Summary and recommendation
Sophos Central, the cybersecurity platform used for endpoint protection and XDR, does not support native SCIM provisioning. While Sophos offers SSO integration via SAML 2.0 and OIDC with major identity providers, user provisioning is only available through the Sophos Cloud connector in Okta's integration network—leaving organizations using Azure AD, Google Workspace, or OneLogin without automated provisioning options. This creates a significant operational burden for IT teams managing security tools across distributed workforces, where manual account management introduces delays in onboarding and potential security gaps.
For cybersecurity platforms like Sophos, manual provisioning creates compliance risks and operational inefficiencies. Security teams need immediate access to protect endpoints, but without automated provisioning, new employee accounts must be created manually in Sophos Central, potentially leaving devices unprotected during the delay. The SSO-only approach means departing employees may retain access to security dashboards and configurations until manually deprovisioned—a critical security vulnerability in an already sensitive system.
The strategic alternative
Sophos has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | No |
| SSO available? | Yes |
| SSO protocol | SAML 2.0 / OIDC |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | ✓ | ❌ | Sophos Cloud integration in Okta enables authentication and provisioning capabilities. Schema discovery supported. |
| Microsoft Entra ID | ✓ | ❌ | SAML/OIDC SSO supported. No documented SCIM provisioning via Entra. |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages Sophos accounts manually. Here's what that costs:
The Sophos pricing problem
Sophos gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Endpoint Basic | $28/user/year | ||
| Endpoint XDR | $48/user/year | ||
| Endpoint Advanced | $79/user/year | ||
| Mobile | $29.75-$34.40/user/year |
Provisioning options
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Endpoint Basic | $28/user/year | ||
| Endpoint XDR | $48/user/year | ||
| Endpoint Advanced | $79/user/year | ||
| Mobile | $29.75-$34.40/user/year |
All pricing requires 3-year commitments
What this means in practice
Without native SCIM, you're forced into one of two suboptimal approaches:
Option 1: Okta-only provisioning
Option 2: Manual user management
Additional constraints
Summary of challenges
- Sophos does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What Sophos actually offers for identity
SAML/OIDC SSO (All plans)
Sophos Central supports federated authentication with most identity providers:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0 / OIDC |
| Supported IdPs | Okta, Azure AD, Google Workspace, generic SAML/OIDC |
| Configuration | Manual setup via Sophos Central admin console |
| User requirement | Manual account creation required |
Critical gap: Sophos has no native SCIM API. All user accounts must be manually created in Sophos Central before SSO authentication works.
Okta Integration (via OIN)
The official "Sophos Cloud" integration in Okta's catalog provides:
| Feature | Supported? |
|---|---|
| SAML SSO | ✓ Yes |
| Create users | ✓ Yes (via connector) |
| Update users | ✓ Yes (via connector) |
| Deactivate users | ✓ Yes (via connector) |
| Group sync | ✓ Yes |
| Schema discovery | ✓ Yes |
Major limitation: This provisioning capability only works if you use Okta as your IdP. Teams using Azure AD, Google Workspace, or OneLogin have no automated provisioning options.
Azure AD Integration
| Feature | Supported? |
|---|---|
| SAML SSO | ✓ Yes |
| OIDC SSO | ✓ Yes |
| Create users | ❌ No |
| Update users | ❌ No |
| Deactivate users | ❌ No |
Microsoft Entra users get SSO but must still manually manage user lifecycles in the Sophos Central console.
Bottom line: Unless you're locked into Okta, Sophos offers no way to automate user provisioning across your cybersecurity stack. Every new hire, role change, and departure requires manual work in the Sophos console.
What IT admins are saying
Sophos Central's limited provisioning options leave IT teams managing user access manually:
- No native SCIM API forces reliance on third-party connectors
- Provisioning only available through Okta's connector, excluding other IdP users
- SSO setup requires coordination between multiple Sophos products
- Limited documentation makes initial SSO configuration challenging
User accounts must exist in Sophos Central to use single sign-on... SSO does not substitute account creation.
Limited SSO documentation
The recurring theme
IT teams using Azure AD, Google Workspace, or OneLogin have no automated provisioning path. Even Okta users must rely on a specific connector integration, and manual account creation is still required for SSO functionality across Sophos's cybersecurity platform.
The decision
| Your Situation | Recommendation |
|---|---|
| Small security team (<20 users) with Okta | Use Okta's Sophos Cloud connector |
| Enterprise security org (50+ users) | Use Stitchflow: automation essential for scale |
| Multi-IdP environment (Entra, Google, OneLogin) | Use Stitchflow: only option for non-Okta environments |
| Compliance-heavy organization | Use Stitchflow: automation essential for audit trail |
| High-turnover security contractors | Use Stitchflow: automation strongly recommended |
The bottom line
Sophos Central is a robust cybersecurity platform, but provisioning automation only exists through Okta's connector—leaving Entra, Google Workspace, and OneLogin customers with manual user management. For organizations that need automated provisioning across any IdP or want to eliminate the dependency on Okta-specific integrations, Stitchflow provides the automation that Sophos doesn't offer natively.
Make Sophos workflows AI-native
Sophos has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- No native SCIM API
- Provisioning via Okta connector (Sophos Cloud)
- ZTNA requires gateway v1.1+
- SSO setup requires coordination
Documentation not available.
Configuration for Okta
Integration type
Okta Integration Network (OIN) app
Where to enable
Docs
Sophos Cloud integration in Okta enables authentication and provisioning capabilities. Schema discovery supported.
Use Stitchflow for automated provisioning.
Unlock SCIM for
Sophos
Sophos has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.
See how it works


