Stitchflow
Outreach logo

Outreach SCIM guide

Native SCIM

How to automate Outreach user provisioning, and what it actually costs

Native SCIM requires Enterprise plan

Summary and recommendation

Outreach supports SCIM provisioning, but only on Enterprise plans and with significant implementation complexity. The platform requires SCIM and SSO to be configured as separate Okta applications, creating unnecessary administrative overhead. For Azure environments, there's no pre-built gallery app—you must implement SCIM manually via Outreach's OAuth API. At $100-$160/user/month for Enterprise plans, a 100-person sales team faces $120K-$192K annually just for the baseline licensing before SCIM access.

This creates a problematic gap for growing sales organizations. Teams often need automated user provisioning well before they can justify Enterprise pricing, especially when their primary need is simply adding and removing SDRs and AEs as headcount fluctuates. Manual user management becomes a bottleneck that impacts sales productivity and creates security risks when departing employees retain system access.

The strategic alternative

Stitchflow provides SCIM-level provisioning through resilient browser automation for Outreach without requiring Enterprise plans or complex multi-app configurations. Works with any Outreach plan and any identity provider. Flat pricing under $5K/year, regardless of team size.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredEnterprise
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDSSO only
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Outreach accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Outreach pricing problem

Outreach gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Plan Structure

PlanPriceSSOSCIM
Standard$100-$160/user/month
ProfessionalHigher (with AI features)
EnterpriseContact sales

Note: Enterprise pricing is not publicly disclosed. Based on market data, typical 200-user Enterprise deployments range from $386K-$787K over 3 years ($64K-$131K annually), suggesting $27-$55/user/month depending on negotiation and contract length.

What this means in practice

Using conservative Enterprise pricing estimates (assuming $35/user/month average):

Team SizeAnnual Standard CostEnterprise Upgrade CostTotal Increase
50 users$60K-$96K$21K18-35% increase
100 users$120K-$192K$42K18-35% increase
200 users$240K-$384K$84K18-35% increase

These calculations assume mid-range Standard pricing ($100/user/month) and conservative Enterprise estimates.

Additional constraints

Separate Okta apps required
SCIM and SSO must be configured as separate applications in Okta, creating additional administrative overhead.
Azure complexity
No pre-built Entra gallery app for SCIM. Organizations using Azure must implement custom SCIM via Outreach's OAuth API or use third-party BYOA connectors.
Annual contracts typical
Enterprise plans generally require annual commitments, reducing flexibility for growing teams.
Deactivation limitations
SCIM deactivation locks users rather than fully removing them, potentially affecting license counts and security posture.

Summary of challenges

  • Outreach supports SCIM but only at Enterprise tier (custom pricing)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

Outreach doesn't sell SCIM separately. It's part of Enterprise plans that bundle extensive sales automation features:

SCIM automated provisioning (requires separate Okta app from SSO)
SAML single sign-on with JIT provisioning
Advanced sequence automation and AI features
Call recording and conversation intelligence
Revenue intelligence and forecasting
Advanced analytics and reporting
Dedicated customer success manager
Enterprise security controls

Plus Outreach's SCIM has architectural quirks—you need separate Okta apps for SCIM and SSO, and Azure requires custom API integration since there's no gallery provisioning app.

Stitchflow Insight

The challenge: you're paying $100-$160/user/month primarily for sales engagement tools, not identity management. SCIM is a small add-on to a platform designed for SDRs and account executives. We estimate ~85% of Enterprise features are sales-specific automation that IT teams won't use.

What IT admins are saying

Community sentiment on Outreach's SCIM implementation is mixed, with specific technical frustrations around setup complexity.

  • Requirement to maintain separate Okta apps for SCIM and SSO creates administrative overhead
  • Azure users stuck with manual OAuth API setup instead of gallery integration
  • Enterprise pricing tier requirement puts SCIM out of reach for smaller sales teams
  • User deactivation only locks accounts rather than fully removing them

Having to manage two separate Okta apps for the same service is just poor architecture. Why can't SCIM and SSO be in the same integration?

Reddit r/okta

The fact that Azure doesn't have a gallery app for provisioning means we're stuck building custom connectors or doing manual API work.

Spiceworks Community

The recurring theme

Outreach's SCIM works but requires technical workarounds and separate app management that creates unnecessary complexity for IT teams.

The decision

Your SituationRecommendation
Need SCIM but don't have Enterprise planUse Stitchflow: avoid the $100-160/user/month Enterprise upgrade
Using Azure AD/Entra ID for identityUse Stitchflow: skip the custom OAuth SCIM API setup
Want SCIM and SSO in one streamlined setupUse Stitchflow: avoid managing separate Okta apps
Already on Enterprise with OktaUse native SCIM: you're paying for it
Small sales team, low turnoverManual provisioning may work: but watch for security gaps

The bottom line

Outreach's SCIM requires Enterprise pricing ($100-160/user/month) and complex separate app configurations with Okta, while Azure users face custom API integration. For sales teams that need provisioning automation without the Enterprise costs or technical complexity, Stitchflow delivers the same automation at under $5K/year flat.

Automate Outreach without the tier upgrade

Stitchflow delivers SCIM-level provisioning through resilient browser automation, backed by 24/7 human in the loop for Outreach at <$5K/year, flat, regardless of team size.

Works alongside or instead of native SCIM
Syncs with your existing IdP (Okta, Entra ID, Google Workspace)
Automates onboarding and offboarding
SOC 2 Type II certified
24/7 human-in-the-loop monitoring
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Enterprise

Prerequisites

SSO must be configured first

Key limitations

  • SCIM and SSO must be separate Okta apps
  • Azure SCIM via API (no gallery app)
  • User import limited to specific plans
  • Groups sync as Teams
  • Deactivation locks users, doesn't delete

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Outreach → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

SCIM app must be separate from SSO app in Okta. Requires Okta Lifecycle Management subscription. Custom attribute roleName uses urn:ietf:params:scim:schemas:extension:outreach:2.0:User namespace. Deactivation locks (not deletes) users.

Native SCIM is available on Enterprise. Use Stitchflow if you need provisioning without the tier upgrade.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → Outreach → Single sign-on

No pre-built Entra gallery app for provisioning. SSO via non-gallery enterprise app with SAML. For SCIM, use Outreach's OAuth-based SCIM API manually or via BYOA SCIM connector.

Use Stitchflow for automated provisioning.

Unlock SCIM for
Outreach

Outreach gates automation behind Enterprise plan. Stitchflow delivers the same SCIM outcomes for a flat fee.

See how it works
Admin Console
Directory
Applications
Outreach logo
Outreach
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

SalesLoft logo

SalesLoft

SCIM Tax

Sales Engagement

SCIM StatusIncluded
Manual Cost$11,754/yr

Salesloft supports SCIM provisioning, but only on Enterprise plans starting at ~$2,160/user/year. While the SCIM implementation is comprehensive—supporting user creation, attribute updates, and deactivation—the Enterprise pricing requirement creates a significant barrier for mid-market teams on lower-tier plans who need automated provisioning. The pricing jump to Enterprise represents a substantial increase from Salesloft's base pricing (~$1,000/user/year), effectively doubling costs just to unlock SCIM. For a 50-person sales team, that's an additional $58,000/year in licensing purely for provisioning capabilities. Many teams end up manually managing user lifecycles or accepting the security risks of orphaned accounts when sales reps leave.

View full guide
Amplitude logo

Amplitude

SCIM Tax

Product Analytics

SCIM StatusIncluded
Manual Cost$11,754/yr

Amplitude supports SCIM provisioning, but only on Growth plans (starting around $36K/year) or Enterprise plans with custom pricing. While Amplitude's SCIM implementation covers the core functionality—creating, updating, and deactivating users—it requires SCIM to be specifically enabled for your organization, and regenerating the SCIM key immediately invalidates existing integrations without warning. For product teams on Plus plans ($49/month), upgrading to Growth just to unlock SCIM means jumping from under $600/year to $36,000+/year—a 60x increase. That's often more than the entire analytics budget for smaller product teams. The gap becomes particularly problematic for cross-functional product teams where analysts, PMs, and engineers need varying levels of access to user behavior data, but manual provisioning creates security risks around sensitive analytics permissions.

View full guide
Bill.com logo

Bill.com

SCIM Tax

Accounts Payable / Receivable Automation

SCIM StatusIncluded
Manual Cost$11,754/yr

Bill.com offers inconsistent SCIM provisioning support that varies dramatically by identity provider. While Okta users can access SCIM provisioning through the OIN integration, Bill.com doesn't publish native SCIM documentation, and other IdPs like Entra ID are limited to SAML SSO only. This fragmented approach means your provisioning capabilities depend entirely on your IdP choice rather than Bill.com's platform features. For finance teams managing sensitive AP/AR workflows where user access directly impacts invoice approvals and payment processing, this inconsistency creates operational gaps—especially when onboarding new controllers, AP clerks, or accountants requires manual role assignment tied to spending limits and approval hierarchies. The real problem is that Bill.com gates all SSO functionality behind Enterprise plans with custom pricing (typically 2-3x their Corporate plan at $79/user/month), yet still provides no clear path to automated provisioning for most customers. Since financial systems require precise role-based access controls for SOX compliance and segregation of duties, manual user management creates both security risks and administrative overhead. When employees change departments or leave the company, orphaned accounts in payment systems pose significant financial and compliance risks that manual processes often miss.

View full guide