Stitchflow
Proofpoint logo

Proofpoint SCIM guide

Connector Only

How to automate Proofpoint user provisioning, and what it actually costs

Summary and recommendation

Proofpoint, the email security and cybersecurity platform, does not offer documented SCIM provisioning across its product suite. While Proofpoint supports SAML 2.0 SSO with all major identity providers and offers JIT (Just-in-Time) provisioning on Security Awareness Training, the company's multiple products require separate SSO configurations and lack clear SCIM documentation. This creates a fragmented provisioning experience where IT teams must manually manage user accounts across Proofpoint Essentials, TAP (Targeted Attack Protection), and other security products.

The lack of unified SCIM support becomes particularly problematic for enterprise customers paying $25-$70 per user annually for bundled plans or $100k+ for large deployments. Without automated provisioning, IT teams face manual overhead managing user lifecycles across multiple Proofpoint products, creating security gaps when employees change roles or leave the organization. JIT provisioning only works for initial login and doesn't handle deprovisioning or attribute updates.

The strategic alternative

Proofpoint has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaMultiple Proofpoint apps in Okta catalog. Security Awareness Training supports provisioning. Group Linking and Schema Discovery available.
Microsoft Entra IDAzure AD sync for Essentials. JIT provisioning on Security Awareness Training. Proofpoint on Demand supports Entra SSO.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Proofpoint accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Proofpoint pricing problem

Proofpoint gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Essentials$2-$5/user/month
TAP$20-$35/user/year
Enterprise$25-$70/user/year bundles

Pricing and provisioning options

PlanPriceSSOSCIM
Essentials$2-$5/user/month
TAP$20-$35/user/year
Enterprise$25-$70/user/year bundles

Enterprise pricing reality

Large deployments
$100,000+ annually
Multiple products require separate SSO configurations
No unified user management across the Proofpoint suite

What this means in practice

Without SCIM, IT admins face different provisioning challenges depending on which Proofpoint products they use:

Security Awareness Training
JIT provisioning available, but only creates accounts on first login
Email Security/TAP
Manual user creation required before SSO access
Enterprise bundles
Each product may need separate user management workflows

The lack of automated deprovisioning means terminated employees retain access until manually removed from each Proofpoint product individually.

Additional constraints

Product fragmentation
Multiple Proofpoint apps in identity provider catalogs require separate integrations
Documentation gaps
SCIM capabilities not clearly documented, requiring vendor consultation
Support dependency
SSO setup may require Proofpoint support team involvement
Sync limitations
Azure AD sync available for Essentials but doesn't extend to full product suite
No unified dashboard
User lifecycle management must be handled per-product rather than centrally

Summary of challenges

  • Proofpoint does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Proofpoint actually offers for identity

SAML SSO (All Products)

Proofpoint supports SAML 2.0 federation across its security platform:

SettingDetails
ProtocolSAML 2.0
Supported IdPsOkta, Entra ID, Google Workspace, OneLogin, any SAML 2.0 provider
IdP SupportMultiple IdPs per organization
InitiationBoth SP-initiated and IdP-initiated
ConfigurationPer-product setup required

Key limitation: Each Proofpoint product (Email Protection, Security Awareness Training, TAP, etc.) requires separate SSO configuration. There's no unified identity setup across the platform.

Limited Provisioning Options

Proofpoint's provisioning capabilities vary by product:

ProductProvisioning MethodUser Management
Security Awareness TrainingJIT provisioningCreate on first login
Email Protection EssentialsAzure AD SyncAutomated sync from Entra ID
Other productsManual onlyNo documented automation

What's Missing

No documented SCIM support across any Proofpoint product
No unified provisioning each product handles users separately
Manual deprovisioning for most products
Limited attribute mapping beyond basic user fields
No group synchronization for role-based access

Bottom line: While Proofpoint offers SSO, the lack of standardized SCIM provisioning means IT teams face manual user management across multiple security products, each with different provisioning capabilities.

What IT admins are saying

Community sentiment on Proofpoint's provisioning setup reveals frustration with the platform's fragmented approach across multiple products:

  • Multiple Proofpoint products require separate SSO configurations, creating administrative overhead
  • SCIM provisioning capabilities aren't clearly documented or consistently available across products
  • SSO setup often requires engaging Proofpoint support team rather than self-service configuration
  • Azure AD sync is available for Essentials but provisioning features vary significantly between product lines

User accounts must exist in Proofpoint Dash to use single sign-on... SSO does not substitute account creation.

Proofpoint documentation pattern across multiple products

Multiple IdPs per org supported, but each product may need separate configuration.

Implementation reality from Proofpoint's complex product portfolio

The recurring theme

Proofpoint's multi-product architecture creates a provisioning maze where IT teams must manage separate configurations for Security Awareness Training, Threat Response, and other modules - with inconsistent automation capabilities across the suite.

The decision

Your SituationRecommendation
Single Proofpoint product, stable teamManual management with SSO acceptable
Multiple Proofpoint products (Email Security + TAP + Training)Use Stitchflow: separate configs create complexity
Growing security team with frequent onboardingUse Stitchflow: JIT only covers training module
Enterprise with compliance requirementsUse Stitchflow: audit trail essential for security tools
Budget-conscious with basic email security needsManual management, but plan for Stitchflow as you scale

The bottom line

Proofpoint's multi-product architecture creates provisioning headaches—each solution requires separate SSO configuration and SCIM support isn't documented. For organizations using multiple Proofpoint products or needing reliable automation for their security stack, Stitchflow eliminates the complexity of managing separate integrations.

Make Proofpoint workflows AI-native

Proofpoint has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

Multiple products with separate SSO configsSCIM not clearly documentedJIT available on some productsSSO setup may require support team

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • Multiple products with separate SSO configs
  • SCIM not clearly documented
  • JIT available on some products
  • SSO setup may require support team

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Where to enable

Okta Admin Console → Applications → Proofpoint → Sign On

Multiple Proofpoint apps in Okta catalog. Security Awareness Training supports provisioning. Group Linking and Schema Discovery available.

Use Stitchflow for automated provisioning.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app

Where to enable

Entra admin center → Enterprise applications → Proofpoint → Single sign-on

Azure AD sync for Essentials. JIT provisioning on Security Awareness Training. Proofpoint on Demand supports Entra SSO.

Use Stitchflow for automated provisioning.

Unlock SCIM for
Proofpoint

Proofpoint has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Proofpoint logo
Proofpoint
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
Aha! logo

Aha!

No SCIM

Product Management / Roadmapping

ProvisioningNot Supported
Manual Cost$11,754/yr

Aha! Roadmaps, the product roadmapping platform, does not support SCIM provisioning on any plan. While Aha! offers SAML 2.0 SSO integration with identity providers like Okta, Entra ID, and OneLogin, this only handles authentication through JIT (Just-In-Time) provisioning. The critical limitation: JIT provisioning creates user accounts with no default role or access permissions, requiring administrators to manually configure access for each user after they first sign in. For product teams managing strategic roadmaps and stakeholder access, this creates significant operational overhead. Since product roadmaps contain sensitive strategic information and stakeholder access typically varies by product area, IT administrators must manually assign appropriate roles and workspace permissions after each user is provisioned. There's no automatic deprovisioning when users leave the organization, creating potential security gaps. This manual process becomes particularly problematic for larger product organizations where dozens of stakeholders across different business units need carefully managed access to specific roadmaps.

View full guide
Appcues logo

Appcues

No SCIM

Product Adoption / User Onboarding

ProvisioningNot Supported
Manual Cost$11,754/yr

Appcues, the product adoption platform used by product managers and growth teams, explicitly does not support SCIM provisioning on any plan—not even Enterprise. While Appcues offers SAML 2.0 SSO integration starting at the Enterprise tier with just-in-time (JIT) provisioning, this only creates users during first login and provides no automated deprovisioning capabilities. For product teams where access needs change frequently as people move between projects or leave the company, this creates a significant security gap. The lack of SCIM means IT teams must manually manage user lifecycle for Appcues accounts, even though the platform handles sensitive product analytics and user flow data. When employees leave or change roles, their Appcues access remains active until manually revoked—a compliance risk that's particularly problematic given Appcues' role in tracking user behavior and product metrics. With MAU-based pricing starting at $300/month and scaling significantly with usage, paying for orphaned accounts also creates unnecessary cost bloat.

View full guide