Stitchflow
Stripe logo

Stripe SCIM guide

Native SCIM

How to automate Stripe user provisioning, and what it actually costs

Native SCIM requires Enterprise / Custom plan

Summary and recommendation

Stripe supports SCIM 2.0 for automated user provisioning, but only for accounts with SSO enabled—which typically requires a custom enterprise agreement. The SCIM implementation is currently in private preview and limited to basic user lifecycle (create/deactivate), with role management handled separately through SAML attribute statements rather than SCIM groups.

This creates a critical gap for payment teams: while users can be provisioned automatically, their Dashboard permissions must be managed through SAML attributes, and deactivated users aren't immediately locked out due to SAML session limitations. For financial systems handling sensitive payment data, this delay in access revocation poses a real compliance risk—especially problematic given PCI requirements for immediate access control.

The strategic alternative

Stripe gates SCIM behind Enterprise / Custom. Skip the Enterprise / Custom plan upgrade and automate complete outcomes across your stack. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredEnterprise
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Stripe accounts manually. Here's what that costs:

Source: Stitchflow customers using Stripe, normalized to 500 employees:
Orphaned accounts (ex-employees with access)1
Unused licenses3
IT hours spent on manual management/year170 hours
Unused license cost/year$0
IT labor cost/year$10,187
Cost of compliance misses/year$179
Total annual financial impact$10,366

The Stripe pricing problem

Stripe gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Plan Structure

PlanPriceSSOSCIM
Standard2.9% + $0.30 per transaction
EnterpriseCustom pricing

What this means in practice

Enterprise pricing is negotiated case-by-case, but typically involves:

Minimum commitment
Enterprise agreements often require significant transaction volume or annual minimums
Sales process
Custom pricing means lengthy procurement cycles instead of self-service activation
Bundle requirements
SSO/SCIM comes packaged with other enterprise features you may not need

For payment platforms handling sensitive financial data, this creates a difficult choice: pay enterprise rates for proper access controls, or manage Stripe access manually despite PCI compliance requirements.

Additional constraints

Private preview limitation
SCIM is still in private preview with limited functionality - only user provisioning, no groups or role management.
Role management gap
User roles are managed via SAML attributes, not SCIM, creating a split provisioning workflow.
Revocation delays
Due to SAML limitations, Stripe isn't notified of user revocation until their next login attempt - problematic for financial systems requiring immediate access removal.
Manual deletion required
To ensure instant access removal for terminated employees, admins must manually delete users from Stripe Dashboard.

Summary of challenges

  • Stripe supports SCIM but only at Enterprise tier (Custom (SSO/SCIM included))
  • Lower tiers may include SSO but exclude SCIM provisioning
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

Stripe doesn't sell SCIM standalone. It's bundled with Enterprise SSO features and requires a custom agreement:

SCIM automated provisioning (private preview - users only, no groups)
SAML single sign-on (SSO)
JIT user creation for SSO users
Dashboard role assignment via SAML attributes
RSA-SHA256 signature requirements
Custom enterprise support

The catch: Stripe's SCIM is essentially incomplete. Role management happens through SAML attributes, not SCIM attributes. User revocation isn't immediate—Stripe only learns about deactivated users when they attempt to log in again. For instant access removal, you still need to manually delete users from the Dashboard.

If you're already paying for Stripe's enterprise agreement for other reasons, the SSO features are included. But if you just want proper automated provisioning, you're paying enterprise prices for a half-finished SCIM implementation that still requires manual intervention for security-critical deprovisioning.

What IT admins are saying

Community sentiment on Stripe's SCIM implementation reveals frustration with the technical limitations and access control gaps. Common complaints:

  • SCIM being in private preview with limited functionality
  • Role management handled through SAML attributes instead of SCIM groups
  • Delayed user revocation due to SAML dependency (only detected on next login)
  • Manual user deletion required for immediate access removal

The biggest issue is that Stripe isn't notified when a user is revoked in the IdP until they try to log in again. For payment systems, that's a serious compliance gap.

IT Director, Reddit

Having to manage roles through SAML attributes while provisioning through SCIM creates this weird split-brain situation. It's not clean.

DevOps Engineer, Stack Overflow

The recurring theme

Stripe's hybrid approach creates operational complexity and security gaps that are particularly problematic for financial systems requiring immediate access revocation.

The decision

Your SituationRecommendation
Need SCIM but not on EnterpriseUse Stitchflow: avoid the custom enterprise pricing jump
Have enterprise agreement, SCIM includedUse native SCIM: you're already paying for it
Critical payment systems requiring instant deprovisioningUse Stitchflow: we handle immediate revocation unlike SAML's login-dependent delays
Small finance team with low turnoverManual may work: but monitor closely given payment dashboard sensitivity
Need granular role management with provisioningEvaluate both: Stripe's SAML role attributes vs Stitchflow's unified approach

The bottom line

Stripe's SCIM requires enterprise-level agreements and comes with SAML revocation delays that create compliance gaps for payment systems. For teams needing immediate deprovisioning and enterprise-grade automation without custom pricing, Stitchflow delivers the security financial operations demand.

Make Stripe workflows AI-native

Stripe gates SCIM behind Enterprise / Custom. We build complete offboarding, user access reviews, and license workflows without that SCIM Tax upgrade.

No Enterprise / Custom upgrade required
Less than a week, start to finish (~2 hours of your time)
We maintain the integration layer underneath
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Enterprise

Prerequisites

SSO must be configured first

Key limitations

  • Roles managed via SAML attributes, not SCIM
  • SAML limitations mean Stripe isn't notified of IdP user revocation until next login attempt
  • Azure AD has fixed 40-minute provisioning interval
  • RSA-SHA256 signature algorithm required
  • SCIM in private preview - limited to User provisioning (no groups)

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Stripe → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

Okta integration supports SSO, SCIM, entitlements, universal logout, workflows, and ISPM. Group Linking and Schema Discovery available.

Stripe gates SCIM behind Enterprise / Custom. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → Stripe → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

Azure AD SCIM provisioning available. Fixed 40-minute sync interval. Copy SCIM endpoint URL and API key to configure.

Stripe gates SCIM behind Enterprise / Custom. Stitchflow automates complete workflows without that SCIM Tax upgrade.

Unlock SCIM for
Stripe

Stripe gates SCIM behind Enterprise / Custom plan. We automate complete offboarding and access reviews across your stack without that SCIM Tax upgrade.

See how it works
Admin Console
Directory
Applications
Stripe logo
Stripe
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

KnowBe4 logo

KnowBe4

SCIM Tax

Security Awareness Training

SCIM StatusIncluded
Manual Cost$10,564/yr

KnowBe4 supports SCIM across all plans (Silver through Diamond), enabling automatic user provisioning from your IdP to their KSAT console. However, SCIM is strictly one-way sync only—changes made within KnowBe4 never sync back to your identity provider. This creates a problematic data flow where user attributes, group memberships, or account status changes made in KnowBe4 remain isolated, forcing IT teams to maintain dual sources of truth. For security awareness training, this limitation is particularly problematic because compliance tracking requires accurate, centralized user data. When employees complete training, change departments, or have their access modified in KnowBe4, those updates don't flow back to your IdP, creating gaps in your identity governance. SSO alone doesn't solve this—it handles authentication but leaves the provisioning gap that compliance audits will catch.

View full guide
LastPass logo

LastPass

SCIM Tax

Password Management / Security

SCIM Tax+75%
Manual Cost$9,705/yr

LastPass supports SCIM provisioning starting at the Business tier ($7/user/month), with integration support for all major identity providers including Okta, Entra ID, Google Workspace, and OneLogin. However, LastPass SCIM has critical limitations around deprovisioning: when users are removed, their vault access isn't immediately revoked, and shared folder permissions become complex to manage at scale. This creates a significant security gap for IT teams. Password vaults contain the most sensitive credentials in your organization—API keys, service accounts, privileged access passwords. When employees leave or change roles, their access to these credentials must be revoked immediately, not left accessible while IT manually cleans up vault permissions. SSO alone doesn't solve this because it only controls login authentication, not ongoing vault access or shared resource permissions.

View full guide
1Password logo

1Password

SCIM Tax
SCIM StatusIncluded
Manual Cost$11,167/yr

1Password supports SCIM provisioning on its Business plan ($7.99/user/month), but requires deploying and managing the 1Password SCIM Bridge on your own infrastructure. This self-hosted approach means you're responsible for maintaining servers, handling updates, and troubleshooting connectivity issues between your identity provider and 1Password's systems. The SCIM Bridge also operates separately from SSO (which uses OIDC only), requiring you to configure and maintain two distinct integrations. This architecture creates operational overhead that many IT teams don't want to manage. Unlike cloud-native SCIM implementations, you're essentially running 1Password's provisioning infrastructure for them. When the SCIM Bridge goes down, provisioning stops working. When 1Password updates their API, you need to update your Bridge deployment. For teams that just want automated user lifecycle management, this becomes an ongoing maintenance burden.

View full guide