Stitchflow
Palo Alto Networks logo

Palo Alto Networks SCIM guide

Native SCIM

How to automate Palo Alto Networks user provisioning, and what it actually costs

Native SCIM requires Enterprise plan

Summary and recommendation

Palo Alto Networks supports SCIM through its Cloud Identity Engine, providing automated user provisioning across its security platform. However, the implementation creates significant complexity for IT teams: each Palo Alto product (GlobalProtect, Admin UI, Prisma Access) requires separate SSO configurations, and SCIM only works through the Cloud Identity Engine component. This fragmented approach means managing multiple integrations for what should be a unified security platform.

The real-world impact is substantial operational overhead. IT teams must configure and maintain separate identity connections for each Palo Alto service their organization uses, rather than having a single, consolidated provisioning pipeline. While SSO handles authentication, the provisioning complexity remains - especially problematic when onboarding users who need access to multiple Palo Alto products simultaneously.

The strategic alternative

Palo Alto Networks gates SCIM behind Enterprise. That can unlock provisioning, but it still does not complete the offboarding, access review, or license workflow across the rest of your stack. Stitchflow builds and maintains the IT workflows your team still runs manually, across every app, including the ones without APIs.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredEnterprise
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Palo Alto Networks accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Palo Alto Networks pricing problem

Palo Alto Networks gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Plan Structure

PlanPriceSSOSCIM
EnterpriseContact for pricing

Note: Palo Alto Networks operates on subscription-based enterprise pricing with multi-year discounts up to 32% for 3-year commitments.

What this means in practice

Architectural complexity: While SCIM is technically available, it requires deploying and configuring the Cloud Identity Engine as a centralized identity hub. This adds an additional layer between your IdP and the actual Palo Alto products your users need access to.

Multi-product SSO fragmentation: Each Palo Alto product (GlobalProtect VPN, Admin UI, Prisma Access) requires separate SSO configurations. Even with SCIM handling user provisioning centrally, you still need to manage multiple authentication endpoints and policies across the product suite.

Limited group provisioning scope: Palo Alto recommends only provisioning groups that are actively used in security policies to optimize performance. This means IT admins must coordinate with security teams to determine which groups should sync, creating ongoing operational overhead.

Additional constraints

Contact-only pricing
Enterprise pricing requires sales engagement with no public pricing transparency.
Cloud Identity Engine dependency
SCIM functionality is tied to a specific identity management component that may be overkill for organizations only using select Palo Alto products.
Product-specific configurations
Despite centralized provisioning, each Palo Alto service still requires individual SSO setup and maintenance.
Performance considerations
Palo Alto specifically warns against over-provisioning groups, suggesting potential performance issues with larger identity datasets.

Summary of challenges

  • Palo Alto Networks supports SCIM but only at Enterprise tier (custom pricing)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

Palo Alto Networks doesn't sell SCIM separately. It's bundled with their enterprise security platform through the Cloud Identity Engine:

SCIM automated provisioning via Cloud Identity Engine
SAML SSO across multiple products (GlobalProtect, Admin UI, Prisma Access)
Cloud-based directory integration
Real-time identity threat detection (with Cortex XDR)
Advanced security policy management
Multi-product identity orchestration
Enterprise-grade security controls

Stitchflow Insight

The complexity here is real: each Palo Alto product requires separate SSO configurations, and you can only provision groups that are actually used in security policies. If you just need straightforward user provisioning without the full security platform overhead, you're paying for enterprise security infrastructure you may not need. We estimate ~80% of the Cloud Identity Engine features are irrelevant for organizations that simply want clean user lifecycle management across their security tools.

What IT admins are saying

Community sentiment on Palo Alto Networks's SCIM implementation is mixed, with admins appreciating the capability but frustrated by the complexity. Common complaints:

  • Multiple separate SSO configurations needed for different products (GlobalProtect, Prisma Access, Admin UI)
  • Cloud Identity Engine requirement adds another layer of complexity
  • Having to manage different provisioning setups for each Palo Alto product
  • Documentation scattered across multiple product lines makes initial setup challenging

Setting up SCIM with Palo Alto is like configuring three different apps - you need separate configs for GlobalProtect, the admin interface, and Prisma Access. It's not the unified experience you'd expect from a single vendor.

r/sysadmin

The Cloud Identity Engine works well once configured, but getting there requires understanding their entire product ecosystem first. Not exactly plug-and-play.

Okta Community Forum

The recurring theme

While Palo Alto provides comprehensive SCIM support, their multi-product architecture creates administrative overhead that many IT teams weren't expecting from a single security vendor.

The decision

Your SituationRecommendation
Need SCIM but don't want Enterprise tier complexityUse Stitchflow: avoid the multi-product SSO configuration maze
Using multiple Palo Alto products (GlobalProtect, Prisma, etc.)Use Stitchflow: manage all identities from one place instead of separate configs
Want SCIM without Cloud Identity Engine setupUse Stitchflow: skip the separate infrastructure requirement
Already have Enterprise with Cloud Identity EngineUse native SCIM: you're paying for the infrastructure
Small security team, minimal user changesManual may work: but watch for security policy group mismatches

The bottom line

Palo Alto Networks gates SCIM behind Enterprise. The upgrade may unlock provisioning, but the workflow still has to complete across the rest of your stack.

Close the Palo Alto Networks workflow gap

Palo Alto Networks gates SCIM behind Enterprise, but the bigger issue is the workflow around it. Stitchflow builds and maintains the offboarding, access review, or license workflow underneath.

Across every app in the workflow, including the ones without APIs
Built in less than a week, with roughly 2 hours from your team
You review the exceptions. Stitchflow maintains the workflow underneath
Start with the free gap diagnostic

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Enterprise

Prerequisites

SSO must be configured first

Key limitations

  • Multiple products with different SSO configs
  • Cloud Identity Engine for SCIM
  • Separate configs for GlobalProtect, Admin UI, Prisma
  • Only provision groups used in Security policy

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Palo Alto Networks → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

Multiple OIN apps: SCIM Connector, Cloud Identity Engine, Cloud Identity Engine (Application-enabled). Use gallery app for Directory Sync. Full sync required after config. Enables real-time identity threat detection with Cortex XDR integration.

Palo Alto Networks gates SCIM behind Enterprise. The upgrade may unlock provisioning, but the workflow still has to complete across the rest of your stack.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → Palo Alto Networks → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

Full provisioning tutorial. Contact support for SCIM URL and Token. Set Provisioning Mode to Automatic. Only provision groups used in Security policy for optimal performance. Cloud Identity Engine tutorial also available.

Palo Alto Networks gates SCIM behind Enterprise. The upgrade may unlock provisioning, but the workflow still has to complete across the rest of your stack.

Close the workflow gap in
Palo Alto Networks

Palo Alto Networks gates SCIM behind Enterprise plan. That can unlock provisioning, but it still does not complete the offboarding, access review, or license workflow across your stack.

Start with the free gap diagnostic
Admin Console
Directory
Applications
Palo Alto Networks logo
Palo Alto Networks
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

8x8 logo

8x8

SCIM Tax

UCaaS / Business Communications

SCIM StatusIncluded
Manual Cost$11,754/yr

8x8 supports SCIM 2.0 for automated user provisioning, but only on their quote-based X Series plans (previously $24-44/user/month range before they moved to custom pricing). While SCIM can create, update, and deactivate users, it has critical gaps that create ongoing manual overhead: license assignment must be done manually after every user is provisioned, users can't be deleted (only deactivated), and provisioned users don't automatically appear in the Company Directory. For IT teams managing a unified communications platform that typically covers all employees, these limitations defeat much of SCIM's purpose. You're still manually touching every user account to assign licenses and ensure directory visibility. The lack of user deletion support also creates compliance headaches when employees leave - accounts accumulate as "deactivated" rather than being properly removed.

View full guide
Absorb LMS logo

Absorb LMS

SCIM Tax

Learning Management System (LMS)

SCIM StatusIncluded
Manual Cost$11,754/yr

Absorb LMS supports native SCIM provisioning, but only on Enterprise plans with SSO as a required paid add-on. Even with SCIM enabled, the implementation has critical limitations: SAML provisioning only creates accounts on first login and never updates existing users, and full user provisioning requires the specific "Absorb 5 - New Learner Experience" version. For organizations managing compliance training across hundreds or thousands of learners, these gaps create ongoing manual work. The SSO-as-add-on model means you're paying extra fees on top of already custom Enterprise pricing ($6-12/user/month base, but varies significantly). For learning management systems handling external partners, contractors, and employees across different access levels, the inability to update existing user attributes through SAML provisioning forces IT teams into manual account management—exactly what automated provisioning should eliminate.

View full guide
Airbase logo

Airbase

SCIM Tax

Spend Management / Corporate Cards

SCIM StatusIncluded
Manual Cost$11,754/yr

Airbase supports SCIM provisioning, but only on Enterprise plans starting around $8,500/year. While SCIM works with all major identity providers (Okta, Entra ID, Google Workspace), the Enterprise requirement creates a significant barrier for smaller finance teams who need automated provisioning for spend management but can't justify enterprise-level spend management software costs. This creates a particular challenge in finance applications where rapid provisioning and deprovisioning is critical for corporate card access and financial controls. Manual user management means delayed access for new employees needing corporate cards, and more critically, potential security gaps when departing employees retain access to spend management systems. For finance teams handling sensitive financial data and corporate spending, these delays and oversights create both operational friction and compliance risks.

View full guide