Stitchflow
Spree Commerce logo

Spree Commerce SCIM guide

Connector Only

How to automate Spree Commerce user provisioning, and what it actually costs

Summary and recommendation

Spree Commerce, the open source Ruby on Rails e-commerce platform, does not provide built-in SCIM provisioning or SSO capabilities. As a self-hosted solution, Spree requires custom implementation of all identity and access management features using Rails authentication gems like Devise. This means IT teams must build their own user provisioning workflows from scratch, including integrations with identity providers, user lifecycle management, and compliance controls. For organizations running Spree at scale, this creates significant development overhead and ongoing maintenance burden.

The lack of standardized identity features creates a compliance and security gap. Without automated provisioning, IT teams resort to manual user management or custom scripts that often lack proper audit trails, role synchronization, and deprovisioning workflows. When employees leave or change roles, there's no systematic way to ensure their Spree access is updated accordingly, creating potential data exposure risks in e-commerce environments handling sensitive customer and payment data.

The strategic alternative

Spree Commerce has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolCustom implementation
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaVia third-partyNo pre-built Okta integration. Self-hosted platform - implement custom SAML/OIDC if needed.
Microsoft Entra IDVia third-partyNo pre-built Entra integration. Self-hosted platform - implement custom authentication if needed.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Spree Commerce accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Spree Commerce pricing problem

Spree Commerce gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Open SourceFree (self-hosted)
Enterprise SupportCustom quote

Pricing structure

PlanPriceSCIM
Open SourceFree (self-hosted)❌ Not available
Enterprise SupportCustom quote❌ Not available

What this means in practice

Self-hosted infrastructure requirements

No SaaS identity features
you build everything yourself
Must implement custom authentication using Rails gems like Devise
User provisioning requires custom development work
No pre-built integrations with enterprise identity providers

Development overhead

Ruby on Rails expertise required for identity customization
Custom SAML/OIDC implementation needed for SSO
Manual user management workflows by default
Ongoing maintenance of authentication systems

Additional constraints

No enterprise identity features
Spree focuses on e-commerce functionality, not identity management
Custom implementation required
Every authentication feature must be built and maintained by your team
Platform expertise needed
Requires Ruby on Rails development skills for identity customization
Infrastructure responsibility
Self-hosting means managing servers, security, and uptime yourself
No vendor support for identity
Authentication and provisioning issues fall entirely on your internal team

Summary of challenges

  • Spree Commerce does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Spree Commerce actually offers for identity

Open Source Platform (No Built-in Identity Features)

Spree Commerce is a Ruby on Rails-based e-commerce platform that requires self-hosting:

FeatureStatus
Built-in SSO❌ No
Native SCIM❌ No
User management UI❌ No
Identity provider integrations❌ No
Session managementBasic Rails sessions only

Reality check: Spree is an open-source e-commerce framework, not a SaaS application. It has no built-in identity management beyond basic Rails authentication patterns using gems like Devise.

Custom Implementation Required

Since Spree is self-hosted, you're responsible for implementing:

Authentication system
Integrate SAML/OIDC libraries manually
User provisioning
Build custom APIs for account lifecycle management
Session handling
Configure Rails session management for your deployment
Authorization logic
Implement role-based access controls from scratch

Enterprise Support Options

ProviderWhat's Included
Spree PartnersCustom development services for identity integration
CommunityOpen-source gems and documentation for auth patterns
Self-implementationFull control but complete development responsibility

The core issue: Spree gives you an e-commerce framework, but zero identity infrastructure. Every authentication and provisioning feature requires custom Ruby development, ongoing maintenance, and security expertise that most IT teams don't have in-house.

What IT admins are saying

Spree Commerce's open-source nature means zero built-in identity management, leaving IT teams to build everything from scratch:

  • No native SSO or SCIM support - every authentication feature must be custom-implemented
  • Self-hosted deployment requires managing identity infrastructure alongside the e-commerce platform
  • Ruby on Rails expertise needed to integrate with existing identity providers
  • Complete responsibility for user lifecycle management and security compliance

Open source e-commerce platform (Ruby on Rails). Self-hosted - no built-in SSO/SCIM. Implement authentication/provisioning as needed for your deployment.

Spree Commerce documentation

Self-hosted with no built-in SSO/SCIM - implement as needed using Rails authentication patterns.

Developer community feedback

The recurring theme

Spree Commerce puts the entire burden of identity management on IT teams. Unlike SaaS e-commerce platforms with built-in provisioning, Spree requires significant development resources to achieve basic SSO integration, let alone automated user management.

The decision

Your SituationRecommendation
Small team testing Spree for developmentManual management is acceptable for testing
Self-hosted Spree with basic authentication needsBuild custom SSO using Devise/Omniauth gems
Enterprise e-commerce deployment (50+ users)Use Stitchflow: automation essential for scale
Multi-store setup with complex user rolesUse Stitchflow: automation strongly recommended
Compliance-heavy retail environmentUse Stitchflow: automation essential for audit trail

The bottom line

Spree Commerce is a powerful open-source e-commerce platform, but it's entirely self-hosted with no built-in identity management features. For enterprises running Spree who need automated provisioning without building custom SCIM implementations from scratch, Stitchflow provides the managed automation layer that Spree doesn't offer.

Make Spree Commerce workflows AI-native

Spree Commerce has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

Open source - self-hostedNo built-in SSO/SCIMImplement identity as neededRuby on Rails platform

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • Open source - self-hosted
  • No built-in SSO/SCIM
  • Implement identity as needed
  • Ruby on Rails platform

Documentation not available.

Unlock SCIM for
Spree Commerce

Spree Commerce has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Spree Commerce logo
Spree Commerce
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Magento logo

Magento

No SCIM

E-commerce Platform

ProvisioningNot Supported
Manual Cost$11,754/yr

Adobe Commerce (Magento) does not offer native SCIM provisioning on any plan. While the platform supports SSO through third-party marketplace extensions (like miniOrange SAML SP), these only handle authentication for storefront access. User provisioning must be handled manually through the admin panel or via custom API integrations. Even Adobe's Admin Console—used for managing Adobe product access—only supports SCIM with Azure AD and Google Workspace, leaving Okta and OneLogin users without automated provisioning options. This creates a significant operational gap for IT teams managing e-commerce operations. Without automated provisioning, onboarding new store managers, developers, and customer service staff requires manual account creation in both the identity provider and Magento. When employees leave or change roles, IT must remember to manually deprovision access across both systems. For enterprises running multiple Magento instances or managing seasonal staff fluctuations, this manual process becomes a compliance risk and administrative burden.

View full guide
Medusa logo

Medusa

No SCIM

E-commerce Platform

ProvisioningNot Supported
Manual Cost$11,754/yr

Medusa, the open-source headless commerce platform, does not offer native SCIM provisioning on any plan—including their Cloud Enterprise tier. While Medusa's modular authentication system allows for custom OAuth/OIDC implementations (they even provide an Okta auth module for admin authentication), this only handles login authentication, not automated user lifecycle management. Organizations must manually provision and deprovision admin dashboard users, regardless of whether they're using the free open-source version or paying for Medusa Cloud Enterprise. This creates a significant operational burden for IT teams managing e-commerce operations. Without automated provisioning, every new developer, admin, or contractor requires manual account creation in Medusa's admin dashboard. When team members leave or change roles, IT must remember to manually revoke access—a process that becomes increasingly error-prone as teams scale. For companies building mission-critical e-commerce platforms on Medusa, this manual approach creates both security risks and operational inefficiency.

View full guide
Oracle Commerce logo

Oracle Commerce

No SCIM

E-commerce Platform

ProvisioningNot Supported
Manual Cost$11,754/yr

Oracle Commerce (CX Commerce) does not provide native SCIM provisioning. While the platform supports SAML 2.0 SSO through Oracle Identity Cloud Service (IDCS), SCIM functionality is only available indirectly through Oracle's broader IAM ecosystem, requiring IDCS as an intermediary layer. This architecture creates significant complexity for IT teams managing user provisioning, as you must configure and maintain Oracle's identity infrastructure even if you don't use other Oracle cloud services. The platform's enterprise-grade pricing (starting at $180,000-$300,000 annually) makes this limitation particularly problematic for organizations that need streamlined user lifecycle management. This creates a critical gap for e-commerce teams where Oracle Commerce handles the storefront but user provisioning remains a manual process. Without direct SCIM support, IT admins must manually create, update, and deactivate user accounts for merchants, administrators, and e-commerce team members. The reliance on IDCS as an intermediary adds another layer of complexity and potential failure points, making what should be automated provisioning workflows dependent on Oracle's broader cloud architecture.

View full guide