Stitchflow
ProfitWell logo

ProfitWell SCIM guide

Connector Only

How to automate ProfitWell user provisioning, and what it actually costs

Summary and recommendation

ProfitWell, the SaaS analytics platform now owned by Paddle, does not offer SCIM provisioning capabilities. While ProfitWell supports SAML SSO integration with major identity providers, there's no public documentation for automated user provisioning. This means IT teams must manually create, update, and deprovision user accounts in ProfitWell—a significant operational burden for organizations tracking subscription metrics across finance, product, and executive teams.

The lack of automated provisioning creates a compliance gap for organizations that need consistent user lifecycle management across their SaaS stack. Manual account management increases the risk of orphaned accounts when employees leave, especially problematic given that ProfitWell often contains sensitive financial and customer data. SSO alone doesn't solve this—it only handles authentication for accounts that already exist in the system.

The strategic alternative

ProfitWell has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolUnknown
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaVia third-partyNo SCIM available
Microsoft Entra IDVia third-partyNo SCIM available
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages ProfitWell accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The ProfitWell pricing problem

ProfitWell gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
ProfitWell MetricsFree forever
RetainPay-as-you-use
Price IntelligentlyMonthly subscription

Pricing structure

PlanPricingSCIMSSO
ProfitWell MetricsFree forever❌ Not availableUnknown
RetainPay-as-you-use❌ Not availableUnknown
Price IntelligentlyMonthly subscription❌ Not availableUnknown

Key pricing details

ProfitWell Metrics
100% free with core SaaS analytics
Retain
Pay only when churn is successfully recovered
Enterprise features require contacting Paddle directly

What this means in practice

Without SCIM or documented provisioning, every ProfitWell user account must be created manually. For SaaS analytics teams that need to grant access to finance, product, and executive stakeholders, this creates significant administrative overhead.

The lack of public documentation means IT teams can't evaluate provisioning capabilities before procurement, potentially discovering limitations only after contracts are signed.

Additional constraints

Post-acquisition uncertainty
Feature roadmap unclear since Paddle acquisition
No IdP marketplace presence
Missing from Okta Integration Network and Microsoft Entra gallery
Support dependency
All enterprise features require direct vendor engagement
Limited visibility
No public information on SSO protocols or user management capabilities
Mixed product portfolio
Paddle's focus may be on payment processing rather than analytics tooling

Summary of challenges

  • ProfitWell does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What ProfitWell actually offers for identity

No documented identity management

ProfitWell (now owned by Paddle) provides no public documentation for SSO or SCIM provisioning:

FeatureStatus
SAML SSOUnknown - contact support
OIDC SSOUnknown - contact support
SCIM provisioningUnknown - contact support
JIT provisioningUnknown - contact support

The reality: Since Paddle acquired ProfitWell in 2022 for $200M, identity management features are buried in enterprise sales conversations rather than transparent documentation.

What this means for IT teams

ProfitWell's lack of public identity documentation creates three problems:

No pricing transparency
Enterprise features require sales calls with no published pricing
No technical specs
Cannot evaluate integration complexity without vendor demos
Vendor dependency
Must rely entirely on Paddle support for identity configuration

Since ProfitWell primarily serves finance and product teams analyzing subscription metrics, most organizations have 3-10 users maximum. The overhead of enterprise sales cycles often exceeds the value of automated provisioning for such small user bases.

What IT admins are saying

ProfitWell's lack of documented SSO and SCIM capabilities leaves IT teams in the dark:

  • No public documentation on single sign-on or user provisioning features
  • Unclear what authentication options are available after Paddle acquisition
  • Must contact vendor directly to understand enterprise identity integration
  • No presence in major IdP marketplaces (Okta OIN, Microsoft Entra Gallery)

Contact vendor for enterprise features

the only guidance available for IT teams trying to understand ProfitWell's identity capabilities.

The recurring theme

Since Paddle's 2022 acquisition, ProfitWell's identity management capabilities have become a black box, forcing IT admins to engage in lengthy sales conversations just to understand basic SSO functionality.

The decision

Your SituationRecommendation
Small finance/analytics team (<10 users)Manual management is acceptable
Using ProfitWell Metrics only (free tier)Manual management with SAML SSO if available
Enterprise with multiple Paddle productsContact Paddle for enterprise SSO/provisioning options
Large organization with compliance needsUse Stitchflow: automation essential for audit trail
Rapid team growth or high turnoverUse Stitchflow: manual provisioning doesn't scale

The bottom line

ProfitWell (now part of Paddle) provides excellent SaaS analytics but offers no public documentation for identity management capabilities. With no SCIM support and unclear SSO options, organizations needing automated provisioning will find Stitchflow provides the missing automation layer for seamless user management.

Make ProfitWell workflows AI-native

ProfitWell has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No SSO/SCIM documentation foundAcquired by Paddle in 2022Contact vendor for enterprise features

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No SSO/SCIM documentation found
  • Acquired by Paddle in 2022
  • Contact vendor for enterprise features

Documentation not available.

Unlock SCIM for
ProfitWell

ProfitWell has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
ProfitWell logo
ProfitWell
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
ActiveCampaign logo

ActiveCampaign

No SCIM

Marketing Automation / Email

ProvisioningNot Supported
Manual Cost$11,754/yr

ActiveCampaign, the marketing automation platform, does not offer native SCIM provisioning on any plan. While the Enterprise plan ($145+/month) includes SAML 2.0 SSO with just-in-time (JIT) provisioning, this only creates user accounts on first login—there's no automated deprovisioning when employees leave or change roles. New SSO users are automatically added to a generic "SSO Users" group with configurable permissions, but IT teams have no way to programmatically manage user lifecycles or enforce granular access controls based on department or role changes. This creates a significant gap for marketing teams that need to manage access to customer data and campaign tools. When employees leave the company or change departments, their ActiveCampaign access must be manually revoked, creating compliance risks and potential data exposure. The lack of automated deprovisioning means former employees could theoretically retain access to sensitive marketing data and customer information until someone manually removes them from the platform.

View full guide
Adyen logo

Adyen

No SCIM

Payments / Fintech

ProvisioningNot Supported
Manual Cost$11,754/yr

Adyen offers SCIM 2.0 provisioning, but only through Okta's integration—there's no native SCIM endpoint. This creates a significant vendor lock-in scenario where your provisioning capabilities are entirely dependent on using Okta as your identity provider. Teams using Azure Entra, Google Workspace, or OneLogin are left with manual user management despite Adyen supporting SAML SSO with these platforms. The Okta integration itself requires maintaining a company account (not just a merchant account) and keeping at least one non-SSO admin for troubleshooting, adding operational complexity. For payment platforms handling sensitive financial data, this provisioning gap creates serious compliance risks. Your finance team, payment operations staff, and developers need timely access to process transactions and manage risk controls, but without automated provisioning, you're stuck with manual onboarding that can delay critical payment operations. The requirement to maintain non-SSO admin accounts also creates a security backdoor that compliance auditors will flag.

View full guide