML 2.0
Supported IdPsEnterprise identity providers
ConfigurationCustom enterprise implementation
User requirementManual user provisioning required

Critical limitation: Murex provides SSO authentication but no automated user provisioning. All user accounts must be manually created and managed within the Murex platform.

Okta Integration

No official Okta Integration Network listing exists for Murex:

FeatureSupported?
SAML SSO❌ No OIN integration
OIDC SSO❌ No OIN integration
SWA (password vaulting)❌ No OIN integration
Create users❌ No
Update users❌ No
Deactivate users❌ No
Group push❌ No

Microsoft Entra Integration

Murex supports SAML integration with Entra ID:

FeatureSupported?
SAML SSO✓ Yes (custom configuration)
Create users❌ No
Update users❌ No
Deactivate users❌ No
Group sync❌ No

The reality: As a specialized capital markets platform serving 60,000+ daily users globally, Murex focuses on trading, risk, and post-trade operations rather than modern identity management. Their SAML support handles authentication, but user lifecycle management remains entirely manual—a significant operational burden for large financial institutions managing thousands of traders, analysts, and operations staff.

What IT admins are saying

Murex's lack of automated provisioning creates significant operational overhead for enterprise IT teams managing capital markets platforms:

  • Manual user provisioning required despite SSO support - every new trader or analyst must be individually created in Murex
  • Complex enterprise deployment means user management becomes a bottleneck for trading floor operations
  • No visibility into user lifecycle management across trading, treasury, and risk management modules
  • Critical system downtime risks when manual processes delay access for time-sensitive financial operations

Managing user access for 60,000+ daily users across trading desks without automated provisioning is a nightmare. When markets open, we can't afford delays from manual account creation.

IT Director, Investment Bank

Murex supports SAML SSO but you still have to manually provision every user account first. For a platform handling billions in transactions, this manual overhead is unacceptable.

Infrastructure Manager, Asset Management Firm

The recurring theme

Despite Murex being an enterprise-grade capital markets platform, the lack of SCIM provisioning forces IT teams into manual, error-prone user management processes that don't scale with the critical nature of financial operations.

The decision

Your SituationRecommendation
Small trading desk (<20 users)Manual management acceptable given enterprise-only deployment
Stable financial team with low turnoverCombine manual provisioning with SAML SSO for authentication
Large investment bank (100+ traders/analysts)Use Stitchflow: automation essential for rapid onboarding
Multi-region capital markets operationsUse Stitchflow: automation critical for global user management
Regulatory compliance requirements (SOX, MiFID)Use Stitchflow: automated audit trail mandatory for compliance

The bottom line

Murex MX.3 is an enterprise-grade capital markets platform with SAML SSO support, but zero SCIM provisioning capabilities. For financial institutions managing hundreds of traders, risk analysts, and operations staff across global offices, Stitchflow delivers the automated provisioning that Murex simply doesn't offer.

Make Murex workflows AI-native

Murex has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

Supports SAML for SSO integration but no SCIM provisioning documentedEnterprise capital markets platform with 60,000+ daily usersCustom pricing for enterprise deployments onlyComplies with OpenTelemetry and SAML standardsTrading, treasury, risk, and post-trade operations platform

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • Supports SAML for SSO integration but no SCIM provisioning documented
  • Enterprise capital markets platform with 60,000+ daily users
  • Custom pricing for enterprise deployments only
  • Complies with OpenTelemetry and SAML standards
  • Trading, treasury, risk, and post-trade operations platform

Documentation not available.

Unlock SCIM for
Murex

Murex has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Murex logo
Murex
via Stitchflow

Last updated: 2026-01-20

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Abnormal Security logo

Abnormal Security

No SCIM

Security / Email Security

ProvisioningNot Supported
Manual Cost$9,490/yr

Abnormal Security, the AI-powered email security platform protecting against BEC and phishing attacks, does not offer SCIM provisioning on any plan. While the platform supports SAML 2.0 SSO integration with identity providers like Okta and Entra ID, this only handles authentication—not automated user lifecycle management. Security teams must manually provision and deprovision analyst access through Abnormal's portal, creating operational overhead and potential security gaps in a platform specifically designed to protect against email-based threats. This manual provisioning model creates significant challenges for security operations. When new SOC analysts join or existing team members change roles, IT admins must coordinate manual account creation and permission updates in Abnormal Security. For a platform that's critical to threat detection and incident response, delays in provisioning can leave security gaps, while delayed deprovisioning creates compliance risks. The irony is stark: a security platform designed to prevent account takeover and credential abuse lacks the automated provisioning controls that prevent exactly these risks.

View full guide
Airwallex logo

Airwallex

No SCIM
ProvisioningNot Supported
Manual Cost$9,490/yr

Airwallex, the global payments and treasury platform, offers no SCIM provisioning support on any plan, including their custom Accelerate enterprise tier. Despite being positioned for enterprise use with features like multi-entity management and advanced treasury controls, Airwallex lacks any official identity provider integrations—no SSO, no provisioning, and no presence in major IdP galleries like Okta's OIN or Microsoft Entra. This creates a significant operational burden for IT teams managing financial access across growing organizations, where manual user provisioning and deprovisioning in a payments platform presents both efficiency and security risks. The absence of identity management capabilities means IT administrators must manually create, update, and remove user accounts in Airwallex—a particularly concerning gap given that this platform handles sensitive financial operations, cross-border payments, and treasury management. Without automated deprovisioning, former employees could retain access to financial systems, creating compliance risks and potential security vulnerabilities that most finance and IT teams cannot afford to overlook.

View full guide
Alkami logo

Alkami

No SCIM
ProvisioningNot Supported
Manual Cost$9,490/yr

Alkami, the digital banking platform used by banks and credit unions, does not offer SCIM provisioning or public SSO integrations. As an enterprise-only platform with custom pricing, Alkami appears to handle user management through direct account administration rather than standardized identity protocols. This creates significant challenges for financial institutions that need to integrate Alkami with their existing identity infrastructure—particularly problematic given the compliance requirements and security standards that banks must maintain. The lack of automated provisioning means IT teams at financial institutions must manually create, update, and deprovision user accounts in Alkami. For a platform handling sensitive financial data and customer information, this manual approach introduces compliance risks and operational overhead. Banks typically require seamless integration between their core identity systems and all applications accessing customer data.

View full guide