Summary and recommendation
IBM Targetprocess (Apptio) does not support SCIM provisioning on any plan, including its Enterprise tier with custom pricing. While Targetprocess offers SAML 2.0 SSO integration with identity providers like Okta and Azure AD, this only provides authentication through JIT (Just-In-Time) provisioning—users are automatically created on their first login, but there's no ongoing lifecycle management. This means IT teams lose control over user access: they cannot proactively provision users, manage role assignments, or automatically deprovision users when they leave the organization.
The lack of SCIM creates a significant compliance and security gap. When employees change roles or leave the company, their Targetprocess access remains active until manually removed—a process that often gets overlooked in agile planning tools where access reviews are infrequent. For organizations using Targetprocess to manage sensitive product roadmaps and strategic planning data, this represents a real security risk and makes it difficult to maintain proper access governance across the product and engineering teams who typically use the platform.
The strategic alternative
Targetprocess has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | No |
| SSO available? | Yes |
| SSO protocol | SAML 2.0 |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | ✓ | ❌ | No SCIM available |
| Microsoft Entra ID | ✓ | ❌ | No SCIM available |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages Targetprocess accounts manually. Here's what that costs:
The Targetprocess pricing problem
Targetprocess gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Enterprise | Custom quote (contact IBM/Apptio) |
Provisioning options
| Plan | Pricing | SCIM | SSO |
|---|---|---|---|
| Enterprise | Custom quote (contact IBM/Apptio) | ❌ Not available | ✓ SAML 2.0 with JIT |
What this means in practice
Without SCIM provisioning, IT teams face these operational challenges:
Additional constraints
Summary of challenges
- Targetprocess does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What Targetprocess actually offers for identity
SAML SSO with JIT Provisioning (Enterprise)
IBM Targetprocess supports SAML 2.0 integration but has no SCIM provisioning capabilities:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0 only |
| Supported IdPs | Okta, Azure AD, generic SAML providers |
| User creation | Just-in-Time (JIT) provisioning on first login |
| Configuration | Manual SAML metadata exchange |
| Native login | Disabled when SSO is enabled |
Critical limitation: Users are only created when they first attempt to log in via SSO. There's no way to pre-provision accounts, assign roles, or manage user lifecycle through your identity provider.
Okta Integration (via OIN)
The official Okta Integration Network listing for Targetprocess shows:
| Feature | Supported? |
|---|---|
| SAML SSO | ✓ Yes |
| OIDC SSO | ❌ No |
| Create users | ❌ No |
| Update users | ❌ No |
| Deactivate users | ❌ No |
| Group push | ❌ No |
| Import groups | ❌ No |
Azure AD Integration
Similar limitations apply to Microsoft Entra (Azure AD):
| Feature | Supported? |
|---|---|
| SAML SSO | ✓ Yes |
| User provisioning | ❌ No |
| Automatic deprovisioning | ❌ No |
| Group sync | ❌ No |
The bottom line: Targetprocess only supports basic SAML SSO with JIT user creation. All user management, role assignments, and access revocation must be handled manually within Targetprocess itself. For teams managing dozens or hundreds of users across agile planning workflows, this creates significant administrative overhead.
What IT admins are saying
Targetprocess's lack of SCIM provisioning forces IT teams into manual user management workflows:
- Users must be created manually or wait for JIT provisioning on first login
- No automated deprovisioning when employees leave the organization
- SSO setup disables the native login form, creating access dependencies
- Enterprise-only pricing with custom quotes makes cost planning difficult
SAML 2.0 SSO with JIT provisioning. Creates users on first login. Disables native login when enabled. No SCIM.
Enterprise agile planning (EAP) by IBM/Apptio. Custom pricing only - not published.
The recurring theme
Despite being an IBM enterprise product, Targetprocess relies entirely on JIT provisioning through SAML, leaving IT teams without proactive user lifecycle management or the ability to pre-provision accounts for new team members.
The decision
| Your Situation | Recommendation |
|---|---|
| Small agile teams (<20 users) | Manual user management acceptable with JIT provisioning |
| Growing product organizations (20-50 users) | Use Stitchflow: JIT creates audit gaps and onboarding delays |
| Enterprise with compliance requirements | Use Stitchflow: JIT provisioning fails SOX/audit standards |
| Multi-portfolio organizations | Use Stitchflow: manual user lifecycle management becomes unmanageable |
| High contractor/consultant turnover | Use Stitchflow: JIT can't handle rapid offboarding needs |
The bottom line
IBM Targetprocess offers enterprise-grade agile planning but relies entirely on JIT provisioning—users only get created when they first log in. For organizations that need real provisioning automation and proper user lifecycle management, Stitchflow delivers the SCIM capabilities that Targetprocess simply doesn't provide.
Make Targetprocess workflows AI-native
Targetprocess has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- No SCIM provisioning
- SAML 2.0 only (not OAuth)
- SSO disables native login form
Documentation not available.
Configuration for Okta
Integration type
Okta Integration Network (OIN) app
Where to enable
Docs
Enterprise required for SCIM
Use Stitchflow for automated provisioning.
Unlock SCIM for
Targetprocess
Targetprocess has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.
See how it works


