Stitchflow
Pendo logo

Pendo SCIM guide

Native SCIM

How to automate Pendo user provisioning, and what it actually costs

Native SCIM requires Premium plan

Summary and recommendation

Pendo supports SCIM (the protocol that lets your identity provider automatically create, update, and remove user accounts). But there's a catch: SCIM is only available on Premium tier or as an add-on to lower tiers, and Pendo doesn't support JIT (just-in-time) provisioning as an alternative. This means teams on Base plans (~$8,000/year) must either upgrade to Premium or purchase the SCIM add-on just to avoid manual user creation.

Without SCIM or JIT, every new user must be manually created in Pendo before they can sign in via SSO. For product analytics teams where access needs change frequently—new product managers joining projects, developers rotating between teams, contractors coming and going—this creates a significant administrative burden. IT teams end up fielding constant access requests while users wait to start analyzing product data.

The strategic alternative

Pendo gates SCIM behind Premium. Skip the Premium plan upgrade and automate complete outcomes across your stack. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredPro
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Pendo accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Pendo pricing problem

Pendo gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Plan Structure

PlanPriceSSOSCIM
FreeUp to 500 MAUs
Base~$8,000/year
Premium~$47,000/year
EnterpriseUp to $140,000/year

Note: Pricing is based on Monthly Active Users (MAUs). SCIM is available on Premium tier or as an add-on to lower tiers (pricing not publicly disclosed).

What this means in practice

For teams currently on Base plan seeking SCIM access:

Current MAU RangeBase Plan CostPremium UpgradeAdditional Cost
1,000-2,500 MAUs~$8,000/year~$47,000/year+$39,000/year
2,500-5,000 MAUs~$15,000/year~$65,000/year+$50,000/year
5,000+ MAUs~$25,000/year~$85,000/year+$60,000/year

The exact SCIM add-on pricing for lower tiers is not publicly available and requires custom quoting.

Additional constraints

No JIT provisioning
Pendo doesn't support Just-in-Time user creation, making SCIM the only automated provisioning option. Without SCIM, every user must be manually created before their first SSO login.
SAML prerequisite
SCIM setup requires SAML SSO to be configured first, adding implementation complexity.
Limited IdP support
While technically SCIM 2.0 compliant, Pendo officially supports only Okta for SCIM provisioning. Other IdPs may work but aren't guaranteed.
UI control removal
Enabling SCIM removes manual user management controls from the Pendo UI, requiring all user lifecycle management to flow through your IdP.

Summary of challenges

  • Pendo supports SCIM but only at Pro tier (Up to $140,000/year)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

Pendo doesn't sell SCIM separately. It's bundled with Premium tier features or sold as an expensive add-on:

SCIM 2.0 automated provisioning
SAML single sign-on (required prerequisite)
Advanced analytics and segmentation
Multi-app experiences
Resource center customization
Advanced security controls
Priority support

Without the upgrade, Pendo offers no JIT provisioning - users must be manually created before they can log in via SSO, creating a significant administrative burden for IT teams.

Stitchflow Insight

The Premium tier starts around $47,000/year for mid-sized teams and can reach $140,000+ annually. If you just need automated provisioning, you're paying for extensive product analytics capabilities you may not use. We estimate ~80% of Premium features are irrelevant for teams that only need SCIM automation.

What IT admins are saying

Community sentiment on Pendo's provisioning limitations is mixed, with frustration focused on the lack of flexibility and high pricing barriers.

  • No JIT provisioning support forces SCIM dependency for automated user creation
  • SCIM requires Premium tier upgrade or expensive add-on purchase
  • Manual user creation required before SSO login without SCIM
  • Limited SCIM support officially only for Okta, despite other IdPs working

Once SCIM is enabled, you lose the ability to manually manage users through the Pendo UI - it's all or nothing.

Pendo Support Documentation

The pricing jump to get SCIM is significant when you're just trying to automate basic user provisioning.

IT Admin, Reddit

The recurring theme

Pendo's all-or-nothing approach to provisioning creates operational challenges, forcing teams to choose between expensive automation or manual user management workflows.

The decision

Your SituationRecommendation
Below Premium tier, need provisioningUse Stitchflow: avoid the massive Premium upgrade cost
On Premium without SCIM add-onUse Stitchflow: cheaper than adding SCIM to your plan
Already paying for Premium with SCIMUse native SCIM: you're already paying for it
Small team, infrequent user changesManual provisioning may work: but no JIT means pre-setup required
Need cross-IdP support beyond OktaUse Stitchflow: native SCIM officially supports Okta only

The bottom line

Pendo's lack of JIT provisioning makes SCIM essential for seamless user onboarding, but Premium tier pricing can reach $47K-140K annually. For teams that need automated provisioning without the Premium price tag, Stitchflow delivers the same automation at a fraction of the cost.

Make Pendo workflows AI-native

Pendo gates SCIM behind Premium. We build complete offboarding, user access reviews, and license workflows without that SCIM Tax upgrade.

No Premium upgrade required
Less than a week, start to finish (~2 hours of your time)
We maintain the integration layer underneath
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Pro

Prerequisites

SSO must be configured first

Key limitations

  • No JIT provisioning supported
  • SCIM is Premium tier or add-on
  • Enabling SCIM removes manual user controls from UI
  • Must verify domain before SAML setup
  • SAML required before SCIM
  • Currently only Okta officially supported for SCIM

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Pendo → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

Full SCIM support: create, update, remove users, push groups. Groups appear as teams in Pendo. Requires Premium tier or SCIM add-on.

Pendo gates SCIM behind Premium. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → Pendo → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

SSO tutorial available. For SCIM, create custom enterprise app with Pendo's base URL and API key. Pendo officially supports Okta for SCIM but Entra works via standard SCIM.

Pendo gates SCIM behind Premium. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Unlock SCIM for
Pendo

Pendo gates SCIM behind Premium plan. We automate complete offboarding and access reviews across your stack without that SCIM Tax upgrade, avoiding a 488% markup.

See how it works
Admin Console
Directory
Applications
Pendo logo
Pendo
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Amplitude logo

Amplitude

SCIM Tax

Product Analytics

SCIM StatusIncluded
Manual Cost$11,754/yr

Amplitude supports SCIM provisioning, but only on Growth plans (starting around $36K/year) or Enterprise plans with custom pricing. While Amplitude's SCIM implementation covers the core functionality—creating, updating, and deactivating users—it requires SCIM to be specifically enabled for your organization, and regenerating the SCIM key immediately invalidates existing integrations without warning. For product teams on Plus plans ($49/month), upgrading to Growth just to unlock SCIM means jumping from under $600/year to $36,000+/year—a 60x increase. That's often more than the entire analytics budget for smaller product teams. The gap becomes particularly problematic for cross-functional product teams where analysts, PMs, and engineers need varying levels of access to user behavior data, but manual provisioning creates security risks around sensitive analytics permissions.

View full guide
Bill.com logo

Bill.com

SCIM Tax

Accounts Payable / Receivable Automation

SCIM StatusIncluded
Manual Cost$11,754/yr

Bill.com offers inconsistent SCIM provisioning support that varies dramatically by identity provider. While Okta users can access SCIM provisioning through the OIN integration, Bill.com doesn't publish native SCIM documentation, and other IdPs like Entra ID are limited to SAML SSO only. This fragmented approach means your provisioning capabilities depend entirely on your IdP choice rather than Bill.com's platform features. For finance teams managing sensitive AP/AR workflows where user access directly impacts invoice approvals and payment processing, this inconsistency creates operational gaps—especially when onboarding new controllers, AP clerks, or accountants requires manual role assignment tied to spending limits and approval hierarchies. The real problem is that Bill.com gates all SSO functionality behind Enterprise plans with custom pricing (typically 2-3x their Corporate plan at $79/user/month), yet still provides no clear path to automated provisioning for most customers. Since financial systems require precise role-based access controls for SOX compliance and segregation of duties, manual user management creates both security risks and administrative overhead. When employees change departments or leave the company, orphaned accounts in payment systems pose significant financial and compliance risks that manual processes often miss.

View full guide
Bitwarden logo

Bitwarden

SCIM Tax

Password Manager / Secrets Management

SCIM StatusIncluded
Manual Cost$11,754/yr

Bitwarden supports SCIM 2.0 provisioning, but only on Teams ($4/user/month) and Enterprise ($6/user/month) plans. While this pricing is reasonable compared to other password managers, the real challenge lies in Bitwarden's zero-knowledge architecture: SCIM can provision user accounts, but users still need to manually accept vault invitations and set up their encryption keys before gaining access to shared passwords. This creates a critical security gap. Your identity provider shows users as "provisioned," but they can't actually access company passwords until they complete manual setup steps. When employees leave, SCIM deprovisioning removes their account, but any locally cached vault data remains accessible until they next sync. For security teams managing hundreds of shared credentials, this manual friction undermines the entire purpose of automated provisioning.

View full guide