Stitchflow
Postman logo

Postman SCIM guide

Native SCIM

How to automate Postman user provisioning, and what it actually costs

Native SCIM requires Enterprise plan

Summary and recommendation

Postman supports SCIM provisioning, but only on Enterprise plans at ~$49/user/month annually. This creates a significant barrier: teams on Basic ($19/user/month) or Professional ($39/user/month) face a 26-63% price increase just to unlock automated user provisioning. The setup also requires SSO to be configured first and restricts you to a single SSO method when using SCIM—limiting flexibility for organizations with complex identity requirements.

For a 50-person development team, upgrading from Professional to Enterprise solely for SCIM costs an extra $6,000/year. That's expensive automation for what should be a basic IT management capability, especially when your developers just need reliable access to API workspaces and testing environments.

The strategic alternative

Postman gates SCIM behind Enterprise. That can unlock provisioning, but it still does not complete the offboarding, access review, or license workflow across the rest of your stack. Stitchflow builds and maintains the IT workflows your team still runs manually, across every app, including the ones without APIs.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredEnterprise
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Postman accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Postman pricing problem

Postman gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Plan Structure (Annual Billing)

PlanPriceSSOSCIM
Basic$19/user/mo
Professional$39/user/mo
Enterprise$49/user/mo

Note: Free plan available for up to 3 users. SCIM requires SSO to be configured first and only supports one SSO method when SCIM is active.

What this means in practice

Using current list prices (Professional → Enterprise for SCIM access):

Team SizeAnnual Upgrade CostTotal Enterprise Cost
25 developers+$3,000/year$14,700/year
50 developers+$6,000/year$29,400/year
100 developers+$12,000/year$58,800/year

Calculation: ($49 - $39) × users × 12 months for upgrade cost

Additional constraints

SSO prerequisite
Must configure and maintain SSO before enabling SCIM, adding setup complexity and potential points of failure.
Single SSO limitation
Cannot use multiple SSO methods once SCIM is enabled, restricting authentication flexibility for complex organizations.
Admin role requirement
Only Team Admin or Super Admin roles can configure SCIM, creating potential bottlenecks during setup.
API workspace security
For development teams managing sensitive API credentials and test data, the lack of automated provisioning on lower tiers creates security gaps as teams grow.

Summary of challenges

  • Postman supports SCIM but only at Enterprise tier (~$49/user/mo annual - Enterprise)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

Postman doesn't sell SCIM à la carte. It's bundled with Enterprise features at ~$49/user/month:

SCIM 2.0 automated provisioning
SAML 2.0 single sign-on (required before SCIM)
Advanced team administration and audit logs
Role-based access controls (RBAC)
API governance and security scanning
Advanced monitoring and reporting
Private API network
Custom domains and branding
Dedicated customer success manager

Stitchflow Insight

The catch: you can only use one SSO method when SCIM is enabled, and SSO must be configured first. For development teams that just need automated user provisioning for API workspaces, you're paying for enterprise governance features you likely won't use. We estimate ~60% of Enterprise features are irrelevant for teams that only need SCIM provisioning.

What IT admins are saying

Community sentiment on Postman's SCIM requirements centers around the Enterprise pricing barrier and SSO complexity. Common complaints:

  • Being locked into Enterprise plan at $49/user just for automated provisioning
  • SSO prerequisite that adds unnecessary setup complexity
  • Single SSO method limitation when SCIM is enabled
  • No flexibility for teams that only need identity automation

Why do we need to pay Enterprise prices just to automate user provisioning? We don't need half the features in that tier.

Reddit IT Admin

The SSO requirement before SCIM is backwards - we want automated provisioning first, then SSO later.

Spiceworks Community

The recurring theme

Postman treats SCIM as an enterprise-only feature despite it being a basic identity management need, forcing smaller dev teams to overpay or manage users manually.

The decision

Your SituationRecommendation
On Basic or Professional, need SCIMUse Stitchflow: avoid the $10-30/user/mo tier jump to Enterprise
Already on Enterprise planUse native SCIM: you're paying for it
Need Enterprise features beyond SCIM (audit logs, advanced RBAC)Evaluate Enterprise: SCIM comes bundled with other security features
Have complex SSO requirements (multiple identity providers)Use Stitchflow: native SCIM restricts you to one SSO method
Small dev team, infrequent user changesManual may be acceptable: but watch for API credential sprawl

The bottom line

Postman gates SCIM behind Enterprise. The upgrade may unlock provisioning, but the workflow still has to complete across the rest of your stack.

Close the Postman workflow gap

Postman gates SCIM behind Enterprise, but the bigger issue is the workflow around it. Stitchflow builds and maintains the offboarding, access review, or license workflow underneath.

Across every app in the workflow, including the ones without APIs
Built in less than a week, with roughly 2 hours from your team
You review the exceptions. Stitchflow maintains the workflow underneath
Start with the free gap diagnostic

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Enterprise

Prerequisites

SSO must be configured first

Key limitations

  • SCIM only on Enterprise plan
  • SSO must be configured before SCIM
  • Only one SSO method allowed if using SCIM
  • Must be Team Admin or Super Admin to enable SCIM

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Postman → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

Enterprise required for SCIM

Postman gates SCIM behind Enterprise. The upgrade may unlock provisioning, but the workflow still has to complete across the rest of your stack.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → Postman → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

Enterprise required for SCIM

Postman gates SCIM behind Enterprise. The upgrade may unlock provisioning, but the workflow still has to complete across the rest of your stack.

Close the workflow gap in
Postman

Postman gates SCIM behind Enterprise plan. That can unlock provisioning, but it still does not complete the offboarding, access review, or license workflow across your stack, and it can add a 158% markup just to get there.

Start with the free gap diagnostic
Admin Console
Directory
Applications
Postman logo
Postman
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Amplitude logo

Amplitude

SCIM Tax

Product Analytics

SCIM StatusIncluded
Manual Cost$11,754/yr

Amplitude supports SCIM provisioning, but only on Growth plans (starting around $36K/year) or Enterprise plans with custom pricing. While Amplitude's SCIM implementation covers the core functionality—creating, updating, and deactivating users—it requires SCIM to be specifically enabled for your organization, and regenerating the SCIM key immediately invalidates existing integrations without warning. For product teams on Plus plans ($49/month), upgrading to Growth just to unlock SCIM means jumping from under $600/year to $36,000+/year—a 60x increase. That's often more than the entire analytics budget for smaller product teams. The gap becomes particularly problematic for cross-functional product teams where analysts, PMs, and engineers need varying levels of access to user behavior data, but manual provisioning creates security risks around sensitive analytics permissions.

View full guide
Bill.com logo

Bill.com

SCIM Tax

Accounts Payable / Receivable Automation

SCIM StatusIncluded
Manual Cost$11,754/yr

Bill.com offers inconsistent SCIM provisioning support that varies dramatically by identity provider. While Okta users can access SCIM provisioning through the OIN integration, Bill.com doesn't publish native SCIM documentation, and other IdPs like Entra ID are limited to SAML SSO only. This fragmented approach means your provisioning capabilities depend entirely on your IdP choice rather than Bill.com's platform features. For finance teams managing sensitive AP/AR workflows where user access directly impacts invoice approvals and payment processing, this inconsistency creates operational gaps—especially when onboarding new controllers, AP clerks, or accountants requires manual role assignment tied to spending limits and approval hierarchies. The real problem is that Bill.com gates all SSO functionality behind Enterprise plans with custom pricing (typically 2-3x their Corporate plan at $79/user/month), yet still provides no clear path to automated provisioning for most customers. Since financial systems require precise role-based access controls for SOX compliance and segregation of duties, manual user management creates both security risks and administrative overhead. When employees change departments or leave the company, orphaned accounts in payment systems pose significant financial and compliance risks that manual processes often miss.

View full guide
Bitwarden logo

Bitwarden

SCIM Tax

Password Manager / Secrets Management

SCIM StatusIncluded
Manual Cost$11,754/yr

Bitwarden supports SCIM 2.0 provisioning, but only on Teams ($4/user/month) and Enterprise ($6/user/month) plans. While this pricing is reasonable compared to other password managers, the real challenge lies in Bitwarden's zero-knowledge architecture: SCIM can provision user accounts, but users still need to manually accept vault invitations and set up their encryption keys before gaining access to shared passwords. This creates a critical security gap. Your identity provider shows users as "provisioned," but they can't actually access company passwords until they complete manual setup steps. When employees leave, SCIM deprovisioning removes their account, but any locally cached vault data remains accessible until they next sync. For security teams managing hundreds of shared credentials, this manual friction undermines the entire purpose of automated provisioning.

View full guide