Summary and recommendation
Qualtrics does not support SCIM provisioning. While the platform offers SAML 2.0 SSO integration with identity providers like Okta and Microsoft Entra ID, user provisioning relies entirely on Just-in-Time (JIT) provisioning—meaning users are only created when they first log in via SSO. This creates a significant operational gap for IT teams managing access to Qualtrics surveys and research platforms, particularly when employees need accounts provisioned before they attempt to log in, or when managing role assignments and group memberships that determine survey access permissions.
The JIT-only approach means IT admins cannot pre-provision accounts, bulk update user attributes, or systematically deactivate users when they leave the organization. For organizations using Qualtrics across multiple teams—from HR conducting employee surveys to CX teams managing customer feedback—this creates compliance risks and manual overhead. Users may retain access longer than intended, and new employees can't be granted appropriate survey permissions until after their first login attempt.
The strategic alternative
Qualtrics has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | Yes |
| SSO available? | Yes |
| SSO protocol | SAML 2.0 |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | ✓ | ❌ | SSO with JIT provisioning. Okta catalog supports Group Linking and Schema Discovery. Contact Qualtrics support for Brand ID. |
| Microsoft Entra ID | ✓ | ❌ | JIT provisioning enabled by default. Users created on first SSO login. No separate SCIM configuration needed. |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages Qualtrics accounts manually. Here's what that costs:
The Qualtrics pricing problem
Qualtrics gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Customer Experience | Starting $1,500/year | ||
| Employee Experience | Starting $5,000/year | ||
| Enterprise | Custom pricing |
Pricing structure
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Customer Experience | Starting $1,500/year | ||
| Employee Experience | Starting $5,000/year | ||
| Enterprise | Custom pricing |
Key limitation: Even Enterprise customers get JIT provisioning only—no true SCIM automation exists.
What this means in practice
JIT provisioning creates operational friction
Support dependency for basic SSO
Additional constraints
Summary of challenges
- Qualtrics does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What Qualtrics actually offers for identity
SAML SSO with JIT Provisioning (Enterprise plans)
Qualtrics supports SAML 2.0 integration with automatic user creation through Just-In-Time (JIT) provisioning:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0 or Shibboleth 2.0 |
| Supported IdPs | Okta, Entra ID, Google Workspace, CyberArk, generic SAML |
| User creation | JIT provisioning (enabled by default) |
| Initiation | SP-initiated and IdP-initiated SSO |
| Configuration requirement | Must contact Qualtrics support for Brand ID and Datacenter values |
Manual setup required: You cannot self-configure SAML in Qualtrics. Every SSO implementation requires contacting Qualtrics support to enable SAML and obtain your Brand ID and Datacenter values.
Okta Integration (via OIN)
The official Okta catalog integration provides enhanced provisioning capabilities beyond standard JIT:
| Feature | Supported? |
|---|---|
| SAML SSO | ✓ Yes |
| JIT user creation | ✓ Yes |
| Group linking | ✓ Yes |
| Schema discovery | ✓ Yes |
| Real-time deprovisioning | ❌ No |
| Attribute updates | Limited |
Why this falls short: While Okta's integration offers group mapping and schema discovery, it still relies on JIT provisioning. Users are only created when they first attempt to log in, and there's no real-time deprovisioning when users are removed from your IdP.
The core limitation
JIT provisioning creates a fundamental security gap. Deactivated users remain active in Qualtrics until their next login attempt, and there's no automated way to remove access immediately when someone leaves your organization.
What IT admins are saying
Qualtrics's JIT-only provisioning approach creates ongoing friction for IT teams managing user lifecycles:
- Users are automatically created on first login but can't be pre-provisioned or managed centrally
- Deactivating users requires manual intervention in Qualtrics - they don't sync from your IdP
- Must contact Qualtrics support just to enable SAML, adding delays to initial setup
- No way to assign users to specific roles or groups before their first login
Contact support to enable SAML
SAML 2.0 or Shibboleth 2.0. JIT provisioning enabled by default.
The recurring theme
While Qualtrics offers decent SSO integration, the lack of true SCIM means IT teams lose control over user lifecycle management. You can't proactively provision users, assign roles, or ensure proper deprovisioning when employees leave.
The decision
| Your Situation | Recommendation |
|---|---|
| Small survey team (<20 users) | JIT provisioning via SSO is sufficient |
| Research organization with stable team | Manual management with SSO authentication |
| Enterprise with frequent user changes | Use Stitchflow: JIT lacks deprovisioning control |
| Multi-brand Qualtrics deployment | Use Stitchflow: complex Brand ID management |
| Compliance-heavy environment (SOX, HIPAA) | Use Stitchflow: audit trails essential for user lifecycle |
The bottom line
Qualtrics relies on JIT provisioning through SSO, which creates users automatically but provides no automated deprovisioning or attribute management. For enterprises that need proper user lifecycle control and audit compliance, Stitchflow delivers the automation that Qualtrics' native capabilities can't provide.
Make Qualtrics workflows AI-native
Qualtrics has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- Contact support to enable SAML
- Need Brand ID and Datacenter values from support
- Multiple SSO types: Google OAuth, CAS, LDAP, SAML
- Uses JIT provisioning, not SCIM
Documentation not available.
Configuration for Okta
Integration type
Okta Integration Network (OIN) app
Prerequisite
SSO must be configured before enabling SCIM.
Where to enable
Docs
SSO with JIT provisioning. Okta catalog supports Group Linking and Schema Discovery. Contact Qualtrics support for Brand ID.
Use Stitchflow for automated provisioning.
Configuration for Entra ID
Integration type
Microsoft Entra Gallery app
Prerequisite
SSO must be configured before enabling SCIM.
Where to enable
JIT provisioning enabled by default. Users created on first SSO login. No separate SCIM configuration needed.
Use Stitchflow for automated provisioning.
Unlock SCIM for
Qualtrics
Qualtrics has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.
See how it works


