Stitchflow
MyCase logo

MyCase SCIM guide

Connector Only

How to automate MyCase user provisioning, and what it actually costs

Summary and recommendation

MyCase, the legal practice management platform, does not offer native SCIM provisioning on any of its plans (Basic at $39/user/month to Advanced at $119/user/month). The only documented provisioning capability comes through OneLogin's connector, which creates a single-vendor dependency that many IT teams want to avoid. While MyCase supports SAML 2.0 and OpenID Connect SSO through various identity providers including Azure AD, OneLogin, and AuthDigital, SSO alone only handles authentication—not the critical user lifecycle management tasks that legal firms need.

For law firms managing attorneys, paralegals, and legal staff across multiple offices, this creates a significant operational gap. Without automated provisioning, IT teams must manually create and deactivate user accounts in MyCase, leading to delays in onboarding new hires and potential security risks when employees leave. Given the sensitive nature of legal data and client information, maintaining proper access controls through automated user lifecycle management isn't just convenient—it's essential for compliance and client confidentiality.

The strategic alternative

MyCase has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0, OpenID Connect, OAuth
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaVia third-partyNo Okta OIN listing found. SSO available via AuthDigital or custom SAML configuration.
Microsoft Entra IDVia third-partySSO available via AuthDigital with Azure AD/Microsoft Entra ID support. No native Microsoft Entra gallery app.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages MyCase accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The MyCase pricing problem

MyCase gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Native SCIM❌ Not available
OneLogin connector✓ Available
Requires OneLogin as your IdP
Manual provisioning✓ Available

Provisioning options

MethodAvailabilityLimitations
Native SCIM❌ Not availableNo direct provisioning support
OneLogin connector✓ AvailableRequires OneLogin as your IdP
Manual provisioning✓ AvailableNo automation, prone to errors

What this means in practice

If you use OneLogin: You can automate user provisioning, deprovisioning, and updates through OneLogin's MyCase connector. This works across all MyCase pricing tiers ($39-$119/user/month).

If you use any other IdP (Okta, Microsoft Entra, Google Workspace): You're stuck with manual user management. IT teams must manually create, update, and remove MyCase accounts, increasing administrative overhead and security risks.

For law firms switching IdPs: Moving away from OneLogin means losing all provisioning automation. You'd need to rebuild user management processes from scratch.

Additional constraints

Vendor lock-in
OneLogin is the only path to automated provisioning
Limited IdP ecosystem
No native integration with Okta OIN or Microsoft Entra gallery
Manual fallback
Non-OneLogin environments require time-consuming manual user lifecycle management
Security gaps
Manual deprovisioning creates delays in removing terminated employees' access

Summary of challenges

  • MyCase does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What MyCase actually offers for identity

OneLogin Provisioning (via connector)

MyCase provides user provisioning exclusively through OneLogin's third-party connector:

FeatureSupported?
Create users✓ Yes (OneLogin only)
Update users✓ Yes (OneLogin only)
Deactivate users✓ Yes (OneLogin only)
Group management✓ Yes (OneLogin only)
Native SCIM❌ No
Multi-IdP support❌ No

Critical limitation: This is not native SCIM. MyCase has built no provisioning capabilities into their platform - they rely entirely on OneLogin's connector architecture.

SSO Support (multiple options)

MyCase supports SAML 2.0 and OpenID Connect through several providers:

OneLogin
Full SSO + provisioning
AuthDigital
SAML SSO for Azure AD/Entra ID
Custom SAML
Manual configuration with any SAML 2.0 provider
SettingDetails
ProtocolSAML 2.0, OpenID Connect
JIT provisioning❌ No
SP-initiated✓ Yes
Okta supportManual SAML only
Google WorkspaceManual SAML only

Why this approach fails: If your organization uses Okta, Entra ID, or Google Workspace as your primary IdP, you're forced into manual user management or expensive middleware solutions. OneLogin's connector doesn't solve multi-IdP environments or provide the flexibility of native SCIM.

The reality: Legal firms running on non-OneLogin identity providers face manual provisioning across their entire MyCase deployment, regardless of which pricing tier they choose.

What IT admins are saying

MyCase's limited provisioning options create headaches for law firm IT administrators:

  • Manual user management required - no native SCIM means every attorney and paralegal must be created by hand
  • Vendor lock-in with OneLogin - automated provisioning only works if you're already using OneLogin as your IdP
  • SSO gaps for other identity providers - firms using Okta or Microsoft Entra need custom SAML configurations
  • Time-consuming onboarding process for new legal staff during busy periods

"User provisioning (create/update/delete) and entitlement management" is only available through OneLogin's connector, leaving other IdP users without automation options according to OneLogin's documentation.

The recurring theme

Law firms face a choice between manual user management overhead or switching to OneLogin just to get basic provisioning automation - neither option scales well for growing practices.

The decision

Your SituationRecommendation
Small law firm (<10 attorneys)Manual management is acceptable
Single-IdP shop using OneLogin exclusivelyUse OneLogin's native connector
Mixed IdP environment (Okta/Entra + OneLogin)Use Stitchflow: unified provisioning across IdPs
Multi-office firm with frequent staff changesUse Stitchflow: automation essential for paralegal/support staff turnover
Enterprise legal department with compliance requirementsUse Stitchflow: automation essential for audit trail and SOC 2 compliance

The bottom line

MyCase only supports automated provisioning through OneLogin's proprietary connector, leaving Okta and Microsoft Entra ID users without native options. For legal organizations that need consistent provisioning automation regardless of their IdP choice, Stitchflow eliminates the OneLogin dependency while providing the compliance controls law firms require.

Make MyCase workflows AI-native

MyCase has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No native SCIM documentedProvisioning via OneLogin connectorOAuth for third-party integrations

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No native SCIM documented
  • Provisioning via OneLogin connector
  • OAuth for third-party integrations

Documentation not available.

Unlock SCIM for
MyCase

MyCase has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
MyCase logo
MyCase
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
Aha! logo

Aha!

No SCIM

Product Management / Roadmapping

ProvisioningNot Supported
Manual Cost$11,754/yr

Aha! Roadmaps, the product roadmapping platform, does not support SCIM provisioning on any plan. While Aha! offers SAML 2.0 SSO integration with identity providers like Okta, Entra ID, and OneLogin, this only handles authentication through JIT (Just-In-Time) provisioning. The critical limitation: JIT provisioning creates user accounts with no default role or access permissions, requiring administrators to manually configure access for each user after they first sign in. For product teams managing strategic roadmaps and stakeholder access, this creates significant operational overhead. Since product roadmaps contain sensitive strategic information and stakeholder access typically varies by product area, IT administrators must manually assign appropriate roles and workspace permissions after each user is provisioned. There's no automatic deprovisioning when users leave the organization, creating potential security gaps. This manual process becomes particularly problematic for larger product organizations where dozens of stakeholders across different business units need carefully managed access to specific roadmaps.

View full guide
Appcues logo

Appcues

No SCIM

Product Adoption / User Onboarding

ProvisioningNot Supported
Manual Cost$11,754/yr

Appcues, the product adoption platform used by product managers and growth teams, explicitly does not support SCIM provisioning on any plan—not even Enterprise. While Appcues offers SAML 2.0 SSO integration starting at the Enterprise tier with just-in-time (JIT) provisioning, this only creates users during first login and provides no automated deprovisioning capabilities. For product teams where access needs change frequently as people move between projects or leave the company, this creates a significant security gap. The lack of SCIM means IT teams must manually manage user lifecycle for Appcues accounts, even though the platform handles sensitive product analytics and user flow data. When employees leave or change roles, their Appcues access remains active until manually revoked—a compliance risk that's particularly problematic given Appcues' role in tracking user behavior and product metrics. With MAU-based pricing starting at $300/month and scaling significantly with usage, paying for orphaned accounts also creates unnecessary cost bloat.

View full guide