Stitchflow
Proof logo

Proof SCIM guide

Connector Only

How to automate Proof user provisioning, and what it actually costs

Summary and recommendation

Proof, the identity verification and notarization platform, does not support SCIM provisioning on any plan. While Proof offers SAML 2.0 SSO integration through their Command Center subscription (enterprise tier), this only handles authentication through Just-in-Time (JIT) provisioning. Users are automatically created on first login based on SAML attributes, but there's no automated way to manage user lifecycle events like role changes, group assignments, or offboarding through your identity provider.

This JIT-only approach creates operational gaps for IT teams managing access to sensitive identity verification workflows. When employees change roles or leave the organization, administrators must manually update or remove their Proof access since there's no automated deprovisioning. For a platform handling legal document verification and notarization, this manual process introduces compliance risks and increases the administrative burden on IT teams who need granular control over user access management.

The strategic alternative

Proof has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaSAML SSO with JIT provisioning. No Okta catalog app found.
Microsoft Entra IDSAML SSO with JIT provisioning. No Entra gallery app.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Proof accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Proof pricing problem

Proof gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Command CenterContact for pricing

Provisioning limitations

PlanPriceSSOSCIM
Command CenterContact for pricing

What this means in practice

Without SCIM, IT teams cannot proactively provision users or manage access at scale:

No bulk user creation
Users only appear in Proof after their first login attempt
No role pre-assignment
User roles and permissions must be configured reactively
Manual deprovisioning
Removing users requires manual intervention in Proof's interface
No group sync
Organization structure and team assignments cannot be automated from your IdP

This JIT-only approach works for small teams but creates friction as organizations scale their identity verification workflows.

Additional constraints

Command Center dependency
SSO functionality requires a separate Command Center subscription, not available on standard Proof plans
Domain verification required
Organizations must complete domain verification before SSO can be configured
SAML-only authentication
No support for modern OIDC protocols, limiting IdP flexibility
Manual user management
All user lifecycle management happens inside Proof's interface rather than your central IdP

Summary of challenges

  • Proof does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Proof actually offers for identity

SAML SSO with JIT Provisioning (Command Center required)

Proof provides SAML 2.0 single sign-on through their Command Center platform:

SettingDetails
ProtocolSAML 2.0
Supported IdPsOkta, Azure AD, Google Workspace, Auth0, custom SAML
Provisioning methodJust-in-Time (JIT) only
User creationAutomatic on first login via SAML attributes
PrerequisitesProof Command Center subscription + domain verification

Key features:

Automatic user provisioning on first login through SAML attributes
Role and organization assignment via SAML claims
Single Log-Out (SLO) support when logout URL is configured
Domain-based SSO for streamlined user experience

What's missing

Proof's identity management stops at JIT provisioning:

FeatureAvailable?
SCIM provisioning❌ No
Bulk user creation❌ No
Automated deprovisioning❌ No
Group synchronization❌ No
Real-time user updates❌ No

Real-world implications: When employees leave your organization, their Proof access remains active until manual intervention. User attribute changes in your IdP won't sync to Proof automatically. You're limited to whatever user information can be passed through SAML attributes during login.

What IT admins are saying

Proof's JIT-only provisioning model creates ongoing friction for IT teams managing identity verification workflows:

  • Users can't be pre-provisioned - they only get created on first login through SAML
  • No way to bulk provision legal and compliance teams before go-live
  • Command Center subscription required just to enable SSO, adding cost complexity
  • Manual cleanup required when users leave - no automated deprovisioning

SSO with JIT provisioning. SAML attributes provision users with roles and org assignments.

Proof official documentation

Must be a Proof Command Center customer for SSO

Proof support documentation

The recurring theme

IT admins lose control over user lifecycle management when they can't pre-provision accounts or automate offboarding. JIT provisioning means waiting for users to attempt login before their accounts exist, complicating compliance reporting and access reviews.

The decision

Your SituationRecommendation
Small legal team (<10 users) with stable staffManual management through Command Center is workable
Identity verification team with occasional turnoverManual management with SAML SSO for streamlined access
Multi-department organization using Proof (30+ users)Use Stitchflow: JIT-only provisioning creates access gaps
Enterprise with compliance audit requirementsUse Stitchflow: manual provisioning lacks proper audit trails
High-growth company scaling identity verificationUse Stitchflow: JIT provisioning doesn't handle role changes or deprovisioning

The bottom line

Proof's identity verification platform only supports JIT provisioning through SAML SSO—there's no SCIM capability at all. This means users get created on first login but never get properly deprovisioned, and role changes require manual intervention. For organizations that need proper user lifecycle management and compliance documentation, Stitchflow provides the automation that Proof simply doesn't offer.

Make Proof workflows AI-native

Proof has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No SCIM provisioning - uses JIT provisioning onlyMust be a Proof Command Center customer for SSODomain verification required before SSO setupSAML-based JIT provisioning for user management

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No SCIM provisioning - uses JIT provisioning only
  • Must be a Proof Command Center customer for SSO
  • Domain verification required before SSO setup
  • SAML-based JIT provisioning for user management

Documentation not available.

Unlock SCIM for
Proof

Proof has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Proof logo
Proof
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
ActiveCampaign logo

ActiveCampaign

No SCIM

Marketing Automation / Email

ProvisioningNot Supported
Manual Cost$11,754/yr

ActiveCampaign, the marketing automation platform, does not offer native SCIM provisioning on any plan. While the Enterprise plan ($145+/month) includes SAML 2.0 SSO with just-in-time (JIT) provisioning, this only creates user accounts on first login—there's no automated deprovisioning when employees leave or change roles. New SSO users are automatically added to a generic "SSO Users" group with configurable permissions, but IT teams have no way to programmatically manage user lifecycles or enforce granular access controls based on department or role changes. This creates a significant gap for marketing teams that need to manage access to customer data and campaign tools. When employees leave the company or change departments, their ActiveCampaign access must be manually revoked, creating compliance risks and potential data exposure. The lack of automated deprovisioning means former employees could theoretically retain access to sensitive marketing data and customer information until someone manually removes them from the platform.

View full guide
Adyen logo

Adyen

No SCIM

Payments / Fintech

ProvisioningNot Supported
Manual Cost$11,754/yr

Adyen offers SCIM 2.0 provisioning, but only through Okta's integration—there's no native SCIM endpoint. This creates a significant vendor lock-in scenario where your provisioning capabilities are entirely dependent on using Okta as your identity provider. Teams using Azure Entra, Google Workspace, or OneLogin are left with manual user management despite Adyen supporting SAML SSO with these platforms. The Okta integration itself requires maintaining a company account (not just a merchant account) and keeping at least one non-SSO admin for troubleshooting, adding operational complexity. For payment platforms handling sensitive financial data, this provisioning gap creates serious compliance risks. Your finance team, payment operations staff, and developers need timely access to process transactions and manage risk controls, but without automated provisioning, you're stuck with manual onboarding that can delay critical payment operations. The requirement to maintain non-SSO admin accounts also creates a security backdoor that compliance auditors will flag.

View full guide