Stitchflow
New Relic logo

New Relic SCIM guide

Native SCIM

How to automate New Relic user provisioning, and what it actually costs

Native SCIM requires Pro/Enterprise plan

Summary and recommendation

New Relic offers robust SCIM 2.0 support that automates user creation, updates, deactivation, and group synchronization. However, SCIM requires upgrading to Pro ($349/user/year for full platform access) or Enterprise plans. More critically, enabling SCIM is irreversible—once you turn it on for an authentication domain, you cannot revert to manual user management, forcing permanent dependency on your identity provider for all user lifecycle operations.

This irreversible commitment creates operational risk. If your SCIM integration breaks or you need to temporarily manage users manually, you're locked out of those options. For organizations evaluating New Relic or considering SCIM enablement, this permanent change means you must be certain about your long-term identity management strategy before proceeding.

The strategic alternative

New Relic gates SCIM behind Pro/Enterprise. Skip the Pro/Enterprise plan upgrade and automate complete outcomes across your stack. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredPro
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages New Relic accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The New Relic pricing problem

New Relic gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Free$0 (100 GB, 1 full user)
Standard$99/mo per full user
Pro$349/user/year (full platform)
EnterpriseCustom pricing

Plan Structure

PlanPriceSCIM
Free$0 (100 GB, 1 full user)
Standard$99/mo per full user
Pro$349/user/year (full platform)
EnterpriseCustom pricing

Note: New Relic offers different user types - Basic (free, view-only), Core ($49/mo), and Full Platform ($99-349/mo depending on tier). SCIM can manage user type assignments on Pro/Enterprise.

What this means in practice

Moving from free tier to Pro for SCIM access:

Team SizeAnnual Cost (Full Platform Users)
5 users$1,745/year
10 users$3,490/year
25 users$8,725/year
50 users$17,450/year

Calculation: $349 × users (annual Pro pricing for full platform access)

Additional constraints

Irreversible decision
Once SCIM is enabled for an authentication domain, you cannot revert to non-SCIM user management.
All-or-nothing management
After enabling SCIM, all user management must go through your IdP - you lose the ability to manually manage users in the New Relic interface.
Data ingestion costs
Beyond the 100 GB free tier, data costs $0.40-0.60/GB, which can add significant expense independent of user licensing.
Group-based access control
SCIM groups control account access, requiring careful IdP group mapping to avoid access issues.

Summary of challenges

  • New Relic supports SCIM but only at Pro tier (Custom pricing)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

New Relic doesn't sell SCIM separately. It comes bundled with Pro/Enterprise observability features:

SCIM 2.0 automated provisioning and deprovisioning
SAML single sign-on (SSO)
Advanced user type management (Core vs Full Platform users)
Authentication domain controls
Group-based account access management
Enhanced security and compliance features
Priority support tiers
Advanced data retention and query capabilities

If your team needs enterprise observability features anyway, the Pro upgrade ($349/user/year for full platform access) delivers solid value. But if you only want user provisioning for a basic monitoring setup, you're paying for advanced APM, infrastructure monitoring, and analytics capabilities you may never use. We estimate ~60% of Pro/Enterprise features are overkill for teams that just need automated user lifecycle management.

Stitchflow Insight

Once you enable SCIM for an authentication domain, you cannot revert to manual user management. This is permanent and irreversible.

What IT admins are saying

Community sentiment on New Relic's SCIM implementation is cautiously positive, though several concerns persist:

  • The irreversible nature of SCIM enablement creates deployment anxiety
  • Pro tier pricing can be steep for teams that primarily need basic monitoring
  • No ability to test SCIM in lower tiers before committing to the upgrade
  • Mixed feelings about being locked into SCIM management once enabled

New Relic's SCIM works great, but the fact that you can't go back once you enable it makes me nervous about rollout planning. We had to be 100% sure our directory was clean first.

Reddit r/sysadmin

The Pro tier jump is significant just for SCIM, especially when you factor in the per-user costs for full platform access. Wish there was a middle ground.

New Relic Community Forum

The recurring theme

While the SCIM functionality itself is solid, the permanent commitment and tier requirements create hesitation for teams evaluating automated provisioning options.

The decision

Your SituationRecommendation
On Free/Standard, need SCIMUse Stitchflow: avoid the Pro upgrade ($349/user/year minimum)
On Pro/Enterprise with SCIM includedUse native SCIM: you're already paying for full platform users
Mixed user types (Basic, Core, Full Platform)Use Stitchflow: simpler than New Relic's complex user type management
Want to test SCIM before committingUse Stitchflow: New Relic's SCIM enablement is permanent and irreversible
Small dev team, infrequent changesManual may work: but monitor for security gaps as team grows

The bottom line

New Relic gates SCIM behind Pro/Enterprise. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Make New Relic workflows AI-native

New Relic gates SCIM behind Pro/Enterprise. We build complete offboarding, user access reviews, and license workflows without that SCIM Tax upgrade.

No Pro/Enterprise upgrade required
Less than a week, start to finish (~2 hours of your time)
We maintain the integration layer underneath
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Pro

Prerequisites

SSO must be configured first

Key limitations

  • Pro or Enterprise required
  • Once SCIM enabled, cannot revert to non-SCIM
  • Must manage users via SCIM after enablement
  • Groups control account access

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → New Relic → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

Full SCIM 2.0 support via New Relic by Organization app in OIN. Supports user creation, updates, deactivation, and group sync. Can manage user types via SCIM.

New Relic gates SCIM behind Pro/Enterprise. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → New Relic → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

Full SCIM 2.0 support. Tenant URL: https://scim-provisioning.service.newrelic.com/scim/v2. Supports automatic provisioning and deprovisioning.

New Relic gates SCIM behind Pro/Enterprise. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Unlock SCIM for
New Relic

New Relic gates SCIM behind Pro/Enterprise plan. We automate complete offboarding and access reviews across your stack without that SCIM Tax upgrade.

See how it works
Admin Console
Directory
Applications
New Relic logo
New Relic
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Dynatrace logo

Dynatrace

SCIM Tax

Observability / APM

SCIM StatusIncluded
Manual Cost$11,754/yr

Dynatrace supports SCIM 2.0 for automated user provisioning, but only on its Enterprise plan with consumption-based pricing starting around $69/user/month and typical minimum commitments of $2,000+/month. While the SCIM implementation is robust (supporting user lifecycle management, group sync, and proper deactivation), it requires DNS domain verification before setup and has some quirks like 40-minute sync delays with Azure AD and separate SCIM/SAML group handling. For platform teams managing observability access across development environments, the Enterprise pricing barrier is significant. A 50-person team faces $41,400/year minimum just for the licensing, often to access SCIM features they need for compliance but may not require the full Enterprise feature set. The domain verification requirement also adds deployment friction that delays rollouts.

View full guide
Amplitude logo

Amplitude

SCIM Tax

Product Analytics

SCIM StatusIncluded
Manual Cost$11,754/yr

Amplitude supports SCIM provisioning, but only on Growth plans (starting around $36K/year) or Enterprise plans with custom pricing. While Amplitude's SCIM implementation covers the core functionality—creating, updating, and deactivating users—it requires SCIM to be specifically enabled for your organization, and regenerating the SCIM key immediately invalidates existing integrations without warning. For product teams on Plus plans ($49/month), upgrading to Growth just to unlock SCIM means jumping from under $600/year to $36,000+/year—a 60x increase. That's often more than the entire analytics budget for smaller product teams. The gap becomes particularly problematic for cross-functional product teams where analysts, PMs, and engineers need varying levels of access to user behavior data, but manual provisioning creates security risks around sensitive analytics permissions.

View full guide
Bill.com logo

Bill.com

SCIM Tax

Accounts Payable / Receivable Automation

SCIM StatusIncluded
Manual Cost$11,754/yr

Bill.com offers inconsistent SCIM provisioning support that varies dramatically by identity provider. While Okta users can access SCIM provisioning through the OIN integration, Bill.com doesn't publish native SCIM documentation, and other IdPs like Entra ID are limited to SAML SSO only. This fragmented approach means your provisioning capabilities depend entirely on your IdP choice rather than Bill.com's platform features. For finance teams managing sensitive AP/AR workflows where user access directly impacts invoice approvals and payment processing, this inconsistency creates operational gaps—especially when onboarding new controllers, AP clerks, or accountants requires manual role assignment tied to spending limits and approval hierarchies. The real problem is that Bill.com gates all SSO functionality behind Enterprise plans with custom pricing (typically 2-3x their Corporate plan at $79/user/month), yet still provides no clear path to automated provisioning for most customers. Since financial systems require precise role-based access controls for SOX compliance and segregation of duties, manual user management creates both security risks and administrative overhead. When employees change departments or leave the company, orphaned accounts in payment systems pose significant financial and compliance risks that manual processes often miss.

View full guide