Stitchflow
OneTrust logo

OneTrust SCIM guide

Native SCIM

How to automate OneTrust user provisioning, and what it actually costs

Native SCIM requires Enterprise plan

Summary and recommendation

OneTrust offers native SCIM provisioning with excellent support for Okta and Azure AD, including advanced features like group linking and schema discovery. However, SCIM is only available on Enterprise tier plans, which start at $10,000-$500,000+ annually depending on your OneTrust product mix. For privacy and GRC teams managing smaller user bases, this creates a significant cost barrier to automated provisioning.

The pricing structure is particularly challenging because OneTrust's modular approach means you might need multiple product licenses (Consent Management at ~$827/month, Privacy Automation at ~$3,680/month, etc.) before reaching Enterprise tier minimums. This forces IT teams to choose between manual user management or substantial licensing increases that far exceed typical provisioning budgets.

The strategic alternative

OneTrust gates SCIM behind Enterprise. Skip the Enterprise plan upgrade and automate complete outcomes across your stack. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredEnterprise
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0, OAuth, OpenID Connect
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages OneTrust accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The OneTrust pricing problem

OneTrust gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Plan Structure

PlanPriceSSOSCIM
Standard/Professional$827-$17,500+/mo
EnterpriseCustom pricing

Note: OneTrust's pricing varies significantly by product line (Consent & Preferences, Privacy Automation, Tech Risk & Compliance, etc.) but SCIM access consistently requires Enterprise tier across all products.

What this means in practice

OneTrust's enterprise pricing is entirely custom, but industry reports suggest:

Minimum engagement
Most OneTrust Enterprise contracts start at $50,000+ annually
Typical range
Enterprise deployments commonly fall between $100,000-$500,000+ per year
Product bundling
Enterprise tier often requires purchasing multiple OneTrust product lines

For organizations currently on standard OneTrust plans, adding SCIM means:

Moving to custom enterprise pricing (typically 3-10x current spend)
Annual contract commitment
Extended procurement cycles due to custom pricing negotiations

Additional constraints

Product line complexity
OneTrust's five different product lines each have separate pricing, making it difficult to predict total cost for SCIM access.
Custom pricing opacity
No published Enterprise pricing makes budgeting impossible without sales engagement.
Bundled requirements
Enterprise tier often includes features beyond SCIM that many organizations don't need, inflating total cost.
Contract minimums
Enterprise contracts typically require multi-year commitments with substantial minimum annual spend requirements.

Summary of challenges

  • OneTrust supports SCIM but only at Enterprise tier (custom pricing)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

OneTrust doesn't sell SCIM separately. It's bundled with Enterprise-tier privacy management features:

SCIM automated provisioning with group sync
SAML/OIDC single sign-on (SSO)
Advanced privacy workflow automation
Data subject request management
Cookie compliance scanning
Vendor risk assessments
Custom privacy impact assessments
Dedicated customer success management

The challenge? OneTrust's Enterprise tier starts around $10,000+ annually and includes comprehensive privacy/GRC tooling that most IT teams don't manage directly. If your privacy and compliance teams already use OneTrust, the SCIM upgrade makes perfect sense. If you're only looking at OneTrust for identity management, you're paying for enterprise privacy features you won't use.

Stitchflow Insight

We estimate ~85% of OneTrust's Enterprise capabilities are privacy-focused workflows irrelevant for teams that just want automated user provisioning.

What IT admins are saying

Community sentiment on OneTrust's SCIM implementation is generally positive, though pricing concerns dominate the conversation. Common complaints:

While specific community quotes about OneTrust's SCIM are limited due to its enterprise focus, the pricing structure follows a familiar pattern seen across GRC platforms - powerful features locked behind high-cost enterprise tiers.

  • Enterprise tier requirement creates a massive cost barrier for smaller privacy teams
  • Annual subscriptions starting at $10,000+ exclude mid-market organizations
  • Complex pricing across five product lines makes budgeting difficult
  • SCIM works well but only accessible after significant financial commitment

The recurring theme

OneTrust delivers solid SCIM functionality, but the enterprise pricing requirement means most organizations evaluate alternatives before committing to the $10,000+ annual minimum typical for privacy automation platforms.

The decision

Your SituationRecommendation
Need SCIM but on lower OneTrust tiersUse Stitchflow: avoid the Enterprise upgrade requirement
Already on Enterprise with SCIM accessUse native SCIM: excellent functionality with group linking
Mixed IdP environment (beyond Okta/Azure)Use Stitchflow: works with any IdP including Google Workspace
Privacy team budget under $50K/yearUse Stitchflow: flat $5K vs. $10K-500K OneTrust Enterprise
Small compliance team, low turnoverManual may work: but monitor for audit gaps

The bottom line

OneTrust's Enterprise-only SCIM requirement creates a massive pricing barrier—potentially $10K-500K annually just to get automated provisioning. For privacy and compliance teams that need SCIM without the Enterprise commitment, Stitchflow delivers the automation at a fraction of the cost.

Make OneTrust workflows AI-native

OneTrust gates SCIM behind Enterprise. We build complete offboarding, user access reviews, and license workflows without that SCIM Tax upgrade.

No Enterprise upgrade required
Less than a week, start to finish (~2 hours of your time)
We maintain the integration layer underneath
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Enterprise

Prerequisites

SSO must be configured first

Key limitations

  • Enterprise tier required
  • Group linking with Okta
  • Schema discovery available

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → OneTrust → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

OneTrust in OIN with SCIM provisioning. Supports group linking, schema discovery, and attribute writeback. Integrates with Okta Universal Directory for automated user preference syncing.

OneTrust gates SCIM behind Enterprise. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → OneTrust → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

Microsoft Entra ID gallery app available. Supports both SP and IdP initiated SSO. JIT provisioning enabled by default. SCIM provisioning documented at my.onetrust.com. Contact OneTrust for detailed Azure AD SCIM setup.

OneTrust gates SCIM behind Enterprise. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Unlock SCIM for
OneTrust

OneTrust gates SCIM behind Enterprise plan. We automate complete offboarding and access reviews across your stack without that SCIM Tax upgrade.

See how it works
Admin Console
Directory
Applications
OneTrust logo
OneTrust
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Amplitude logo

Amplitude

SCIM Tax

Product Analytics

SCIM StatusIncluded
Manual Cost$11,754/yr

Amplitude supports SCIM provisioning, but only on Growth plans (starting around $36K/year) or Enterprise plans with custom pricing. While Amplitude's SCIM implementation covers the core functionality—creating, updating, and deactivating users—it requires SCIM to be specifically enabled for your organization, and regenerating the SCIM key immediately invalidates existing integrations without warning. For product teams on Plus plans ($49/month), upgrading to Growth just to unlock SCIM means jumping from under $600/year to $36,000+/year—a 60x increase. That's often more than the entire analytics budget for smaller product teams. The gap becomes particularly problematic for cross-functional product teams where analysts, PMs, and engineers need varying levels of access to user behavior data, but manual provisioning creates security risks around sensitive analytics permissions.

View full guide
Bill.com logo

Bill.com

SCIM Tax

Accounts Payable / Receivable Automation

SCIM StatusIncluded
Manual Cost$11,754/yr

Bill.com offers inconsistent SCIM provisioning support that varies dramatically by identity provider. While Okta users can access SCIM provisioning through the OIN integration, Bill.com doesn't publish native SCIM documentation, and other IdPs like Entra ID are limited to SAML SSO only. This fragmented approach means your provisioning capabilities depend entirely on your IdP choice rather than Bill.com's platform features. For finance teams managing sensitive AP/AR workflows where user access directly impacts invoice approvals and payment processing, this inconsistency creates operational gaps—especially when onboarding new controllers, AP clerks, or accountants requires manual role assignment tied to spending limits and approval hierarchies. The real problem is that Bill.com gates all SSO functionality behind Enterprise plans with custom pricing (typically 2-3x their Corporate plan at $79/user/month), yet still provides no clear path to automated provisioning for most customers. Since financial systems require precise role-based access controls for SOX compliance and segregation of duties, manual user management creates both security risks and administrative overhead. When employees change departments or leave the company, orphaned accounts in payment systems pose significant financial and compliance risks that manual processes often miss.

View full guide
Bitwarden logo

Bitwarden

SCIM Tax

Password Manager / Secrets Management

SCIM StatusIncluded
Manual Cost$11,754/yr

Bitwarden supports SCIM 2.0 provisioning, but only on Teams ($4/user/month) and Enterprise ($6/user/month) plans. While this pricing is reasonable compared to other password managers, the real challenge lies in Bitwarden's zero-knowledge architecture: SCIM can provision user accounts, but users still need to manually accept vault invitations and set up their encryption keys before gaining access to shared passwords. This creates a critical security gap. Your identity provider shows users as "provisioned," but they can't actually access company passwords until they complete manual setup steps. When employees leave, SCIM deprovisioning removes their account, but any locally cached vault data remains accessible until they next sync. For security teams managing hundreds of shared credentials, this manual friction undermines the entire purpose of automated provisioning.

View full guide