Stitchflow
Segment logo

Segment SCIM guide

Native SCIM

How to automate Segment user provisioning, and what it actually costs

Native SCIM requires Business plan

Summary and recommendation

Segment supports SCIM provisioning, but only on Business tier plans with custom pricing that typically runs $983-3,500/month for 50K MTU. Beyond the pricing barrier, Segment requires SSO to be configured first before enabling SCIM, and workspace owners must handle all configuration manually. JIT provisioning creates read-only members by default, leaving IT teams with incomplete automation for a customer data platform handling sensitive information.

For data teams managing customer data pipelines, this creates a significant access control gap. SSO alone doesn't solve workspace-level permissions for sources and destinations—you need proper SCIM to ensure data engineers get appropriate pipeline access while marketers and analysts get reporting access. Without automated role mapping, IT teams face manual provisioning for every data platform user, creating compliance risks in environments processing customer PII.

The strategic alternative

Segment gates SCIM behind Business. Skip the Business plan upgrade and automate complete outcomes across your stack. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredBusiness
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Segment accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Segment pricing problem

Segment gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Plan Structure

PlanPriceSSOSCIM
Free$0
Team$120/mo (10K MTU)
Business~$983-3,500/mo (50K MTU)
EnterpriseCustom

Note: Business tier pricing is negotiated based on Monthly Tracked Users (MTU) volume, with typical discounts of 72-80% off list prices. SCIM requires SSO to be configured first.

What this means in practice

The jump from Team to Business represents an 8-29x price increase, depending on negotiated rates:

Current Team PlanBusiness Upgrade (Low End)Business Upgrade (High End)
$120/mo+$863/mo (+$10,356/year)+$3,380/mo (+$40,560/year)

This pricing gap creates a significant barrier for mid-market companies that need SCIM but don't require the advanced analytics and governance features bundled in Business tier.

Additional constraints

SSO prerequisite
You must configure SAML SSO before enabling SCIM provisioning.
Owner-only configuration
Only workspace owners can set up SSO and SCIM connections.
JIT limitations
Just-in-time provisioning creates read-only members by default, requiring SCIM for proper role assignment.
Volume commitment
Business tier includes 50K MTU minimum, forcing many teams to pay for capacity they don't need.

Summary of challenges

  • Segment supports SCIM but only at Business tier (Custom)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

Segment doesn't sell SCIM separately. It's bundled with Business tier and higher, which includes:

SCIM 2.0 automated provisioning
SAML single sign-on (SSO) - required before SCIM setup
Advanced workspace permissions and role management
Enhanced security controls and audit logging
Priority support and onboarding
Advanced data governance features
Custom integrations and enterprise connectors

The catch: SSO must be configured first before you can even set up SCIM. This means you're locked into both features whether you need SSO or not.

Stitchflow Insight

If you're already paying for Business tier for Segment's advanced CDP features, adding SCIM is straightforward. But if you're on the Team plan ($120/month) and only need user provisioning, you're looking at a ~8-30x price jump to custom Business pricing just to automate user management. We estimate ~60% of Business tier features are irrelevant for teams that simply want automated provisioning without the full enterprise identity stack.

What IT admins are saying

Community sentiment on Segment's SCIM implementation centers on the prerequisite requirements and tier restrictions. Common complaints:

  • Business tier requirement creating significant cost barriers for smaller data teams
  • SSO connection must be configured before SCIM can be enabled
  • Only workspace owners can set up SSO/SCIM, creating bottlenecks
  • JIT provisioning defaults to read-only access, requiring manual role adjustments

Having to set up SSO first just to get SCIM working adds unnecessary complexity - especially when you're just trying to automate user provisioning.

Reddit DevOps Community

The Business tier pricing jump is brutal when all you need is basic user provisioning for your data pipeline team.

Hacker News

The recurring theme

Segment treats SCIM as an enterprise add-on rather than a standard identity management feature, forcing teams into expensive tiers and complex prerequisite configurations for basic automation.

The decision

Your SituationRecommendation
On Team plan ($120/mo), need SCIMUse Stitchflow: avoid the Business tier jump to ~$983-3,500/mo
On Business tier but SSO/SCIM setup seems complexUse Stitchflow: skip the SSO prerequisite and workspace owner requirements
Already on Business tier with SSO configuredUse native SCIM: you're paying for it and have the prerequisites
Need advanced Segment features beyond SCIMConsider Business tier: SCIM comes bundled with other capabilities
Small data team, infrequent access changesManual may work: but monitor customer data access carefully

The bottom line

Segment gates SCIM behind Business. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Make Segment workflows AI-native

Segment gates SCIM behind Business. We build complete offboarding, user access reviews, and license workflows without that SCIM Tax upgrade.

No Business upgrade required
Less than a week, start to finish (~2 hours of your time)
We maintain the integration layer underneath
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Business

Prerequisites

SSO must be configured first

Key limitations

  • Business tier required
  • SSO connection must be created before SCIM
  • Only workspace owners can configure SSO/SCIM
  • JIT creates minimal-access (read-only) members by default

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Segment → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

Business required for SCIM

Segment gates SCIM behind Business. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → Segment → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

Business required for SCIM

Segment gates SCIM behind Business. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Unlock SCIM for
Segment

Segment gates SCIM behind Business plan. We automate complete offboarding and access reviews across your stack without that SCIM Tax upgrade.

See how it works
Admin Console
Directory
Applications
Segment logo
Segment
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

mParticle logo

mParticle

No SCIM

Customer Data Platform

ProvisioningNot Supported
Manual Cost$11,754/yr

mParticle, the customer data platform serving marketing and data teams, does not support SCIM provisioning on any plan. While mParticle offers SAML 2.0 SSO integration with major identity providers including Okta, Azure AD, and OneLogin, this only handles authentication through SP-initiated login. The platform requires Organization Admin privileges for SSO setup and doesn't support IdP-initiated login, forcing users to access mParticle directly rather than through their identity provider dashboard. This creates a significant operational gap for IT teams managing data platforms. With mParticle's value-based pricing averaging $156,000+ annually and serving critical marketing and analytics functions, manual user provisioning becomes a bottleneck for teams that need rapid access to customer data insights. The lack of automated lifecycle management means IT admins must manually create, update, and remove user accounts across what is often a high-stakes environment where data access controls are essential for compliance.

View full guide
Amplitude logo

Amplitude

SCIM Tax

Product Analytics

SCIM StatusIncluded
Manual Cost$11,754/yr

Amplitude supports SCIM provisioning, but only on Growth plans (starting around $36K/year) or Enterprise plans with custom pricing. While Amplitude's SCIM implementation covers the core functionality—creating, updating, and deactivating users—it requires SCIM to be specifically enabled for your organization, and regenerating the SCIM key immediately invalidates existing integrations without warning. For product teams on Plus plans ($49/month), upgrading to Growth just to unlock SCIM means jumping from under $600/year to $36,000+/year—a 60x increase. That's often more than the entire analytics budget for smaller product teams. The gap becomes particularly problematic for cross-functional product teams where analysts, PMs, and engineers need varying levels of access to user behavior data, but manual provisioning creates security risks around sensitive analytics permissions.

View full guide
Bill.com logo

Bill.com

SCIM Tax

Accounts Payable / Receivable Automation

SCIM StatusIncluded
Manual Cost$11,754/yr

Bill.com offers inconsistent SCIM provisioning support that varies dramatically by identity provider. While Okta users can access SCIM provisioning through the OIN integration, Bill.com doesn't publish native SCIM documentation, and other IdPs like Entra ID are limited to SAML SSO only. This fragmented approach means your provisioning capabilities depend entirely on your IdP choice rather than Bill.com's platform features. For finance teams managing sensitive AP/AR workflows where user access directly impacts invoice approvals and payment processing, this inconsistency creates operational gaps—especially when onboarding new controllers, AP clerks, or accountants requires manual role assignment tied to spending limits and approval hierarchies. The real problem is that Bill.com gates all SSO functionality behind Enterprise plans with custom pricing (typically 2-3x their Corporate plan at $79/user/month), yet still provides no clear path to automated provisioning for most customers. Since financial systems require precise role-based access controls for SOX compliance and segregation of duties, manual user management creates both security risks and administrative overhead. When employees change departments or leave the company, orphaned accounts in payment systems pose significant financial and compliance risks that manual processes often miss.

View full guide