Summary and recommendation
Teamwork, the project management platform, does not offer SCIM provisioning on any plan. While Teamwork supports SAML 2.0 SSO through a paid Advanced Security add-on (which requires contacting security@teamwork.com to configure), this only handles authentication, not user lifecycle management. IT teams must manually create, update, and deprovision user accounts in Teamwork—a significant operational burden for organizations managing projects across multiple teams and external collaborators.
This creates a substantial gap for IT administrators who need to maintain security and compliance standards. Without automated provisioning, there's no way to ensure users are properly onboarded with correct permissions or immediately deprovisioned when they leave the organization. Given that Teamwork is commonly used with external contractors and clients, manual user management becomes both a security risk and an administrative nightmare as project teams scale.
The strategic alternative
Stitchflow provides SCIM-level provisioning through resilient browser automation for Teamwork without requiring any custom development work. Works with any Teamwork plan and integrates with any IdP (Okta, Entra, Google Workspace, OneLogin). Flat pricing under $5K/year, regardless of team size.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | No |
| SSO available? | Yes |
| SSO protocol | SAML 2.0 |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | ✓ | ❌ | No SCIM available |
| Microsoft Entra ID | ✓ | ❌ | No SCIM available |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages Teamwork accounts manually. Here's what that costs:
The Teamwork pricing problem
Teamwork gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| SCIM provisioning | ❌ Not available | ||
| SAML SSO + JIT | ✓ Available | Authentication only | |
| Manual provisioning | ✓ Available |
Provisioning options
| Method | Availability | Cost | Automation |
|---|---|---|---|
| SCIM provisioning | ❌ Not available | N/A | None |
| SAML SSO + JIT | ✓ Available | Advanced Security add-on | Authentication only |
| Manual provisioning | ✓ Available | Included | None |
What this means in practice
Without SCIM, IT teams face several operational challenges:
Manual user lifecycle management: Every new hire, role change, and departure requires manual account creation, permission updates, and deactivation in Teamwork. For a 100-person company with 20% annual turnover, that's 40+ manual provisioning tasks per year.
SSO setup friction: Even basic SAML SSO requires emailing security@teamwork.com and exchanging metadata files. This manual setup process can take days or weeks depending on response times.
No automated group management: Project assignments and permission levels must be managed individually within Teamwork, creating ongoing administrative overhead as teams and projects evolve.
Additional constraints
Summary of challenges
- Teamwork does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What Teamwork actually offers for identity
SAML SSO (Advanced Security add-on)
Teamwork supports SAML 2.0 authentication as a paid add-on:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0 |
| Supported IdPs | Okta, Entra ID, Google Workspace, OneLogin, generic SAML |
| Configuration | Email security@teamwork.com with metadata file |
| SP-initiated | ✓ Yes |
| IdP-initiated | ✓ Yes |
| JIT Provisioning | ✓ Yes |
Manual setup required: There's no self-service SSO configuration. You must contact security@teamwork.com and exchange metadata files to enable SAML authentication.
Okta Integration (OIN listing)
The official Okta Integration Network entry for Teamwork shows:
| Feature | Supported? |
|---|---|
| SAML SSO | ✓ Yes (requires Advanced Security add-on) |
| Create users | ❌ No |
| Update users | ❌ No |
| Deactivate users | ❌ No |
| Group push | ❌ No |
Microsoft Entra Integration
Entra's app gallery includes Teamwork with these capabilities:
| Feature | Supported? |
|---|---|
| SAML SSO | ✓ Yes |
| SCIM provisioning | ❌ No |
| Group assignments | ❌ No |
The reality: Teamwork offers basic SAML authentication (as a paid add-on) but zero automated user provisioning. Every user account must be manually created, updated, and deactivated in Teamwork's interface. For project management tools where team membership changes frequently, this creates significant administrative overhead.
What IT admins are saying
Teamwork's lack of automated provisioning forces IT teams into manual user management:
- No SCIM provisioning documented - all user lifecycle management must be done manually
- SSO requires contacting security@teamwork.com directly and exchanging metadata files
- Advanced Security add-on required for SSO adds unexpected costs to implementation
- JIT provisioning not supported - users must be pre-created before they can log in
SAML SSO requires paid Advanced Security add-on.
Must contact security@teamwork.com for SSO setup
The recurring theme
Even basic SSO setup requires direct vendor contact and paid add-ons, while user provisioning remains entirely manual. IT teams must track Teamwork access separately from their identity provider, creating ongoing administrative overhead for what should be automated workflows.
The decision
| Your Situation | Recommendation |
|---|---|
| Small project team (<10 users) | Manual management is acceptable |
| Stable team with infrequent role changes | Use SSO with Advanced Security add-on for authentication |
| Growing agency (25+ users) | Use Stitchflow: automation essential for client onboarding |
| Enterprise with compliance requirements | Use Stitchflow: automation essential for audit trail |
| Multi-client deployments with frequent access changes | Use Stitchflow: automation strongly recommended |
The bottom line
Teamwork offers solid project management capabilities but leaves identity management in the stone age—no SCIM support and SSO requires emailing their security team. For organizations that need automated user provisioning without the manual overhead of contacting support for every integration, Stitchflow delivers the modern identity automation that Teamwork doesn't provide.
Automate Teamwork without third-party complexity
Stitchflow delivers SCIM-level provisioning through resilient browser automation, backed by 24/7 human in the loop for Teamwork at <$5K/year, flat, regardless of team size.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- SCIM not publicly documented
- Must contact security@teamwork.com for SSO setup
- Requires metadata file exchange
Documentation not available.
Configuration for Okta
Integration type
Okta Integration Network (OIN) app
Where to enable
Docs
Enterprise required for SCIM
Use Stitchflow for automated provisioning.
Configuration for Entra ID
Integration type
Microsoft Entra Gallery app
Where to enable
Enterprise required for SCIM
Use Stitchflow for automated provisioning.
Unlock SCIM for
Teamwork
Teamwork doesn't offer SCIM. Get an enterprise-grade SCIM endpoint in your IdP, even without native support.
See how it works


