Summary and recommendation
Nuclino, the team wiki and knowledge base platform, does not support SCIM provisioning on any plan. While Nuclino offers SAML 2.0 SSO integration with identity providers like Okta and Microsoft Entra ID, this only provides Just-in-Time (JIT) provisioning—accounts are created when users first access their team's Nuclino workspace through SSO. This creates a significant gap in user lifecycle management: users can be automatically provisioned on first login, but must be manually deprovisioned when they leave the organization.
For IT teams managing knowledge bases containing sensitive company information, this manual deprovisioning requirement creates both security and compliance risks. Former employees retain access to documentation, project notes, and institutional knowledge until someone remembers to manually remove them. This is particularly problematic for Nuclino since team wikis often contain confidential processes, strategic plans, and proprietary information that should be immediately inaccessible when employees depart.
The strategic alternative
Nuclino has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | No |
| SSO available? | Yes |
| SSO protocol | SAML 2.0 |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | Via third-party | ❌ | SAML SSO setup documented with Okta. JIT provisioning on first login. No SCIM provisioning. Configure as custom SAML app in Okta. |
| Microsoft Entra ID | Via third-party | ❌ | Microsoft Entra ID gallery app available for SSO. JIT provisioning on first login. No SCIM provisioning documented. |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages Nuclino accounts manually. Here's what that costs:
The Nuclino pricing problem
Nuclino gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Free | $0 | ||
| Standard | $6-8/user/mo | ||
| Premium | $9-12/user/mo |
Pricing and provisioning options
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Free | $0 | ||
| Standard | $6-8/user/mo | ||
| Premium | $9-12/user/mo |
What this means in practice
No automated deprovisioning: When employees leave your organization, their Nuclino accounts remain active indefinitely. IT must manually identify and remove access for each departing user - a security risk that scales poorly.
JIT-only provisioning: New users can only access Nuclino after attempting to log in via SSO for the first time. There's no way to pre-provision accounts or bulk-create users for onboarding workflows.
Account linking complexity: Existing Nuclino users must manually link their accounts to SSO during the migration process, creating additional support tickets and user friction.
Additional constraints
Summary of challenges
- Nuclino does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What Nuclino actually offers for identity
SAML SSO (Standard/Premium plans)
Nuclino supports SAML 2.0 single sign-on with just-in-time (JIT) provisioning:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0 |
| Supported IdPs | Okta, Entra ID, OneLogin, ADFS, generic SAML |
| JIT provisioning | ✓ Yes - creates accounts on first login |
| Account linking | ✓ Yes - existing users can link their accounts |
| Configuration | Team Settings > Authentication |
How it works: Users access Nuclino via team URL, authenticate through IdP, and accounts are automatically created on first login. Existing Nuclino users can link their accounts to SSO.
No SCIM provisioning
| Feature | Supported? |
|---|---|
| Automated user creation | ❌ JIT only |
| Automated user updates | ❌ No |
| Automated user deprovisioning | ❌ Manual required |
| Group/role sync | ❌ No |
The gap: While JIT provisioning handles account creation, there's no automated way to deprovision users when they leave your organization. Admins must manually remove users from Nuclino workspaces, creating security risks and administrative overhead.
Real-world impact: For knowledge management platforms handling sensitive company information, the inability to automatically revoke access when employees leave is a significant compliance and security concern.
What IT admins are saying
Nuclino's lack of SCIM provisioning creates manual overhead for IT teams managing knowledge base access:
- Users are only provisioned via just-in-time (JIT) on first SSO login
- No automated deprovisioning when employees leave the organization
- Manual account cleanup required to maintain security and licensing compliance
- Existing users must manually link their accounts when SSO is enabled
SAML SSO creates accounts on first login via team URL. Existing accounts can be linked.
Configure in Team Settings > Authentication.
The recurring theme
While Nuclino offers SAML SSO with multiple identity providers, the absence of SCIM means IT teams must manually track and remove departed employees' access to company wikis and knowledge bases, creating both security risks and administrative burden.
The decision
| Your Situation | Recommendation |
|---|---|
| Small team wiki (<20 users) | Manual management with SAML SSO is workable |
| Stable knowledge base team with low turnover | Use SAML JIT provisioning, manual deprovisioning |
| Growing company (50+ users) using Nuclino | Use Stitchflow: JIT-only provisioning creates security gaps |
| Enterprise with compliance requirements | Use Stitchflow: manual deprovisioning fails audit requirements |
| Multi-department knowledge sharing | Use Stitchflow: automation essential for proper access governance |
The bottom line
Nuclino offers solid SAML SSO with JIT provisioning, but completely lacks SCIM support for automated deprovisioning. For organizations that need proper identity lifecycle management beyond basic authentication, Stitchflow provides the automation that Nuclino simply doesn't offer natively.
Make Nuclino workflows AI-native
Nuclino has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- No SCIM provisioning documented
- SAML SSO with JIT provisioning
- Users can link existing accounts
- Manual deprovisioning required
Documentation not available.
Configuration for Entra ID
Integration type
Microsoft Entra Gallery app
Where to enable
Microsoft Entra ID gallery app available for SSO. JIT provisioning on first login. No SCIM provisioning documented.
Use Stitchflow for automated provisioning.
Unlock SCIM for
Nuclino
Nuclino has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.
See how it works


