Stitchflow
NinjaRMM logo

NinjaRMM SCIM guide

Native SCIM

How to automate NinjaRMM user provisioning, and what it actually costs

Native SCIM requires Included plan

Summary and recommendation

NinjaRMM supports full SCIM provisioning and includes it at no additional cost across all plans, starting from $1.50/device/month. However, the implementation has several operational hurdles: SCIM tokens expire every 6 months requiring manual renewal, you cannot assign system administrator roles via SCIM, and provisioning technicians requires setting a custom "userType" attribute that many IT teams overlook during initial setup.

These limitations create ongoing administrative overhead, particularly the token expiration cycle that can break automated provisioning without warning. For MSPs managing multiple client environments or IT teams running large technician workforces, the inability to provision system administrators via SCIM means maintaining hybrid manual/automated workflows that defeat the purpose of automation.

The strategic alternative

NinjaRMM gates SCIM behind Included. That can unlock provisioning, but it still does not complete the offboarding, access review, or license workflow across the rest of your stack. Stitchflow builds and maintains the IT workflows your team still runs manually, across every app, including the ones without APIs.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredFree
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages NinjaRMM accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The NinjaRMM pricing problem

NinjaRMM gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Standard$1.50-$8/device/mo

Plan Structure

PlanPriceSCIM
Standard$1.50-$8/device/mo

Pricing varies by deployment size: ~$1.50/device/mo at 10,000+ endpoints, scaling up to $8/device/mo for smaller deployments

What this means in practice

While SCIM access itself is included, NinjaOne's implementation requires careful attribute mapping to distinguish between technicians and end users:

Technician provisioning
Requires userType: technician attribute mapping in your IdP
End user provisioning
Uses userType: endUser attribute for read-only access
System admin roles
Cannot be assigned via SCIM - requires manual configuration

The per-device pricing model means provisioning costs scale with your endpoint count, not user count. For MSPs managing multiple client environments, this creates predictable scaling but requires regional SCIM endpoint configuration.

Additional constraints

Token expiration
SCIM tokens expire every 6 months, requiring manual renewal to maintain automated provisioning.
SP-initiated only
SSO flows must be initiated from NinjaOne, limiting some IdP-initiated workflows.
Regional endpoints
Different SCIM URLs required for US, EU, and other regions - misconfigurations cause provisioning failures.
MFA enforcement
Even with SSO, destructive operations still require MFA, adding friction to automated workflows.
Attribute complexity
Custom attribute mapping required for organizationId and userType - incorrect setup leads to users provisioned with wrong permissions.

Summary of challenges

  • NinjaRMM supports SCIM but only at Free tier (custom pricing)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What NinjaRMM actually offers for identity

NinjaOne includes SCIM provisioning at no additional cost across all plans, which is refreshingly straightforward for an RMM platform. The identity management bundle includes:

Full SCIM 2.0 automated provisioning
SAML 2.0 single sign-on (SSO)
Multi-factor authentication (MFA) enforcement
Role-based access controls
Technician vs end-user differentiation
Group-based permissions mapping
Regional SCIM endpoint support

The implementation has some operational quirks typical of specialized RMM platforms. SCIM tokens expire every 6 months requiring manual renewal, you cannot provision system administrators via SCIM (manual setup required), and technician provisioning requires a custom userType attribute. MFA is still enforced for high-risk operations even with SSO enabled.

For MSPs and IT teams already using NinjaOne, the identity features work well within the RMM context. The challenge is that you're locked into their per-device pricing model ($1.50-$8/device/month) regardless of how many actual users need access to manage those devices.

What IT admins are saying

Community sentiment on NinjaOne's SCIM implementation is generally positive, though some specific pain points emerge around setup complexity and ongoing maintenance.

Common feedback from IT administrators:

  • SCIM token expiration every 6 months creates unnecessary maintenance overhead
  • The custom userType attribute requirement complicates initial setup for MSPs
  • Regional SCIM endpoints can cause confusion during configuration
  • Cannot provision system administrators via SCIM, requiring manual role assignments

The fact that SCIM is included at all pricing tiers is refreshing compared to other RMM platforms. Most competitors gate this behind enterprise plans.

MSP Forum

Token expiration every 6 months is annoying but manageable. At least we're not paying extra for basic provisioning features.

Reddit r/msp

The recurring theme

While NinjaOne includes SCIM without premium pricing, the implementation requires ongoing maintenance and careful attribute configuration that can trip up initial deployments.

The decision

Your SituationRecommendation
Want SCIM but don't want to manage tokensUse Stitchflow: avoid the 6-month token renewal hassle
Need to provision system administrators via SCIMUse Stitchflow: NinjaOne's native SCIM can't assign admin roles
Using JumpCloud, PingOne, or other non-major IdPsUse Stitchflow: NinjaOne only supports Okta, Azure AD, OneLogin, Duo
Already have NinjaOne + supported IdP setupUse native SCIM: it's included and well-documented
Small MSP with low technician turnoverManual may work: but monitor for provisioning gaps as you scale

The bottom line

NinjaRMM gates SCIM behind Included. The upgrade may unlock provisioning, but the workflow still has to complete across the rest of your stack.

Close the NinjaRMM workflow gap

NinjaRMM gates SCIM behind Included, but the bigger issue is the workflow around it. Stitchflow builds and maintains the offboarding, access review, or license workflow underneath.

Across every app in the workflow, including the ones without APIs
Built in less than a week, with roughly 2 hours from your team
You review the exceptions. Stitchflow maintains the workflow underneath
Start with the free gap diagnostic

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Free

Prerequisites

SSO must be configured first

Key limitations

  • SP-initiated SSO only
  • Extra attribute needed for technician provisioning
  • Regional SCIM endpoints
  • MFA still required for high-risk operations
  • SCIM token expires every 6 months
  • Cannot assign system administrators via SCIM

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → NinjaRMM → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

NinjaOne OIN app recommended for setup. Full SCIM provisioning with group mapping. Custom SAML 2.0 app also supported. SCIM token expires every 6 months. Use urn:ietf:params:scim:schemas:extension:ninjaone:2.0:User:userType attribute to distinguish technicians vs end users.

NinjaRMM gates SCIM behind Included. The upgrade may unlock provisioning, but the workflow still has to complete across the rest of your stack.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → NinjaRMM → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

Full SCIM provisioning with Microsoft Entra ID. Azure sync cycles run every 20-40 minutes. Custom attributes required: organizationId and userType (endUser or technician). Cannot edit/delete SCIM-managed users in NinjaOne console.

NinjaRMM gates SCIM behind Included. The upgrade may unlock provisioning, but the workflow still has to complete across the rest of your stack.

Close the workflow gap in
NinjaRMM

NinjaRMM gates SCIM behind Included plan. That can unlock provisioning, but it still does not complete the offboarding, access review, or license workflow across your stack.

Start with the free gap diagnostic
Admin Console
Directory
Applications
NinjaRMM logo
NinjaRMM
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Amplitude logo

Amplitude

SCIM Tax

Product Analytics

SCIM StatusIncluded
Manual Cost$11,754/yr

Amplitude supports SCIM provisioning, but only on Growth plans (starting around $36K/year) or Enterprise plans with custom pricing. While Amplitude's SCIM implementation covers the core functionality—creating, updating, and deactivating users—it requires SCIM to be specifically enabled for your organization, and regenerating the SCIM key immediately invalidates existing integrations without warning. For product teams on Plus plans ($49/month), upgrading to Growth just to unlock SCIM means jumping from under $600/year to $36,000+/year—a 60x increase. That's often more than the entire analytics budget for smaller product teams. The gap becomes particularly problematic for cross-functional product teams where analysts, PMs, and engineers need varying levels of access to user behavior data, but manual provisioning creates security risks around sensitive analytics permissions.

View full guide
Bill.com logo

Bill.com

SCIM Tax

Accounts Payable / Receivable Automation

SCIM StatusIncluded
Manual Cost$11,754/yr

Bill.com offers inconsistent SCIM provisioning support that varies dramatically by identity provider. While Okta users can access SCIM provisioning through the OIN integration, Bill.com doesn't publish native SCIM documentation, and other IdPs like Entra ID are limited to SAML SSO only. This fragmented approach means your provisioning capabilities depend entirely on your IdP choice rather than Bill.com's platform features. For finance teams managing sensitive AP/AR workflows where user access directly impacts invoice approvals and payment processing, this inconsistency creates operational gaps—especially when onboarding new controllers, AP clerks, or accountants requires manual role assignment tied to spending limits and approval hierarchies. The real problem is that Bill.com gates all SSO functionality behind Enterprise plans with custom pricing (typically 2-3x their Corporate plan at $79/user/month), yet still provides no clear path to automated provisioning for most customers. Since financial systems require precise role-based access controls for SOX compliance and segregation of duties, manual user management creates both security risks and administrative overhead. When employees change departments or leave the company, orphaned accounts in payment systems pose significant financial and compliance risks that manual processes often miss.

View full guide
Bitwarden logo

Bitwarden

SCIM Tax

Password Manager / Secrets Management

SCIM StatusIncluded
Manual Cost$11,754/yr

Bitwarden supports SCIM 2.0 provisioning, but only on Teams ($4/user/month) and Enterprise ($6/user/month) plans. While this pricing is reasonable compared to other password managers, the real challenge lies in Bitwarden's zero-knowledge architecture: SCIM can provision user accounts, but users still need to manually accept vault invitations and set up their encryption keys before gaining access to shared passwords. This creates a critical security gap. Your identity provider shows users as "provisioned," but they can't actually access company passwords until they complete manual setup steps. When employees leave, SCIM deprovisioning removes their account, but any locally cached vault data remains accessible until they next sync. For security teams managing hundreds of shared credentials, this manual friction undermines the entire purpose of automated provisioning.

View full guide