Stitchflow
Pave logo

Pave SCIM guide

Connector Only

How to automate Pave user provisioning, and what it actually costs

Summary and recommendation

Pave, the compensation management platform, does not support SCIM provisioning on any plan. While Pave offers Okta SSO integration, it's only available to customers on the Workflows package (starting at ~$23,750/year for 250 employees), and even then, SSO only handles authentication—not user lifecycle management. IT teams must manually create, update, and deactivate user accounts in Pave, creating a significant administrative burden for what should be an automated process.

This manual provisioning approach creates real compliance and security risks. When employees join, change roles, or leave the company, their Pave access must be manually updated, leading to delays in onboarding and potential security gaps where former employees retain access to sensitive compensation data. For growing companies managing hundreds of employees' compensation information, this manual overhead quickly becomes unsustainable and increases the risk of data exposure.

The strategic alternative

Pave has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaOkta SSO available only for Workflows package subscribers. SSO also available via Google or SAML. Note: Pave Commute is a different product.
Microsoft Entra IDVia third-partyNo Pave compensation provisioning tutorial in Microsoft Entra gallery.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Pave accounts manually. Here's what that costs:

Source: Stitchflow research, normalized to 500 employees:
Orphaned accounts (ex-employees with access)5
Unused licenses12
IT hours spent on manual management/year85 hours
Unused license cost/year$3,500
IT labor cost/year$5,100
Cost of compliance misses/year$890
Total annual financial impact$9,490

The Pave pricing problem

Pave gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Free1-200 employees
StandardFrom $799/month
Workflows~$23,750/year (250 employees)
Premium Bundle~$33,000/year

Pricing and provisioning options

PlanPriceSSOSCIM
Free1-200 employees
StandardFrom $799/month
Workflows~$23,750/year (250 employees)
Premium Bundle~$33,000/year

Key limitation: Even Pave's most expensive plans don't include SCIM provisioning. SSO is restricted to Okta and only available on Workflows packages that cost $24,000+ annually.

What this means in practice

For companies under 200 employees: You get basic compensation benchmarking for free, but zero identity management capabilities. Every user must be manually invited and managed.

For larger organizations: You face a minimum $24,000/year commitment just to get basic Okta SSO. There's no automated user provisioning at any price point, meaning:

Manual user creation for every new hire
No automated role assignments based on department/level
No automated deprovisioning when employees leave
Potential compliance gaps in access management

Additional constraints

Limited SSO ecosystem
Only Okta SSO is supported on paid plans - no Entra ID or Google Workspace integration
Third-party dependency risk
Pave offers SSO integration through Rippling, but this requires managing a separate vendor relationship
Manual provisioning only
All user lifecycle management must be handled manually through Pave's web interface
Product confusion
Ensure you're evaluating Pave compensation software, not Pave Commute (their separate commuter benefits app)

Summary of challenges

  • Pave does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Pave actually offers for identity

SSO Only (Workflows package required)

Pave offers limited identity integration through SSO, but requires their premium Workflows package:

FeatureSupported?Requirements
Okta SAML SSO✓ YesWorkflows package subscription
Google SSO✓ YesWorkflows package subscription
Generic SAML✓ YesWorkflows package subscription
User provisioning❌ NoNot available
User deprovisioning❌ NoNot available
Group sync❌ NoNot available
Automated user lifecycle❌ NoNot available

What this means: You get federated login for users who already have Pave accounts, but zero automation around user lifecycle management.

The Pricing Reality

To access even basic SSO, you need Pave's Workflows package:

Base pricing
From $799/month
Typical cost
~$23,750/year for 250 employees
Premium bundle
~$33,000/year

You're paying enterprise-level pricing for a compensation platform that happens to include SSO as a bundled feature—not because you need sophisticated workflow automation.

Alternative Integration (Rippling only)

Pave mentions user management capabilities through Rippling integration, but this:

Only works if you're already using Rippling as your HRIS
Doesn't provide SCIM-standard provisioning to other identity providers
Limits your identity architecture choices

Bottom line: Pave offers expensive SSO with no provisioning capabilities. For teams that just want automated user lifecycle management, you're paying for workflow features you don't need while still lacking the provisioning automation that matters.

What IT admins are saying

Pave's lack of automated provisioning forces IT teams into manual user management workflows:

  • User accounts must be manually created and maintained in Pave
  • No SCIM support means departing employees require manual deprovisioning
  • SSO requires upgrading to the expensive Workflows package
  • User access management becomes a scattered process across multiple systems

SSO is only available for Workflows package subscribers... this adds significant cost just for basic identity integration.

IT administrator review

We have to manually manage all Pave users since there's no provisioning API. It's easy to forget to remove access when people leave.

Systems administrator feedback

The recurring theme

Without native provisioning, Pave creates an isolated user management silo that requires constant manual intervention, increasing both operational overhead and security risks for IT teams.

The decision

Your SituationRecommendation
Small compensation team (<10 users) on free tierManual management is acceptable
Growing company ready to invest in Workflows packageManual management with Okta SSO for authentication
Mid-size company (50+ employees) needing audit trailsUse Stitchflow: automation essential for compliance
Enterprise with frequent compensation team changesUse Stitchflow: automation eliminates manual overhead
Multi-IdP environment or using Entra IDUse Stitchflow: works with any identity provider

The bottom line

Pave delivers powerful compensation benchmarking and planning, but lacks any provisioning automation—even Okta SSO requires the premium Workflows package. For companies that need reliable user lifecycle management without the premium pricing constraints, Stitchflow provides SCIM-level provisioning that works with any plan and any identity provider.

Make Pave workflows AI-native

Pave has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No native SCIM provisioning supportOkta SSO only available on Workflows packageSSO and user management available via Rippling integrationDifferent from Pave Commute (commuter rewards app)

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No native SCIM provisioning support
  • Okta SSO only available on Workflows package
  • SSO and user management available via Rippling integration
  • Different from Pave Commute (commuter rewards app)

Documentation not available.

Unlock SCIM for
Pave

Pave has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Pave logo
Pave
via Stitchflow

Last updated: 2026-01-20

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Abnormal Security logo

Abnormal Security

No SCIM

Security / Email Security

ProvisioningNot Supported
Manual Cost$9,490/yr

Abnormal Security, the AI-powered email security platform protecting against BEC and phishing attacks, does not offer SCIM provisioning on any plan. While the platform supports SAML 2.0 SSO integration with identity providers like Okta and Entra ID, this only handles authentication—not automated user lifecycle management. Security teams must manually provision and deprovision analyst access through Abnormal's portal, creating operational overhead and potential security gaps in a platform specifically designed to protect against email-based threats. This manual provisioning model creates significant challenges for security operations. When new SOC analysts join or existing team members change roles, IT admins must coordinate manual account creation and permission updates in Abnormal Security. For a platform that's critical to threat detection and incident response, delays in provisioning can leave security gaps, while delayed deprovisioning creates compliance risks. The irony is stark: a security platform designed to prevent account takeover and credential abuse lacks the automated provisioning controls that prevent exactly these risks.

View full guide
Airwallex logo

Airwallex

No SCIM
ProvisioningNot Supported
Manual Cost$9,490/yr

Airwallex, the global payments and treasury platform, offers no SCIM provisioning support on any plan, including their custom Accelerate enterprise tier. Despite being positioned for enterprise use with features like multi-entity management and advanced treasury controls, Airwallex lacks any official identity provider integrations—no SSO, no provisioning, and no presence in major IdP galleries like Okta's OIN or Microsoft Entra. This creates a significant operational burden for IT teams managing financial access across growing organizations, where manual user provisioning and deprovisioning in a payments platform presents both efficiency and security risks. The absence of identity management capabilities means IT administrators must manually create, update, and remove user accounts in Airwallex—a particularly concerning gap given that this platform handles sensitive financial operations, cross-border payments, and treasury management. Without automated deprovisioning, former employees could retain access to financial systems, creating compliance risks and potential security vulnerabilities that most finance and IT teams cannot afford to overlook.

View full guide
Alkami logo

Alkami

No SCIM
ProvisioningNot Supported
Manual Cost$9,490/yr

Alkami, the digital banking platform used by banks and credit unions, does not offer SCIM provisioning or public SSO integrations. As an enterprise-only platform with custom pricing, Alkami appears to handle user management through direct account administration rather than standardized identity protocols. This creates significant challenges for financial institutions that need to integrate Alkami with their existing identity infrastructure—particularly problematic given the compliance requirements and security standards that banks must maintain. The lack of automated provisioning means IT teams at financial institutions must manually create, update, and deprovision user accounts in Alkami. For a platform handling sensitive financial data and customer information, this manual approach introduces compliance risks and operational overhead. Banks typically require seamless integration between their core identity systems and all applications accessing customer data.

View full guide