Stitchflow
SysAid logo

SysAid SCIM guide

Connector Only

How to automate SysAid user provisioning, and what it actually costs

Summary and recommendation

SysAid's SCIM provisioning story is complicated and limited. While the ITSM platform offers SCIM integration through Okta's application network, this requires SysAid's Enterprise plan (custom pricing) plus their SSO Connector add-on. The integration only supports basic user lifecycle operations (create, update, deactivate) but lacks the granular control IT teams need for a help desk system. Most critically, SysAid's SCIM implementation doesn't handle role assignments or group memberships that determine whether users are provisioned as end users, agents, or administrators - these must be configured manually in SysAid after provisioning.

This creates a significant operational gap. Help desk platforms like SysAid require different access levels for different user types, but the SCIM integration can't differentiate between an end user who needs to submit tickets and an IT agent who needs to resolve them. IT teams end up with automated user creation but manual role assignment, defeating much of the purpose of automated provisioning. For organizations using multiple identity providers or those not on Okta, the situation is even worse - Azure AD integration uses a basic Graph API sync that only pulls user data once every 24 hours.

The strategic alternative

SysAid has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaNo SCIM available
Microsoft Entra IDAzure integration pulls user data via Graph API every 24 hours. Not SCIM-based. Requires separate O365 SSO integration for user access.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages SysAid accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The SysAid pricing problem

SysAid gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Help Desk$79/user/month
ITSM$108/user/month
EnterpriseCustom quote
⚠️ Okta only

Pricing and provisioning breakdown

PlanPriceSSOSCIM
Help Desk$79/user/month
ITSM$108/user/month
EnterpriseCustom quote
⚠️ Okta only

What this means in practice

For Enterprise customers: Even at the highest tier, SCIM provisioning is limited to Okta users only. Organizations using Entra ID, Google Workspace, or other IdPs cannot automate user provisioning - they're limited to Azure's 24-hour Graph API sync for user data pulls, not true provisioning.

For lower-tier customers: No automated provisioning options exist. IT teams must manually create, update, and deactivate user accounts in SysAid, creating significant administrative overhead for help desk and ITSM workflows.

Additional constraints

Okta dependency
SCIM provisioning only works through Okta's marketplace integration, excluding other major IdPs
SSO Connector add-on
Even SSO requires purchasing the separate SSO Connector add-on
Azure limitations
Entra ID integration only pulls user data every 24 hours via Graph API - no real-time provisioning or deprovisioning
Multi-tenant complexity
Organizations with multiple domains need custom domain mapping configuration
No JIT alternative
While JIT provisioning is technically supported, it requires the SSO Connector add-on and doesn't handle user deactivation

Summary of challenges

  • SysAid does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

Enterprise Plan Requirements

SysAid gates SCIM provisioning behind their Enterprise tier, which requires custom pricing through their sales team. Here's what you're paying for beyond identity management:

Feature CategoryWhat's Included
ITSM CoreAdvanced workflow engine, custom forms, SLA management
Asset ManagementHardware/software inventory, license tracking
Advanced AnalyticsCustom dashboards, reporting engine
IntegrationsAPI access, third-party connectors
SSO ConnectorSAML 2.0 with Okta, Azure AD (separate add-on)
SCIM ProvisioningUser lifecycle management via Okta only

SCIM Features (Okta Only)

When you do get Enterprise pricing, SysAid's SCIM implementation includes:

✓ Create users automatically
✓ Update user attributes
✓ Deactivate users on offboarding
✓ Schema discovery for custom fields
✓ Group linking for role assignments

Major limitation: SCIM provisioning only works through Okta's integration. Azure AD users get a different integration that pulls data via Microsoft Graph API every 24 hours—not real-time SCIM provisioning.

The Reality Check

Most IT teams evaluating SysAid just need reliable user provisioning for their help desk agents. The Enterprise tier bundles SCIM with advanced ITSM features that 80% of organizations never use—like complex workflow automation, advanced asset tracking, and custom reporting engines.

You're essentially paying enterprise software prices (typically $150+ per agent per month) to get basic identity management capabilities that should be standard.

What IT admins are saying

SysAid's provisioning limitations create ongoing headaches for IT teams managing ITSM deployments:

  • Okta-only SCIM support - No automated provisioning for Azure AD, Google Workspace, or other identity providers
  • Enterprise tier requirement - SCIM provisioning locked behind custom enterprise pricing, not available on standard Help Desk ($79/user/month) or ITSM ($108/user/month) plans
  • SSO Connector add-on complexity - Even basic SSO requires additional licensing and configuration beyond base platform
  • Manual provisioning for most deployments - Without Enterprise + Okta, every user requires manual account creation in SysAid

SSO with Okta, Azure AD via SSO Connector. Multi-tenant support for O365 domains. SCIM provisioning via Okta.

SysAid marketplace documentation

The Azure integration pulls user data via Graph API every 24 hours. Not SCIM-based. Requires separate O365 SSO integration for user access.

Integration requirements

The recurring theme

Unless you're on Enterprise with Okta, SysAid provisioning is entirely manual. Even Azure AD customers get only one-way sync that doesn't handle real-time provisioning or deprovisioning - creating security gaps when employees leave.

The decision

Your SituationRecommendation
Small IT team (<10 agents) with basic help desk needsManual management acceptable with JIT provisioning
Using Okta and want automated provisioningNative SCIM works well through Okta integration
Enterprise with Azure AD/Entra ID as primary IdPUse Stitchflow: native Azure sync is one-way only
Multi-IdP environment or using Google WorkspaceUse Stitchflow: comprehensive IdP support needed
Large ITSM deployment with compliance requirementsUse Stitchflow: automation essential for audit trail

The bottom line

SysAid offers solid SCIM support through Okta, but leaves Azure AD and other IdP users with limited one-way sync options. For organizations that need full bidirectional provisioning across any identity provider, Stitchflow delivers comprehensive automation without the IdP restrictions.

Make SysAid workflows AI-native

SysAid has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

Not specified

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • SSO Connector is add-on
  • Multi-tenant requires domain mapping

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → SysAid → Sign On

Enterprise required for SCIM

Use Stitchflow for automated provisioning.

Unlock SCIM for
SysAid

SysAid has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
SysAid logo
SysAid
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
ActiveCampaign logo

ActiveCampaign

No SCIM

Marketing Automation / Email

ProvisioningNot Supported
Manual Cost$11,754/yr

ActiveCampaign, the marketing automation platform, does not offer native SCIM provisioning on any plan. While the Enterprise plan ($145+/month) includes SAML 2.0 SSO with just-in-time (JIT) provisioning, this only creates user accounts on first login—there's no automated deprovisioning when employees leave or change roles. New SSO users are automatically added to a generic "SSO Users" group with configurable permissions, but IT teams have no way to programmatically manage user lifecycles or enforce granular access controls based on department or role changes. This creates a significant gap for marketing teams that need to manage access to customer data and campaign tools. When employees leave the company or change departments, their ActiveCampaign access must be manually revoked, creating compliance risks and potential data exposure. The lack of automated deprovisioning means former employees could theoretically retain access to sensitive marketing data and customer information until someone manually removes them from the platform.

View full guide
Adyen logo

Adyen

No SCIM

Payments / Fintech

ProvisioningNot Supported
Manual Cost$11,754/yr

Adyen offers SCIM 2.0 provisioning, but only through Okta's integration—there's no native SCIM endpoint. This creates a significant vendor lock-in scenario where your provisioning capabilities are entirely dependent on using Okta as your identity provider. Teams using Azure Entra, Google Workspace, or OneLogin are left with manual user management despite Adyen supporting SAML SSO with these platforms. The Okta integration itself requires maintaining a company account (not just a merchant account) and keeping at least one non-SSO admin for troubleshooting, adding operational complexity. For payment platforms handling sensitive financial data, this provisioning gap creates serious compliance risks. Your finance team, payment operations staff, and developers need timely access to process transactions and manage risk controls, but without automated provisioning, you're stuck with manual onboarding that can delay critical payment operations. The requirement to maintain non-SSO admin accounts also creates a security backdoor that compliance auditors will flag.

View full guide