Stitchflow
Nuclino logo

Nuclino SCIM guide

Connector Only

How to automate Nuclino user provisioning, and what it actually costs

Summary and recommendation

Nuclino, the team wiki and knowledge base platform, does not support SCIM provisioning on any plan. While Nuclino offers SAML 2.0 SSO integration with identity providers like Okta and Microsoft Entra ID, this only provides Just-in-Time (JIT) provisioning—accounts are created when users first access their team's Nuclino workspace through SSO. This creates a significant gap in user lifecycle management: users can be automatically provisioned on first login, but must be manually deprovisioned when they leave the organization.

For IT teams managing knowledge bases containing sensitive company information, this manual deprovisioning requirement creates both security and compliance risks. Former employees retain access to documentation, project notes, and institutional knowledge until someone remembers to manually remove them. This is particularly problematic for Nuclino since team wikis often contain confidential processes, strategic plans, and proprietary information that should be immediately inaccessible when employees depart.

The strategic alternative

Nuclino has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaVia third-partySAML SSO setup documented with Okta. JIT provisioning on first login. No SCIM provisioning. Configure as custom SAML app in Okta.
Microsoft Entra IDVia third-partyMicrosoft Entra ID gallery app available for SSO. JIT provisioning on first login. No SCIM provisioning documented.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Nuclino accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Nuclino pricing problem

Nuclino gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Free$0
Standard$6-8/user/mo
Premium$9-12/user/mo

Pricing and provisioning options

PlanPriceSSOSCIM
Free$0
Standard$6-8/user/mo
Premium$9-12/user/mo

What this means in practice

No automated deprovisioning: When employees leave your organization, their Nuclino accounts remain active indefinitely. IT must manually identify and remove access for each departing user - a security risk that scales poorly.

JIT-only provisioning: New users can only access Nuclino after attempting to log in via SSO for the first time. There's no way to pre-provision accounts or bulk-create users for onboarding workflows.

Account linking complexity: Existing Nuclino users must manually link their accounts to SSO during the migration process, creating additional support tickets and user friction.

Additional constraints

Manual user management
All user lifecycle operations (role changes, group assignments, deprovisioning) require manual intervention
Security gap
No centralized way to audit or control who has access to your team's knowledge base
Scaling limitations
As teams grow, the manual overhead of user management becomes increasingly burdensome
Integration gaps
Cannot leverage IdP group memberships or automated access policies

Summary of challenges

  • Nuclino does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Nuclino actually offers for identity

SAML SSO (Standard/Premium plans)

Nuclino supports SAML 2.0 single sign-on with just-in-time (JIT) provisioning:

SettingDetails
ProtocolSAML 2.0
Supported IdPsOkta, Entra ID, OneLogin, ADFS, generic SAML
JIT provisioning✓ Yes - creates accounts on first login
Account linking✓ Yes - existing users can link their accounts
ConfigurationTeam Settings > Authentication

How it works: Users access Nuclino via team URL, authenticate through IdP, and accounts are automatically created on first login. Existing Nuclino users can link their accounts to SSO.

No SCIM provisioning

FeatureSupported?
Automated user creation❌ JIT only
Automated user updates❌ No
Automated user deprovisioning❌ Manual required
Group/role sync❌ No

The gap: While JIT provisioning handles account creation, there's no automated way to deprovision users when they leave your organization. Admins must manually remove users from Nuclino workspaces, creating security risks and administrative overhead.

Real-world impact: For knowledge management platforms handling sensitive company information, the inability to automatically revoke access when employees leave is a significant compliance and security concern.

What IT admins are saying

Nuclino's lack of SCIM provisioning creates manual overhead for IT teams managing knowledge base access:

  • Users are only provisioned via just-in-time (JIT) on first SSO login
  • No automated deprovisioning when employees leave the organization
  • Manual account cleanup required to maintain security and licensing compliance
  • Existing users must manually link their accounts when SSO is enabled

SAML SSO creates accounts on first login via team URL. Existing accounts can be linked.

Nuclino documentation

Configure in Team Settings > Authentication.

Nuclino SSO setup guide

The recurring theme

While Nuclino offers SAML SSO with multiple identity providers, the absence of SCIM means IT teams must manually track and remove departed employees' access to company wikis and knowledge bases, creating both security risks and administrative burden.

The decision

Your SituationRecommendation
Small team wiki (<20 users)Manual management with SAML SSO is workable
Stable knowledge base team with low turnoverUse SAML JIT provisioning, manual deprovisioning
Growing company (50+ users) using NuclinoUse Stitchflow: JIT-only provisioning creates security gaps
Enterprise with compliance requirementsUse Stitchflow: manual deprovisioning fails audit requirements
Multi-department knowledge sharingUse Stitchflow: automation essential for proper access governance

The bottom line

Nuclino offers solid SAML SSO with JIT provisioning, but completely lacks SCIM support for automated deprovisioning. For organizations that need proper identity lifecycle management beyond basic authentication, Stitchflow provides the automation that Nuclino simply doesn't offer natively.

Make Nuclino workflows AI-native

Nuclino has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No SCIM provisioning documentedSAML SSO with JIT provisioningUsers can link existing accountsManual deprovisioning required

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No SCIM provisioning documented
  • SAML SSO with JIT provisioning
  • Users can link existing accounts
  • Manual deprovisioning required

Documentation not available.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app

Where to enable

Entra admin center → Enterprise applications → Nuclino → Single sign-on

Microsoft Entra ID gallery app available for SSO. JIT provisioning on first login. No SCIM provisioning documented.

Use Stitchflow for automated provisioning.

Unlock SCIM for
Nuclino

Nuclino has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Nuclino logo
Nuclino
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
Aha! logo

Aha!

No SCIM

Product Management / Roadmapping

ProvisioningNot Supported
Manual Cost$11,754/yr

Aha! Roadmaps, the product roadmapping platform, does not support SCIM provisioning on any plan. While Aha! offers SAML 2.0 SSO integration with identity providers like Okta, Entra ID, and OneLogin, this only handles authentication through JIT (Just-In-Time) provisioning. The critical limitation: JIT provisioning creates user accounts with no default role or access permissions, requiring administrators to manually configure access for each user after they first sign in. For product teams managing strategic roadmaps and stakeholder access, this creates significant operational overhead. Since product roadmaps contain sensitive strategic information and stakeholder access typically varies by product area, IT administrators must manually assign appropriate roles and workspace permissions after each user is provisioned. There's no automatic deprovisioning when users leave the organization, creating potential security gaps. This manual process becomes particularly problematic for larger product organizations where dozens of stakeholders across different business units need carefully managed access to specific roadmaps.

View full guide
Appcues logo

Appcues

No SCIM

Product Adoption / User Onboarding

ProvisioningNot Supported
Manual Cost$11,754/yr

Appcues, the product adoption platform used by product managers and growth teams, explicitly does not support SCIM provisioning on any plan—not even Enterprise. While Appcues offers SAML 2.0 SSO integration starting at the Enterprise tier with just-in-time (JIT) provisioning, this only creates users during first login and provides no automated deprovisioning capabilities. For product teams where access needs change frequently as people move between projects or leave the company, this creates a significant security gap. The lack of SCIM means IT teams must manually manage user lifecycle for Appcues accounts, even though the platform handles sensitive product analytics and user flow data. When employees leave or change roles, their Appcues access remains active until manually revoked—a compliance risk that's particularly problematic given Appcues' role in tracking user behavior and product metrics. With MAU-based pricing starting at $300/month and scaling significantly with usage, paying for orphaned accounts also creates unnecessary cost bloat.

View full guide