Stitchflow
Oyster logo

Oyster SCIM guide

Connector Only

How to automate Oyster user provisioning, and what it actually costs

Summary and recommendation

Oyster HR, the global employment platform, does not support SCIM provisioning despite pricing that ranges from $29/month for contractors to $699/month per employee for Employer of Record services. While Oyster offers Okta SSO integration, this is limited to admin and manager roles only—Team Members cannot use SSO, creating a two-tiered access system. For user lifecycle management, Oyster only provides webhook-based deprovisioning through Okta event hooks, meaning you can automatically remove users when they're deactivated in your IdP, but provisioning and updates must be handled manually.

This creates a significant operational burden for HR teams managing global workforces. Without SCIM, every new hire, role change, or team transfer requires manual intervention in Oyster, despite the platform's focus on streamlining global employment processes. For companies using Oyster to manage hundreds of international employees and contractors, this manual overhead undermines the efficiency gains the platform is supposed to provide. The SSO limitation to admin roles also means most users still need separate credentials, reducing security consistency across your workforce.

The strategic alternative

Oyster has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0 (via Okta)
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaVia third-partySSO integration in OIN for admin/manager roles. Deprovisioning via Okta event hooks (user suspended, deactivated, unassigned). No full SCIM provisioning. Sign-in only, not sign-up.
Microsoft Entra IDVia third-partyNo documented Microsoft Entra ID integration. Contact vendor for enterprise SSO options beyond Okta.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Oyster accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Oyster pricing problem

Oyster gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
User provisioning❌ Manual only
User deprovisioning⚠️ Okta only
Event hooks
SAML SSO✓ Admin/manager roles
Okta integration
Team member SSO❌ Not supported
N/A

Provisioning capabilities

FeatureAvailabilityMethod
User provisioning❌ Manual onlyNo SCIM endpoint
User deprovisioning⚠️ Okta onlyEvent hooks
SAML SSO✓ Admin/manager rolesOkta integration
Team member SSO❌ Not supportedN/A

Pricing across plans

Contractor management
$29/contractor/month
Global Payroll
$25-50/employee/month
Employer of Record
$599-699/employee/month
Agent of Record
$200/contractor/month

What this means in practice

Without SCIM support, IT teams managing Oyster face significant manual overhead:

Manual user creation
Every new hire requires manual account setup in Oyster
Role-based SSO gaps
Only admins and managers get SSO access - team members still need separate credentials
Okta-only deprovisioning
Automated offboarding only works if you use Okta, and only handles user deletion
No group management
Team assignments and role updates must be done manually in Oyster's interface

For a 100-employee global team on EOR plans, this represents ~$60,000-70,000/year in Oyster costs with zero provisioning automation.

Additional constraints

IdP dependency
Deprovisioning automation requires Okta specifically - no support for Microsoft Entra ID or Google Workspace
Webhook reliability
Event hook-based deprovisioning depends on external webhook delivery, creating potential failure points
Limited scope
SSO and automation only cover admin/manager workflows, not the broader employee base
HRIS integration gaps
As a global employment platform, Oyster sits between your HRIS and payroll - manual sync required on both ends

Summary of challenges

  • Oyster does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Oyster actually offers for identity

Okta SSO Integration (Admin/Manager Only)

Oyster provides SAML 2.0 SSO through their official Okta Integration Network listing, but with significant restrictions:

SettingDetails
ProtocolSAML 2.0
Supported rolesAdmin and Manager accounts only
Team Member accessManual login required
IdP supportOkta only (documented)
JIT provisioning❌ No

Critical limitation: SSO only works for admin and manager roles. Your actual workforce (Team Members) still requires manual password management.

Webhook-Based Deprovisioning

Oyster offers automated deprovisioning through Okta event hooks:

FeatureSupported?
User creation❌ No
User updates❌ No
User deactivation✓ Yes (via webhook)
Group management❌ No
Role assignment❌ No

How it works: Configure an Okta event hook with your Oyster API token. When users are suspended, deactivated, or unassigned from the Oyster app in Okta, they're automatically removed from Oyster.

Missing SCIM Capabilities

Oyster's webhook approach handles the most critical security need (deprovisioning), but lacks standard SCIM functionality:

No automated user creation or onboarding
No profile synchronization between IdP and Oyster
No group-based access management
Limited to Okta ecosystem (no documented Entra ID or Google Workspace support)

For a global employment platform managing contractors and employees across multiple countries, this creates significant manual overhead for HR teams managing user lifecycle at scale.

What IT admins are saying

Oyster's limited provisioning automation creates manual overhead for IT teams managing global workforces:

  • Manual user management required for all employee and contractor accounts
  • SSO access restricted to admin and manager roles only - regular team members can't use single sign-on
  • Deprovisioning relies on Okta webhooks rather than standard SCIM protocols
  • No documented integration path for Microsoft Entra ID or other identity providers

SSO for admin/manager roles only, not Team Members

Oyster HR official documentation

Create Okta hook with Oyster token for automatic user deletion on removal

Oyster support documentation

The recurring theme

Even with Okta SSO configured, most users still require manual provisioning, and IT teams must set up custom webhooks for basic deprovisioning automation. The lack of standard SCIM support means vendor lock-in to Okta-specific solutions.

The decision

Your SituationRecommendation
Small HR team (<10 users) managing contractors onlyManual management is acceptable
Growing global workforce with frequent contractor onboardingUse Stitchflow: automation essential for scaling
Enterprise with compliance requirements for employee accessUse Stitchflow: automation essential for audit trail
Mixed workforce (EOR + contractors) with high turnoverUse Stitchflow: automation strongly recommended
Using non-Okta IdP (Entra, Google Workspace, OneLogin)Use Stitchflow: only option for automated provisioning

The bottom line

Oyster offers Okta SSO for admin roles and webhook-based deprovisioning, but there's no documented SCIM support for full lifecycle management. For HR teams managing global workforces at scale, Stitchflow provides the automated provisioning that Oyster's native integration gaps leave behind.

Make Oyster workflows AI-native

Oyster has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

Okta SSO integration availableDeprovisioning via Okta event hookNo documented SCIM endpointSSO for admin/manager roles only, not Team MembersHRIS platform

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • Okta SSO integration available
  • Deprovisioning via Okta event hook
  • No documented SCIM endpoint
  • SSO for admin/manager roles only, not Team Members
  • HRIS platform

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Oyster → Sign On

SSO integration in OIN for admin/manager roles. Deprovisioning via Okta event hooks (user suspended, deactivated, unassigned). No full SCIM provisioning. Sign-in only, not sign-up.

Use Stitchflow for automated provisioning.

Unlock SCIM for
Oyster

Oyster has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Oyster logo
Oyster
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
ActiveCampaign logo

ActiveCampaign

No SCIM

Marketing Automation / Email

ProvisioningNot Supported
Manual Cost$11,754/yr

ActiveCampaign, the marketing automation platform, does not offer native SCIM provisioning on any plan. While the Enterprise plan ($145+/month) includes SAML 2.0 SSO with just-in-time (JIT) provisioning, this only creates user accounts on first login—there's no automated deprovisioning when employees leave or change roles. New SSO users are automatically added to a generic "SSO Users" group with configurable permissions, but IT teams have no way to programmatically manage user lifecycles or enforce granular access controls based on department or role changes. This creates a significant gap for marketing teams that need to manage access to customer data and campaign tools. When employees leave the company or change departments, their ActiveCampaign access must be manually revoked, creating compliance risks and potential data exposure. The lack of automated deprovisioning means former employees could theoretically retain access to sensitive marketing data and customer information until someone manually removes them from the platform.

View full guide
Adyen logo

Adyen

No SCIM

Payments / Fintech

ProvisioningNot Supported
Manual Cost$11,754/yr

Adyen offers SCIM 2.0 provisioning, but only through Okta's integration—there's no native SCIM endpoint. This creates a significant vendor lock-in scenario where your provisioning capabilities are entirely dependent on using Okta as your identity provider. Teams using Azure Entra, Google Workspace, or OneLogin are left with manual user management despite Adyen supporting SAML SSO with these platforms. The Okta integration itself requires maintaining a company account (not just a merchant account) and keeping at least one non-SSO admin for troubleshooting, adding operational complexity. For payment platforms handling sensitive financial data, this provisioning gap creates serious compliance risks. Your finance team, payment operations staff, and developers need timely access to process transactions and manage risk controls, but without automated provisioning, you're stuck with manual onboarding that can delay critical payment operations. The requirement to maintain non-SSO admin accounts also creates a security backdoor that compliance auditors will flag.

View full guide