Stitchflow
Snowflake logo

Snowflake SCIM guide

Native SCIM

How to automate Snowflake user provisioning, and what it actually costs

Native SCIM requires Standard and above plan

Summary and recommendation

Snowflake supports SCIM 2.0 for automated provisioning across all editions (Standard, Enterprise, Business Critical), which is rare among enterprise data platforms. However, Snowflake's SCIM implementation has operational friction that creates ongoing overhead: SCIM tokens expire every 6 months requiring manual renewal, SSO must be configured separately from SCIM, and native Snowflake roles cannot be managed through SCIM provisioning.

For data teams managing warehouse access and database permissions, this creates a hybrid provisioning scenario where users are created automatically but role assignments still require manual intervention. The 6-month token expiration is particularly problematic for IT teams—miss the renewal and provisioning breaks until someone notices users can't access their data warehouses. Additionally, network policies must be configured to allow your IdP's IP addresses, adding complexity for organizations using PrivateLink or restrictive network configurations.

The strategic alternative

Stitchflow provides SCIM-level provisioning through resilient browser automation for Snowflake with automated token renewal, unified SSO + provisioning setup, and intelligent role mapping. Works with any Snowflake edition and consumption-based pricing. Flat pricing under $5K/year with 24/7 human-in-the-loop support.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredCustom
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0, OAuth
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Snowflake accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Snowflake pricing problem

Snowflake gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Standard$2.00/credit
Enterprise$3.00/credit
Business Critical$4.00/credit

Plan Structure (Consumption-Based Pricing)

PlanPriceStorageSCIM
Standard$2.00/credit$23/TB/month
Enterprise$3.00/credit$23/TB/month
Business Critical$4.00/credit$23/TB/month

Note: Credits are consumed based on compute usage. A small warehouse uses ~1 credit/hour, while larger warehouses can consume 128+ credits/hour. Pre-purchased capacity offers 10-30% discounts but requires upfront commitment.

What this means in practice

SCIM access isn't gated by plan tier, but operational costs scale with usage patterns:

ScenarioMonthly ConsumptionStandard CostEnterprise Cost
Light analytics (50 users, 2-4 hrs/day)~200 credits$400$600
Production workloads (24/7 small warehouse)~720 credits$1,440$2,160
Heavy data processing (large warehouses)~5,000+ credits$10,000+$15,000+

Storage costs are additional: A 10TB data warehouse adds $230/month regardless of plan.

Additional constraints

Token expiration
SCIM tokens expire every 6 months, requiring manual rotation that can break provisioning workflows.
SSO separation
SCIM and SSO must be configured independently—SCIM doesn't automatically enable SSO access.
Network policies
Organizations using PrivateLink must configure network policies to allow IdP IP addresses, adding complexity.
Role limitations
SCIM cannot manage built-in Snowflake roles; custom roles must be pre-created before assignment.
Nested groups
Okta's nested group structures don't sync properly via SCIM, requiring flat group hierarchies.

Summary of challenges

  • Snowflake supports SCIM but only at Custom tier ($3.00/credit (on-demand))
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

Snowflake includes SCIM 2.0 provisioning across all editions (Standard, Enterprise, Business Critical), but it's not a simple plug-and-play feature. Here's what you're actually getting:

SCIM 2.0 automated provisioning (users and groups)
SAML 2.0 single sign-on (configured separately from SCIM)
Role-based access control
Network policy management
Warehouse compute access controls
Data governance and security controls
Multi-cluster warehouse scaling (Enterprise+)
Time Travel retention (varies by edition)

The challenge isn't pricing—it's operational complexity. SCIM tokens expire every 6 months requiring manual rotation. Network policies must be configured to allow your IdP's IP addresses. SSO and SCIM are separate configurations that don't automatically work together. You can't manage Snowflake's built-in roles via SCIM, only custom roles created through group sync.

For data teams that just need reliable user provisioning, you're essentially managing a complex identity infrastructure on top of your actual data platform work. Most teams spend more time troubleshooting expired tokens and network policies than they save from automation.

What IT admins are saying

Community sentiment on Snowflake's SCIM implementation is mixed, with frustrations centered around operational complexity rather than pricing. Common complaints:

  • SCIM tokens expiring every 6 months requiring manual renewal
  • SSO and SCIM being separate configurations that must be managed independently
  • Network policy complications, especially with PrivateLink environments
  • Inability to manage native Snowflake roles through SCIM automation

The 6-month token expiration is a pain point - you have to remember to rotate these or provisioning just breaks silently.

Reddit r/dataengineering

SSO works fine but then you realize SCIM is a whole separate beast to configure, and God help you if you're using PrivateLink.

Snowflake Community Forums

The recurring theme

While Snowflake includes SCIM across all editions, the operational overhead of managing token rotations and separate SSO/SCIM configurations creates ongoing maintenance burden for IT teams.

The decision

Your SituationRecommendation
Need SCIM but want to avoid consumption pricing complexityUse Stitchflow: flat $5K/year vs unpredictable credit costs
Can't manage SCIM token renewals every 6 monthsUse Stitchflow: we handle token lifecycle management
Need to sync native Snowflake roles or nested groupsUse Stitchflow: we work around SCIM limitations
Already on Enterprise with dedicated admin resourcesUse native SCIM: you have the credits and expertise
Small data team with minimal user changesManual may work: but watch for data access governance gaps

The bottom line

Snowflake's native SCIM works but comes with operational overhead—6-month token renewals, network policy complexity, and consumption-based pricing uncertainty. For data teams that need reliable provisioning automation without the administrative burden, Stitchflow delivers predictable costs and managed operations.

Automate Snowflake without the tier upgrade

Stitchflow delivers SCIM-level provisioning through resilient browser automation, backed by 24/7 human in the loop for Snowflake at <$5K/year, flat, regardless of team size.

Works alongside or instead of native SCIM
Syncs with your existing IdP (Okta, Entra ID, Google Workspace)
Automates onboarding and offboarding
SOC 2 Type II certified
24/7 human-in-the-loop monitoring
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Custom

Prerequisites

SSO must be configured first

Key limitations

  • SCIM tokens expire after 6 months
  • SCIM does not automatically enable SSO
  • Cannot manage native Snowflake roles via SCIM
  • Network policy required to allow IdP IP addresses
  • Nested groups not supported in Okta SCIM sync

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Snowflake → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

Full SCIM 2.0 support for user and group provisioning. Push Groups creates roles in Snowflake. Supports attribute mapping for Default Role & Warehouse.

Native SCIM is available on Custom. Use Stitchflow if you need provisioning without the tier upgrade.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → Snowflake → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

Full SCIM 2.0 support via Microsoft Entra. Syncs every 40 minutes.

Native SCIM is available on Custom. Use Stitchflow if you need provisioning without the tier upgrade.

Unlock SCIM for
Snowflake

Stop paying the SCIM Tax for Snowflake. Get enterprise-grade SCIM at a fraction of the enterprise plan cost.

See how it works
Admin Console
Directory
Applications
Snowflake logo
Snowflake
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

15Five logo

15Five

Has SCIM

Performance Management / Employee Engagement

SCIM StatusIncluded
Manual Cost$11,754/yr

15Five includes SCIM provisioning on all plans starting at $4/user/month, with full support for creating, updating, and deactivating users across Okta, Entra ID, Google Workspace, and OneLogin. However, 15Five's SCIM implementation has a critical prerequisite: SSO must be configured first, and their documentation explicitly warns against using JIT provisioning alongside SCIM due to duplicate user creation risks. This creates operational friction for IT teams managing performance management rollouts. The SSO-first requirement means you can't test SCIM provisioning in isolation, and the JIT conflict forces you to choose between automated onboarding convenience and reliable user lifecycle management. For HR-driven tools like 15Five that need to maintain accurate manager hierarchies and team structures, these provisioning gaps can disrupt performance review cycles and employee engagement tracking.

View full guide
Dropbox logo

Dropbox

Has SCIM
SCIM StatusIncluded
Manual Cost$11,754/yr

Dropbox Business supports SCIM 2.0 provisioning on Standard plans and above ($15/user/month), with solid integration across major identity providers including Okta, Azure AD, and Google Workspace. However, there's a critical architectural limitation: Dropbox Sign (formerly HelloSign) operates as a separate product that doesn't support SCIM at all, despite being a core part of many organizations' document workflows. This creates a significant provisioning gap for IT teams. While your main Dropbox storage accounts can be automatically managed, any users who need access to Dropbox Sign must be manually provisioned and deprovisioned. For organizations relying on both products, this means maintaining hybrid workflows where some users are automated and others require manual intervention—exactly the kind of inconsistency that leads to compliance issues and security gaps during employee transitions.

View full guide
HiBob logo

HiBob

Has SCIM

HRIS / HR Tech

SCIM StatusIncluded
Manual Cost$11,754/yr

HiBob includes native SCIM support across all plans at no additional cost, with bidirectional sync capabilities for Okta, Entra ID, and other major identity providers. However, HiBob creates a unique challenge: as an HRIS platform, it's typically the authoritative source for employee data, meaning it pushes user information TO your IdP rather than receiving it. This reverses the normal provisioning flow and can create complex sync conflicts when managing users across multiple systems. The bidirectional sync complexity becomes particularly problematic when HiBob and your IdP disagree on employee status, department changes, or termination dates. IT teams often struggle with determining which system should be the ultimate source of truth for different attributes, leading to manual intervention and potential security gaps during employee transitions.

View full guide