Stitchflow
PagerDuty logo

PagerDuty SCIM guide

Native SCIM

How to automate PagerDuty user provisioning, and what it actually costs

Native SCIM requires Business or Enterprise plan

Summary and recommendation

PagerDuty supports SCIM provisioning, but only on Business ($41/user/month) or Enterprise plans. While the technical implementation works well with major identity providers, PagerDuty's SCIM has critical limitations: deactivating users completely deletes them (reactivation creates a new user), attribute updates after initial provisioning don't sync automatically, and some roles can't be created through SCIM at all.

For incident management teams, these limitations create operational risks. When engineers leave and rejoin teams, their incident history and on-call schedule configurations are lost. Manual attribute updates become necessary whenever someone changes roles or contact information—exactly the kind of administrative overhead SCIM should eliminate. For organizations where incident response is business-critical, these gaps in automation can impact team effectiveness during high-stress situations.

The strategic alternative

Stitchflow provides SCIM-level provisioning through resilient browser automation for PagerDuty that works with any plan, including Professional. We handle the complex provisioning logic and maintain user consistency across lifecycle changes. Flat pricing under $5K/year, regardless of team size.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredBusiness
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages PagerDuty accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The PagerDuty pricing problem

PagerDuty gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Professional$21/user/mo
Business$41/user/mo
EnterpriseCustom ($60-90/user/mo)

Plan Structure

PlanPriceSCIM
Professional$21/user/mo
Business$41/user/mo
EnterpriseCustom ($60-90/user/mo)

What this means in practice

Using current list prices (Professional → Business for SCIM access):

Team SizeAnnual Upgrade Cost
25 users+$6,000/year
50 users+$12,000/year
100 users+$24,000/year

Calculation: ($41 - $21) × users × 12 months

For incident response teams, this pricing jump is particularly painful since PagerDuty usage often spans the entire engineering organization, not just a core DevOps team.

Additional constraints

Role creation limitations
Some PagerDuty roles cannot be created through SCIM or the REST API, requiring manual setup even with Business tier access.
Attribute sync gaps
SAML-provisioned attributes (email, name, role) don't sync updates after initial provisioning - changes require manual intervention.
Destructive deactivation
User deactivation deletes the user entirely. Reactivation creates a new user, losing historical incident data and on-call schedule associations.
Entra MFA conflicts
Microsoft Entra MFA/Passwordless authentication requires disabling AuthnContext, creating potential security configuration complexity.

Summary of challenges

  • PagerDuty supports SCIM but only at Business tier (custom pricing)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

PagerDuty doesn't sell SCIM standalone—it's bundled with Business ($41/user/month) or Enterprise tier features:

SCIM 2.0 automated provisioning and deprovisioning
SAML single sign-on (SSO)
Advanced analytics and reporting
Service event rules and automation
Stakeholder license types
Priority support
Advanced integrations and webhooks
Custom incident response processes
Advanced on-call scheduling features

The core pain point: you're forced into Business tier pricing that doubles your per-user cost versus Professional ($21/user/month). For a 50-person engineering team, that's an extra $12,000 annually just to get basic user provisioning.

Stitchflow Insight

We estimate ~60% of Business tier features are irrelevant for teams that simply need automated user management. Most organizations just want engineers provisioned into PagerDuty immediately so they can respond to incidents—they don't need advanced analytics or custom automation workflows.

What IT admins are saying

Community sentiment on PagerDuty's SCIM implementation reveals frustration with attribute sync limitations and costly tier requirements. Common complaints:

  • Requiring Business tier ($41/user/month) just for basic provisioning automation
  • User attributes stop syncing after initial provisioning - manual updates required
  • Deactivation deletes users entirely, losing incident history and on-call context
  • Azure MFA requiring workaround configurations that break standard setups

SAML provisioned attributes like email, name, and role won't sync updates after the user is created - you have to manually update them in PagerDuty.

PagerDuty Support Documentation

For MFA with Entra you have to disable AuthnContext which breaks our standard authentication flow.

IT Admin, DevOps Community

The recurring theme

PagerDuty forces expensive tier upgrades for basic SCIM, then delivers a half-broken implementation that stops syncing user data after initial creation.

The decision

Your SituationRecommendation
On Professional, need SCIMUse Stitchflow: avoid the $20/user/month tier jump to Business
On Business/Enterprise but hitting attribute sync issuesUse Stitchflow: bypass SAML attribute limitations and deactivation quirks
Already on Business/Enterprise, native SCIM workingStick with native: you're paying $41-90/user/month already
Small on-call team, infrequent role changesManual may work: but monitor for incident response delays
Need reliable user lifecycle for critical incident responseUse Stitchflow: eliminate provisioning gaps that could impact on-call coverage

The bottom line

PagerDuty's Business tier requirement adds $20/user/month over Professional, and even then you'll hit attribute sync limitations and user deletion issues. For incident management teams that need reliable provisioning without the tier premium, Stitchflow delivers automated user lifecycle management at flat pricing.

Automate PagerDuty without the tier upgrade

Stitchflow delivers SCIM-level provisioning through resilient browser automation, backed by 24/7 human in the loop for PagerDuty at <$5K/year, flat, regardless of team size.

Works alongside or instead of native SCIM
Syncs with your existing IdP (Okta, Entra ID, Google Workspace)
Automates onboarding and offboarding
SOC 2 Type II certified
24/7 human-in-the-loop monitoring
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Business

Prerequisites

SSO must be configured first

Key limitations

  • Some roles cannot be created through SCIM or REST API
  • SAML provisioned attributes (email, name, role) won't sync updates - manual update required
  • MFA/Passwordless with Entra requires AuthnContext disabled
  • Deactivation deletes users, reactivation creates new user

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → PagerDuty → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

Full SCIM in OIN with Group Linking, Schema Discovery, Attribute Writeback. Create REST API key in PagerDuty. Account Owner required. Enabling Create Users will create billable users. Deactivation deletes users.

Native SCIM is available on Business. Use Stitchflow if you need provisioning without the tier upgrade.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → PagerDuty → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

Full SSO and provisioning tutorial. MFA/Passwordless requires AuthnContext disabled. SAML attributes (email, name, role) don't sync updates after initial provisioning.

Native SCIM is available on Business. Use Stitchflow if you need provisioning without the tier upgrade.

Unlock SCIM for
PagerDuty

PagerDuty gates automation behind Business or Enterprise plan. Stitchflow delivers the same SCIM outcomes for a flat fee, saving you 95%.

See how it works
Admin Console
Directory
Applications
PagerDuty logo
PagerDuty
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Amplitude logo

Amplitude

SCIM Tax

Product Analytics

SCIM StatusIncluded
Manual Cost$11,754/yr

Amplitude supports SCIM provisioning, but only on Growth plans (starting around $36K/year) or Enterprise plans with custom pricing. While Amplitude's SCIM implementation covers the core functionality—creating, updating, and deactivating users—it requires SCIM to be specifically enabled for your organization, and regenerating the SCIM key immediately invalidates existing integrations without warning. For product teams on Plus plans ($49/month), upgrading to Growth just to unlock SCIM means jumping from under $600/year to $36,000+/year—a 60x increase. That's often more than the entire analytics budget for smaller product teams. The gap becomes particularly problematic for cross-functional product teams where analysts, PMs, and engineers need varying levels of access to user behavior data, but manual provisioning creates security risks around sensitive analytics permissions.

View full guide
Bill.com logo

Bill.com

SCIM Tax

Accounts Payable / Receivable Automation

SCIM StatusIncluded
Manual Cost$11,754/yr

Bill.com offers inconsistent SCIM provisioning support that varies dramatically by identity provider. While Okta users can access SCIM provisioning through the OIN integration, Bill.com doesn't publish native SCIM documentation, and other IdPs like Entra ID are limited to SAML SSO only. This fragmented approach means your provisioning capabilities depend entirely on your IdP choice rather than Bill.com's platform features. For finance teams managing sensitive AP/AR workflows where user access directly impacts invoice approvals and payment processing, this inconsistency creates operational gaps—especially when onboarding new controllers, AP clerks, or accountants requires manual role assignment tied to spending limits and approval hierarchies. The real problem is that Bill.com gates all SSO functionality behind Enterprise plans with custom pricing (typically 2-3x their Corporate plan at $79/user/month), yet still provides no clear path to automated provisioning for most customers. Since financial systems require precise role-based access controls for SOX compliance and segregation of duties, manual user management creates both security risks and administrative overhead. When employees change departments or leave the company, orphaned accounts in payment systems pose significant financial and compliance risks that manual processes often miss.

View full guide
Bitwarden logo

Bitwarden

SCIM Tax

Password Manager / Secrets Management

SCIM StatusIncluded
Manual Cost$11,754/yr

Bitwarden supports SCIM 2.0 provisioning, but only on Teams ($4/user/month) and Enterprise ($6/user/month) plans. While this pricing is reasonable compared to other password managers, the real challenge lies in Bitwarden's zero-knowledge architecture: SCIM can provision user accounts, but users still need to manually accept vault invitations and set up their encryption keys before gaining access to shared passwords. This creates a critical security gap. Your identity provider shows users as "provisioned," but they can't actually access company passwords until they complete manual setup steps. When employees leave, SCIM deprovisioning removes their account, but any locally cached vault data remains accessible until they next sync. For security teams managing hundreds of shared credentials, this manual friction undermines the entire purpose of automated provisioning.

View full guide