Stitchflow
Teamwork logo

Teamwork SCIM guide

Connector Only

How to automate Teamwork user provisioning, and what it actually costs

Summary and recommendation

Teamwork, the project management platform, does not offer SCIM provisioning on any plan. While Teamwork supports SAML 2.0 SSO through a paid Advanced Security add-on (which requires contacting security@teamwork.com to configure), this only handles authentication, not user lifecycle management. IT teams must manually create, update, and deprovision user accounts in Teamwork—a significant operational burden for organizations managing projects across multiple teams and external collaborators.

This creates a substantial gap for IT administrators who need to maintain security and compliance standards. Without automated provisioning, there's no way to ensure users are properly onboarded with correct permissions or immediately deprovisioned when they leave the organization. Given that Teamwork is commonly used with external contractors and clients, manual user management becomes both a security risk and an administrative nightmare as project teams scale.

The strategic alternative

Stitchflow provides SCIM-level provisioning through resilient browser automation for Teamwork without requiring any custom development work. Works with any Teamwork plan and integrates with any IdP (Okta, Entra, Google Workspace, OneLogin). Flat pricing under $5K/year, regardless of team size.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaNo SCIM available
Microsoft Entra IDNo SCIM available
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Teamwork accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Teamwork pricing problem

Teamwork gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
SCIM provisioning❌ Not available
SAML SSO + JIT✓ Available
Authentication only
Manual provisioning✓ Available

Provisioning options

MethodAvailabilityCostAutomation
SCIM provisioning❌ Not availableN/ANone
SAML SSO + JIT✓ AvailableAdvanced Security add-onAuthentication only
Manual provisioning✓ AvailableIncludedNone

What this means in practice

Without SCIM, IT teams face several operational challenges:

Manual user lifecycle management: Every new hire, role change, and departure requires manual account creation, permission updates, and deactivation in Teamwork. For a 100-person company with 20% annual turnover, that's 40+ manual provisioning tasks per year.

SSO setup friction: Even basic SAML SSO requires emailing security@teamwork.com and exchanging metadata files. This manual setup process can take days or weeks depending on response times.

No automated group management: Project assignments and permission levels must be managed individually within Teamwork, creating ongoing administrative overhead as teams and projects evolve.

Additional constraints

Paid SSO requirement
SAML SSO requires purchasing the Advanced Security add-on, increasing costs beyond base subscription pricing
Email-based configuration
SSO setup requires contacting security@teamwork.com rather than self-service configuration
No API-based provisioning
Teamwork's API doesn't provide enterprise-grade user provisioning capabilities as an alternative to SCIM
Limited documentation
SCIM capabilities aren't publicly documented, making it unclear if enterprise-level provisioning features exist

Summary of challenges

  • Teamwork does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Teamwork actually offers for identity

SAML SSO (Advanced Security add-on)

Teamwork supports SAML 2.0 authentication as a paid add-on:

SettingDetails
ProtocolSAML 2.0
Supported IdPsOkta, Entra ID, Google Workspace, OneLogin, generic SAML
ConfigurationEmail security@teamwork.com with metadata file
SP-initiated✓ Yes
IdP-initiated✓ Yes
JIT Provisioning✓ Yes

Manual setup required: There's no self-service SSO configuration. You must contact security@teamwork.com and exchange metadata files to enable SAML authentication.

Okta Integration (OIN listing)

The official Okta Integration Network entry for Teamwork shows:

FeatureSupported?
SAML SSO✓ Yes (requires Advanced Security add-on)
Create users❌ No
Update users❌ No
Deactivate users❌ No
Group push❌ No

Microsoft Entra Integration

Entra's app gallery includes Teamwork with these capabilities:

FeatureSupported?
SAML SSO✓ Yes
SCIM provisioning❌ No
Group assignments❌ No

The reality: Teamwork offers basic SAML authentication (as a paid add-on) but zero automated user provisioning. Every user account must be manually created, updated, and deactivated in Teamwork's interface. For project management tools where team membership changes frequently, this creates significant administrative overhead.

What IT admins are saying

Teamwork's lack of automated provisioning forces IT teams into manual user management:

  • No SCIM provisioning documented - all user lifecycle management must be done manually
  • SSO requires contacting security@teamwork.com directly and exchanging metadata files
  • Advanced Security add-on required for SSO adds unexpected costs to implementation
  • JIT provisioning not supported - users must be pre-created before they can log in

SAML SSO requires paid Advanced Security add-on.

Teamwork official documentation

Must contact security@teamwork.com for SSO setup

Teamwork support documentation

The recurring theme

Even basic SSO setup requires direct vendor contact and paid add-ons, while user provisioning remains entirely manual. IT teams must track Teamwork access separately from their identity provider, creating ongoing administrative overhead for what should be automated workflows.

The decision

Your SituationRecommendation
Small project team (<10 users)Manual management is acceptable
Stable team with infrequent role changesUse SSO with Advanced Security add-on for authentication
Growing agency (25+ users)Use Stitchflow: automation essential for client onboarding
Enterprise with compliance requirementsUse Stitchflow: automation essential for audit trail
Multi-client deployments with frequent access changesUse Stitchflow: automation strongly recommended

The bottom line

Teamwork offers solid project management capabilities but leaves identity management in the stone age—no SCIM support and SSO requires emailing their security team. For organizations that need automated user provisioning without the manual overhead of contacting support for every integration, Stitchflow delivers the modern identity automation that Teamwork doesn't provide.

Automate Teamwork without third-party complexity

Stitchflow delivers SCIM-level provisioning through resilient browser automation, backed by 24/7 human in the loop for Teamwork at <$5K/year, flat, regardless of team size.

Works alongside or instead of native SCIM
Syncs with your existing IdP (Okta, Entra ID, Google Workspace)
Automates onboarding and offboarding
SOC 2 Type II certified
24/7 human-in-the-loop monitoring
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

SCIM not publicly documentedMust contact security@teamwork.com for SSO setupRequires metadata file exchange

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • SCIM not publicly documented
  • Must contact security@teamwork.com for SSO setup
  • Requires metadata file exchange

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Where to enable

Okta Admin Console → Applications → Teamwork → Sign On

Enterprise required for SCIM

Use Stitchflow for automated provisioning.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app

Where to enable

Entra admin center → Enterprise applications → Teamwork → Single sign-on

Enterprise required for SCIM

Use Stitchflow for automated provisioning.

Unlock SCIM for
Teamwork

Teamwork doesn't offer SCIM. Get an enterprise-grade SCIM endpoint in your IdP, even without native support.

See how it works
Admin Console
Directory
Applications
Teamwork logo
Teamwork
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Hive logo

Hive

SCIM Tax

Project Management

SCIM StatusIncluded
Manual Cost$11,754/yr

Hive supports SCIM 2.0 provisioning with Okta, but only after purchasing the Enterprise Security Add-on on top of an Enterprise plan. This means teams on Starter ($5/user/month) or Teams ($12/user/month) plans must upgrade to custom Enterprise pricing plus pay for the Security Add-on—potentially increasing costs by 5-10x just to unlock automated user provisioning. Additionally, ADFS users get SSO but no auto-deprovisioning, creating a manual offboarding burden. For project management platforms like Hive where team composition changes frequently, manual user management becomes a significant administrative burden. Teams launch new projects, contractors join temporarily, and employees shift between initiatives—all requiring manual account creation and cleanup. Without automated provisioning, IT teams spend hours managing Hive accounts that should be handled automatically through your identity provider.

View full guide
Nifty logo

Nifty

No SCIM

Project Management

ProvisioningNot Supported
Manual Cost$11,754/yr

Nifty, the project management platform, does not support SCIM provisioning on any plan tier. While Nifty offers SSO integration (Google SSO on Pro plans, Microsoft SSO on Business plans, and custom SAML 2.0 on Enterprise plans), these authentication solutions don't address user lifecycle management. IT teams must manually create, update, and deactivate user accounts across all Nifty workspaces, creating operational overhead that scales poorly as project teams grow and change. This manual provisioning approach creates significant compliance and security risks for organizations managing multiple projects with rotating team members. Without automated deprovisioning, departed employees may retain access to sensitive project data, timelines, and client information. For agencies and consulting firms that frequently onboard and offboard team members based on project needs, the lack of SCIM provisioning turns user management into a time-consuming administrative burden that increases the risk of access control failures.

View full guide
ProofHub logo

ProofHub

No SCIM

Project Management

ProvisioningNot Supported
Manual Cost$11,754/yr

ProofHub, the flat-rate project management platform, does not offer native SCIM provisioning despite supporting SAML 2.0 SSO. While ProofHub integrates with Okta through Group Push and Schema Discovery for some provisioning capabilities, this approach is limited to Okta users and doesn't provide the standardized SCIM protocol that modern IT teams expect. The lack of documented SCIM support means organizations using other identity providers like Entra ID or Google Workspace have no automated provisioning options whatsoever. This creates a significant operational gap for IT teams managing ProofHub access across their organizations. While ProofHub's flat pricing model ($45-89/month for unlimited users) makes it attractive for large teams, the absence of proper provisioning automation means manual user management at scale—exactly when you'd most benefit from automation. Without SCIM, IT teams must manually create, update, and deactivate user accounts in ProofHub, creating security risks when employees leave and compliance headaches for access reviews.

View full guide