Stitchflow
Reflektive logo

Reflektive SCIM guide

Connector Only

How to automate Reflektive user provisioning, and what it actually costs

Summary and recommendation

Reflektive, the performance management platform now owned by PeopleFluent, does not offer SCIM provisioning capabilities. While the platform supports SAML 2.0 SSO integration with identity providers like Okta and Azure AD, enterprise features including any automated provisioning capabilities are not publicly documented. This forces IT teams to rely on manual user management processes for a platform that typically requires access for all employees during performance review cycles.

The lack of automated provisioning creates significant operational overhead for HR technology deployments. Performance management platforms like Reflektive often see surge usage during quarterly or annual review periods, making manual user onboarding particularly problematic when hundreds or thousands of employees need simultaneous access. Without SCIM, IT teams must coordinate bulk user creation manually while managing role assignments for managers, HR personnel, and individual contributors across different organizational hierarchies.

The strategic alternative

Reflektive has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaSSO only. No SCIM provisioning documented in OIN.
Microsoft Entra IDSSO only. No SCIM provisioning documented.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Reflektive accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Reflektive pricing problem

Reflektive gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
EnterpriseCustom quote

Pricing structure

PlanPricingSCIMSSO
EnterpriseCustom quoteUnknownSAML 2.0

What we know

All pricing is custom/quote-based
SSO and provisioning features aren't publicly documented
Must contact vendor directly for enterprise capabilities
Product has been acquired by PeopleFluent, creating uncertainty

What this means in practice

Without documented SCIM support, you're looking at:

Manual user management
for all employee onboarding/offboarding
No automated role assignments
for performance review cycles
Security gaps
when employees change roles or leave
Unknown costs
until you go through a lengthy sales process

For a performance management platform that touches all employees, this creates significant administrative overhead during review periods when user access needs change rapidly.

Additional constraints

Acquisition uncertainty
Product roadmap unclear post-PeopleFluent acquisition
Limited IdP support
No documented Google Workspace or OneLogin integration
Sales dependency
Can't evaluate provisioning capabilities without vendor engagement
Documentation gaps
No public SCIM API docs to assess technical feasibility

Summary of challenges

  • Reflektive does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Reflektive actually offers for identity

SAML SSO (Enterprise tier)

Reflektive supports SAML 2.0 integration, but with minimal public documentation:

SettingDetails
ProtocolSAML 2.0
Supported IdPsOkta, Azure AD (Entra)
ConfigurationContact vendor for setup details
User requirementUnknown - not publicly documented

Critical gap: Reflektive provides no public documentation for their SSO implementation. IT teams must contact sales to understand basic technical requirements.

Okta Integration (SSO only)

The Okta Integration Network listing for Reflektive shows extremely limited capabilities:

FeatureSupported?
SAML SSO✓ Yes
OIDC SSO❌ No
Create users❌ No
Update users❌ No
Deactivate users❌ No
Group push❌ No

Azure AD (Entra) Integration (SSO only)

Microsoft's documentation shows the same limitation:

FeatureSupported?
SAML SSO✓ Yes
SCIM provisioning❌ No
Automatic provisioning❌ No

Bottom line: Reflektive offers basic SAML SSO but zero provisioning automation. Since the company was acquired by PeopleFluent, it's unclear if SCIM development is even on their roadmap. IT teams need to manually manage all user lifecycle operations.

What IT admins are saying

Reflektive's lack of public documentation around provisioning leaves IT teams in the dark:

  • No publicly available SCIM documentation despite being an enterprise HR platform
  • Must contact sales to understand what provisioning options exist at Enterprise tier
  • Unclear roadmap since PeopleFluent acquisition - will features change or be deprecated?
  • Limited identity provider support compared to other HR tech solutions

SSO/SCIM not publicly documented - Contact vendor for enterprise features.

Multiple integration directories

Performance management platform. Acquired by PeopleFluent.

Okta Integration Network listing

The recurring theme

IT teams can't evaluate Reflektive's provisioning capabilities without engaging sales, and the recent acquisition adds uncertainty about the platform's future direction and feature availability.

The decision

Your SituationRecommendation
Small HR team (<20 users) with low turnoverManual management acceptable; focus on SAML SSO
Performance review seasons with temporary access needsUse Stitchflow: automated provisioning prevents bottlenecks
Multi-department rollouts (managers, HR, employees)Use Stitchflow: automation essential for scale
Enterprise with compliance requirementsUse Stitchflow: audit trail and automated deprovisioning required
PeopleFluent migration or integration planningUse Stitchflow: future-proof against platform changes

The bottom line

Reflektive offers SAML SSO but has no documented SCIM provisioning capabilities, requiring manual user management even at Enterprise tiers. For organizations running performance management at scale or with compliance requirements, Stitchflow provides the automated provisioning that Reflektive simply doesn't offer.

Make Reflektive workflows AI-native

Reflektive has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

SSO/SCIM not publicly documentedContact vendor for enterprise featuresAcquired by PeopleFluent

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • SSO/SCIM not publicly documented
  • Contact vendor for enterprise features
  • Acquired by PeopleFluent

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Where to enable

Okta Admin Console → Applications → Reflektive → Sign On

SSO only. No SCIM provisioning documented in OIN.

Use Stitchflow for automated provisioning.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app

Where to enable

Entra admin center → Enterprise applications → Reflektive → Single sign-on

SSO only. No SCIM provisioning documented.

Use Stitchflow for automated provisioning.

Unlock SCIM for
Reflektive

Reflektive has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Reflektive logo
Reflektive
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
ActiveCampaign logo

ActiveCampaign

No SCIM

Marketing Automation / Email

ProvisioningNot Supported
Manual Cost$11,754/yr

ActiveCampaign, the marketing automation platform, does not offer native SCIM provisioning on any plan. While the Enterprise plan ($145+/month) includes SAML 2.0 SSO with just-in-time (JIT) provisioning, this only creates user accounts on first login—there's no automated deprovisioning when employees leave or change roles. New SSO users are automatically added to a generic "SSO Users" group with configurable permissions, but IT teams have no way to programmatically manage user lifecycles or enforce granular access controls based on department or role changes. This creates a significant gap for marketing teams that need to manage access to customer data and campaign tools. When employees leave the company or change departments, their ActiveCampaign access must be manually revoked, creating compliance risks and potential data exposure. The lack of automated deprovisioning means former employees could theoretically retain access to sensitive marketing data and customer information until someone manually removes them from the platform.

View full guide
Adyen logo

Adyen

No SCIM

Payments / Fintech

ProvisioningNot Supported
Manual Cost$11,754/yr

Adyen offers SCIM 2.0 provisioning, but only through Okta's integration—there's no native SCIM endpoint. This creates a significant vendor lock-in scenario where your provisioning capabilities are entirely dependent on using Okta as your identity provider. Teams using Azure Entra, Google Workspace, or OneLogin are left with manual user management despite Adyen supporting SAML SSO with these platforms. The Okta integration itself requires maintaining a company account (not just a merchant account) and keeping at least one non-SSO admin for troubleshooting, adding operational complexity. For payment platforms handling sensitive financial data, this provisioning gap creates serious compliance risks. Your finance team, payment operations staff, and developers need timely access to process transactions and manage risk controls, but without automated provisioning, you're stuck with manual onboarding that can delay critical payment operations. The requirement to maintain non-SSO admin accounts also creates a security backdoor that compliance auditors will flag.

View full guide