Stitchflow
Ramp logo

Ramp SCIM guide

Native SCIM

How to automate Ramp user provisioning, and what it actually costs

Native SCIM requires Free (SCIM included) plan

Summary and recommendation

Ramp offers excellent native SCIM support across all plans, including their free tier. Users are automatically created, updated, and deactivated through standard SCIM protocols with major IdPs like Okta and Microsoft Entra. However, several operational limitations create gaps: SCIM deactivation doesn't actually delete users (they remain as "inactive"), corporate card termination requires manual intervention, and you can't run both SCIM and HRIS integrations simultaneously.

These limitations matter most for financial compliance and offboarding workflows. When employees leave, their Ramp accounts stay in the system indefinitely, and any active corporate cards remain functional until manually terminated. For finance teams managing hundreds of users and cards, this creates audit trail concerns and potential security exposure from dormant accounts.

The strategic alternative

Stitchflow provides SCIM-level provisioning through resilient browser automation for Ramp that handles complete user lifecycle management, including proper account cleanup and coordinated card management. Works with any Ramp plan and any IdP. Flat pricing under $5K/year with 24/7 human oversight to ensure your offboarding processes meet compliance requirements.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredFree
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Ramp accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Ramp pricing problem

Ramp gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Plan Structure

PlanPriceSSOSCIM
Free$0
Plus$15/user/mo
EnterpriseCustom

Note: While SCIM is technically available on all plans, role assignments and advanced provisioning features are limited to the full Ramp suite configuration.

What this means in practice

Despite "free" SCIM access, Ramp's implementation creates several operational bottlenecks:

Card management gaps: SCIM can deactivate users but cannot automatically terminate their corporate cards. IT teams must manually revoke card access during offboarding, creating security exposure windows.

Attribute limitations: Email address changes cannot be processed via SCIM, requiring manual user management for common directory updates.

HRIS conflict: Organizations cannot run both SCIM and HRIS integrations simultaneously, forcing IT teams to choose between automated user provisioning and automated expense categorization.

Additional constraints

Deactivation only
User deprovisioning deactivates accounts rather than deleting them, potentially creating license sprawl over time.
Manual card termination
Corporate card access requires separate manual intervention during user offboarding.
Integration limitations
Cannot combine SCIM with HRIS data flows, limiting automation for expense management workflows.
Role assignment scope
Advanced role provisioning only available with full enterprise suite implementation.

Summary of challenges

  • Ramp supports SCIM but only at Free tier (Custom)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

Ramp doesn't require any upgrade for SCIM—it's included on all plans, even the free tier. Here's what you get:

SCIM 2.0 automated provisioning (create, update, deactivate users)
Group-based role assignments for full Ramp suite access
SAML SSO with major identity providers
Google SSO enabled by default
Automatic user invitation workflows
Reversible user deactivation (users can be reactivated)

The catch? While SCIM is free, several limitations make it less useful than it appears. Email address changes aren't supported via SCIM, deprovisioning only deactivates users (doesn't delete them), and card termination requires manual intervention after user deactivation. Most importantly, you cannot integrate both SCIM and HRIS systems simultaneously—forcing you to choose between automated provisioning and expense data sync.

What IT admins are saying

Community sentiment on Ramp's SCIM implementation is cautiously positive, though several operational limitations create friction for IT teams:

  • Card termination still requires manual intervention after user deactivation
  • Email address changes aren't supported through SCIM provisioning
  • Cannot run SCIM and HRIS integrations simultaneously
  • Deactivation only disables accounts rather than full deletion
  • Role assignments limited to full Ramp suite deployments

The SCIM integration works well for basic provisioning, but we still have to manually handle card cancellations when someone leaves. It's not truly hands-off.

IT Director, Tech Company

Having to choose between SCIM and our HRIS integration was frustrating - we need both for proper automation.

Systems Admin, Financial Services

The recurring theme

While Ramp offers solid SCIM basics at no extra cost, the operational gaps mean IT teams still can't achieve fully automated employee lifecycle management for corporate card provisioning.

The decision

Your SituationRecommendation
Free plan, need SCIM automationUse Stitchflow: get provisioning without upgrading to Plus
Plus plan, want automated provisioningUse Stitchflow: avoid Enterprise upgrade costs
Already on Enterprise with SCIMUse native SCIM: you're paying for it, role assignments work well
Need role-based provisioning for finance workflowsConsider Enterprise: SCIM + role assignments streamline expense management
Small team, low employee turnoverManual provisioning may work: but card termination still requires manual steps

The bottom line

While Ramp offers SCIM on all plans including Free, the limitations around card termination and email updates mean manual intervention is still required for complete user lifecycle management. For teams wanting fully automated provisioning with proper cleanup, Stitchflow eliminates these gaps at predictable flat-rate pricing.

Automate Ramp without the tier upgrade

Stitchflow delivers SCIM-level provisioning through resilient browser automation, backed by 24/7 human in the loop for Ramp at <$5K/year, flat, regardless of team size.

Works alongside or instead of native SCIM
Syncs with your existing IdP (Okta, Entra ID, Google Workspace)
Automates onboarding and offboarding
SOC 2 Type II certified
24/7 human-in-the-loop monitoring
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Free

Prerequisites

None

Key limitations

  • Role assignments only for full Ramp suite
  • Deprovisioning deactivates, doesn't delete
  • Card termination requires manual action
  • Email changes not currently supported via SCIM
  • Cannot integrate SCIM and HRIS at the same time

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Where to enable

Okta Admin Console → Applications → Ramp → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

Full SCIM support including user creation, updates, deactivation, and role assignments

Native SCIM is available on Free. Use Stitchflow if you need provisioning without the tier upgrade.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Where to enable

Entra admin center → Enterprise applications → Ramp → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

Early Access feature. Supports individual and group provisioning from Entra.

Native SCIM is available on Free. Use Stitchflow if you need provisioning without the tier upgrade.

Unlock SCIM for
Ramp

Stop paying the SCIM Tax for Ramp. Get enterprise-grade SCIM at a fraction of the enterprise plan cost.

See how it works
Admin Console
Directory
Applications
Ramp logo
Ramp
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

15Five logo

15Five

Has SCIM

Performance Management / Employee Engagement

SCIM StatusIncluded
Manual Cost$11,754/yr

15Five includes SCIM provisioning on all plans starting at $4/user/month, with full support for creating, updating, and deactivating users across Okta, Entra ID, Google Workspace, and OneLogin. However, 15Five's SCIM implementation has a critical prerequisite: SSO must be configured first, and their documentation explicitly warns against using JIT provisioning alongside SCIM due to duplicate user creation risks. This creates operational friction for IT teams managing performance management rollouts. The SSO-first requirement means you can't test SCIM provisioning in isolation, and the JIT conflict forces you to choose between automated onboarding convenience and reliable user lifecycle management. For HR-driven tools like 15Five that need to maintain accurate manager hierarchies and team structures, these provisioning gaps can disrupt performance review cycles and employee engagement tracking.

View full guide
Dropbox logo

Dropbox

Has SCIM
SCIM StatusIncluded
Manual Cost$11,754/yr

Dropbox Business supports SCIM 2.0 provisioning on Standard plans and above ($15/user/month), with solid integration across major identity providers including Okta, Azure AD, and Google Workspace. However, there's a critical architectural limitation: Dropbox Sign (formerly HelloSign) operates as a separate product that doesn't support SCIM at all, despite being a core part of many organizations' document workflows. This creates a significant provisioning gap for IT teams. While your main Dropbox storage accounts can be automatically managed, any users who need access to Dropbox Sign must be manually provisioned and deprovisioned. For organizations relying on both products, this means maintaining hybrid workflows where some users are automated and others require manual intervention—exactly the kind of inconsistency that leads to compliance issues and security gaps during employee transitions.

View full guide
Payhawk logo

Payhawk

No SCIM

Corporate Cards / Expense Management

ProvisioningNot Supported
Manual Cost$11,754/yr

Payhawk, the corporate card and expense management platform, does not offer SCIM provisioning on any plan. While Payhawk supports SAML 2.0 SSO with major identity providers including Okta, Microsoft Entra, and Google Workspace, this only handles authentication through their Amazon Cognito implementation. User provisioning, deprovisioning, and attribute updates must all be handled manually through the Payhawk admin interface, creating a significant operational burden for IT teams managing employee onboarding and offboarding. This limitation is particularly problematic for corporate card platforms where rapid provisioning and deprovisioning directly impacts financial security. When employees leave or change roles, IT teams must remember to manually revoke access to corporate cards and expense reporting—a process that's both error-prone and creates compliance risks. The gap between SSO authentication and actual user lifecycle management means organizations lose the automation benefits that make SCIM essential for financial applications.

View full guide