Summary and recommendation
Proof, the identity verification and notarization platform, does not support SCIM provisioning on any plan. While Proof offers SAML 2.0 SSO integration through their Command Center subscription (enterprise tier), this only handles authentication through Just-in-Time (JIT) provisioning. Users are automatically created on first login based on SAML attributes, but there's no automated way to manage user lifecycle events like role changes, group assignments, or offboarding through your identity provider.
This JIT-only approach creates operational gaps for IT teams managing access to sensitive identity verification workflows. When employees change roles or leave the organization, administrators must manually update or remove their Proof access since there's no automated deprovisioning. For a platform handling legal document verification and notarization, this manual process introduces compliance risks and increases the administrative burden on IT teams who need granular control over user access management.
The strategic alternative
Proof has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | No |
| SSO available? | Yes |
| SSO protocol | SAML 2.0 |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | ✓ | ❌ | SAML SSO with JIT provisioning. No Okta catalog app found. |
| Microsoft Entra ID | ✓ | ❌ | SAML SSO with JIT provisioning. No Entra gallery app. |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages Proof accounts manually. Here's what that costs:
The Proof pricing problem
Proof gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Command Center | Contact for pricing |
Provisioning limitations
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Command Center | Contact for pricing |
What this means in practice
Without SCIM, IT teams cannot proactively provision users or manage access at scale:
This JIT-only approach works for small teams but creates friction as organizations scale their identity verification workflows.
Additional constraints
Summary of challenges
- Proof does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What Proof actually offers for identity
SAML SSO with JIT Provisioning (Command Center required)
Proof provides SAML 2.0 single sign-on through their Command Center platform:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0 |
| Supported IdPs | Okta, Azure AD, Google Workspace, Auth0, custom SAML |
| Provisioning method | Just-in-Time (JIT) only |
| User creation | Automatic on first login via SAML attributes |
| Prerequisites | Proof Command Center subscription + domain verification |
Key features:
What's missing
Proof's identity management stops at JIT provisioning:
| Feature | Available? |
|---|---|
| SCIM provisioning | ❌ No |
| Bulk user creation | ❌ No |
| Automated deprovisioning | ❌ No |
| Group synchronization | ❌ No |
| Real-time user updates | ❌ No |
Real-world implications: When employees leave your organization, their Proof access remains active until manual intervention. User attribute changes in your IdP won't sync to Proof automatically. You're limited to whatever user information can be passed through SAML attributes during login.
What IT admins are saying
Proof's JIT-only provisioning model creates ongoing friction for IT teams managing identity verification workflows:
- Users can't be pre-provisioned - they only get created on first login through SAML
- No way to bulk provision legal and compliance teams before go-live
- Command Center subscription required just to enable SSO, adding cost complexity
- Manual cleanup required when users leave - no automated deprovisioning
SSO with JIT provisioning. SAML attributes provision users with roles and org assignments.
Must be a Proof Command Center customer for SSO
The recurring theme
IT admins lose control over user lifecycle management when they can't pre-provision accounts or automate offboarding. JIT provisioning means waiting for users to attempt login before their accounts exist, complicating compliance reporting and access reviews.
The decision
| Your Situation | Recommendation |
|---|---|
| Small legal team (<10 users) with stable staff | Manual management through Command Center is workable |
| Identity verification team with occasional turnover | Manual management with SAML SSO for streamlined access |
| Multi-department organization using Proof (30+ users) | Use Stitchflow: JIT-only provisioning creates access gaps |
| Enterprise with compliance audit requirements | Use Stitchflow: manual provisioning lacks proper audit trails |
| High-growth company scaling identity verification | Use Stitchflow: JIT provisioning doesn't handle role changes or deprovisioning |
The bottom line
Proof's identity verification platform only supports JIT provisioning through SAML SSO—there's no SCIM capability at all. This means users get created on first login but never get properly deprovisioned, and role changes require manual intervention. For organizations that need proper user lifecycle management and compliance documentation, Stitchflow provides the automation that Proof simply doesn't offer.
Make Proof workflows AI-native
Proof has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- No SCIM provisioning - uses JIT provisioning only
- Must be a Proof Command Center customer for SSO
- Domain verification required before SSO setup
- SAML-based JIT provisioning for user management
Documentation not available.
Unlock SCIM for
Proof
Proof has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.
See how it works


