Stitchflow
TinyPulse logo

TinyPulse SCIM guide

Connector Only

How to automate TinyPulse user provisioning, and what it actually costs

Summary and recommendation

TinyPulse (now part of WebMD Health Services) does not offer native SCIM provisioning. While the platform supports SAML SSO with major identity providers including Okta, OneLogin, PingFederate, and ADFS, automated user provisioning is only available through OneLogin's connector—leaving Okta, Entra, and Google Workspace admins without provisioning options. This creates a significant gap for IT teams using other identity providers, as they must manually manage user lifecycle events like onboarding new employees or deprovisioning departing staff.

The absence of universal SCIM support means IT teams face ongoing manual overhead and compliance risks. When employees leave the organization, their TinyPulse access must be manually revoked, creating potential security gaps. For growing organizations conducting regular employee engagement surveys, this manual user management becomes increasingly time-consuming and error-prone, especially given TinyPulse's inflexible annual licensing model that makes it difficult to adjust user counts mid-contract.

The strategic alternative

TinyPulse has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationOfficial docs

Supported identity providers

IdPSSOProvisioningNotes
OktaVia APIOkta OIN integration with SWA authentication. Provisioning features include group import and schema discovery.
Microsoft Entra IDSAML SSO supported. No native Entra provisioning documented.
Google WorkspaceSSO only, no provisioning
OneLoginSSO only

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages TinyPulse accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The TinyPulse pricing problem

TinyPulse gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
OneLogin connector✓ Available
Create, update, deactivate users
Okta API provisioning✓ Available
Group import, schema discovery
Native SCIM❌ Not available
N/A
Manual provisioning✓ Always available
Full control

Provisioning options

MethodAvailabilityReliabilityFeatures
OneLogin connector✓ AvailableThird-party dependentCreate, update, deactivate users
Okta API provisioning✓ AvailableThird-party dependentGroup import, schema discovery
Native SCIM❌ Not availableN/AN/A
Manual provisioning✓ Always availableManual overheadFull control

What this means in practice

You're locked into your IdP's implementation quality. If OneLogin's TinyPulse connector has bugs or goes down, your provisioning stops working. There's no fallback to a native SCIM endpoint.

Limited troubleshooting options. When provisioning fails, you're dependent on both TinyPulse and your IdP vendor to diagnose issues. Neither party owns the full integration stack.

IdP switching becomes complex. Moving from OneLogin to another provider means potentially losing automated provisioning capabilities if the new IdP doesn't maintain a TinyPulse connector.

Additional constraints

Enterprise pricing required
Contact-only pricing with known annual lock-in terms
SSO disables password login
Users lose direct login capability once SAML is enabled
Inflexible licensing
Annual commitments regardless of actual usage patterns
Connector maintenance risk
Third-party connectors can be deprecated or become unsupported

Summary of challenges

  • TinyPulse does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What TinyPulse actually offers for identity

SAML SSO (Enterprise plan)

TinyPulse supports SAML 2.0 authentication with multiple identity providers:

SettingDetails
ProtocolSAML 2.0
Supported IdPsOkta, OneLogin, PingFederate, ADFS, custom SAML providers
JIT Provisioning✓ Yes
Login optionsBoth SP-initiated and IdP-initiated
Direct loginDisabled once SSO is enabled

Note: TinyPulse is now part of WebMD Health Services (formerly Limeade), which may affect future integration support.

User Provisioning via OneLogin Only

The only native provisioning option comes through OneLogin's connector:

FeatureSupported?
Create users✓ Yes (OneLogin only)
Update user attributes✓ Yes (OneLogin only)
Deactivate users✓ Yes (OneLogin only)
Group management❌ No
Okta provisioning❌ No native support
Entra provisioning❌ No native support
Google Workspace❌ No native support

Okta Integration (Limited)

The Okta Integration Network listing shows minimal capabilities:

FeatureSupported?
SAML SSO✓ Yes
User provisioning✓ Yes (via API)
Group import✓ Yes
Schema discovery✓ Yes

Despite these features being listed, TinyPulse lacks native SCIM support for most identity providers beyond OneLogin.

The problem: If you're using Okta, Entra, or Google Workspace, you're stuck with JIT provisioning or manual user management. Only OneLogin customers get automated user lifecycle management—leaving most organizations with incomplete provisioning workflows.

What IT admins are saying

Community sentiment on TinyPulse's provisioning centers around inflexible licensing and limited SCIM options:

  • SCIM provisioning only works reliably through OneLogin - other IdPs are left out
  • Annual licensing lock-in regardless of actual usage patterns
  • No direct SCIM API - must rely on third-party IdP connectors
  • SSO disables password-based login entirely, forcing full commitment

TinyPulse is now part of WebMD Health Services (formerly Limeade). Subscription-based pricing. Contact vendor for quote. Known for inflexible licensing - annual lock-in.

Vendor documentation

SCIM via OneLogin (not all IdPs)

Integration limitations noted across multiple sources

The recurring theme

TinyPulse forces IT teams into vendor lock-in with annual commitments while providing SCIM automation only for OneLogin users. Organizations using Okta, Entra, or other IdPs face manual provisioning despite paying enterprise rates.

The decision

Your SituationRecommendation
Small HR team (<20 users) with stable workforceManual management is acceptable
Mid-size company using OneLoginUse OneLogin's TinyPulse connector for basic provisioning
Enterprise using Okta/Entra with complex org structureUse Stitchflow: automation essential for scale
Multi-location company with high turnoverUse Stitchflow: automation strongly recommended
Organization requiring audit complianceUse Stitchflow: automation essential for audit trail

The bottom line

TinyPulse (now WebMD Health Services) offers limited provisioning options—SCIM only works through OneLogin, leaving Okta and Entra users with manual processes. For organizations that need reliable automation across any IdP without vendor lock-in, Stitchflow delivers the consistency that TinyPulse's fragmented approach can't match.

Make TinyPulse workflows AI-native

TinyPulse has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

Not specified

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • SCIM via OneLogin (not all IdPs)
  • SSO disables direct login with password
  • Inflexible licensing - annual lock-in

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → TinyPulse → Sign On

Okta OIN integration with SWA authentication. Provisioning features include group import and schema discovery.

Use Stitchflow for automated provisioning.

Unlock SCIM for
TinyPulse

TinyPulse has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
TinyPulse logo
TinyPulse
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Glint logo

Glint

No SCIM

Employee Engagement / HR

ProvisioningNot Supported
Manual Cost$11,754/yr

Microsoft Viva Glint (formerly Glint) does not support SCIM provisioning at all. Instead, it relies exclusively on Microsoft Entra ID native integration, which only works if your organization uses Microsoft 365 and Entra ID as your primary identity provider. This creates a significant constraint: users must be manually created in both Entra ID and Viva Glint with matching email addresses, and a Microsoft 365 Global Admin must register Viva Glint in your Entra tenant. Organizations using other identity providers like Okta, Google Workspace, or OneLogin are completely locked out of automated provisioning. The Entra ID dependency creates real operational friction even for Microsoft-centric organizations. While SSO authentication works through Entra, the user lifecycle management still requires manual coordination between your identity team and HR administrators. Survey population management and manager hierarchy synchronization—critical for employee engagement platforms—become manual processes that don't scale with organizational changes. For companies using multi-IdP environments or non-Microsoft identity solutions, Viva Glint essentially forces a choice between automated provisioning and your preferred identity architecture.

View full guide
6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
Aha! logo

Aha!

No SCIM

Product Management / Roadmapping

ProvisioningNot Supported
Manual Cost$11,754/yr

Aha! Roadmaps, the product roadmapping platform, does not support SCIM provisioning on any plan. While Aha! offers SAML 2.0 SSO integration with identity providers like Okta, Entra ID, and OneLogin, this only handles authentication through JIT (Just-In-Time) provisioning. The critical limitation: JIT provisioning creates user accounts with no default role or access permissions, requiring administrators to manually configure access for each user after they first sign in. For product teams managing strategic roadmaps and stakeholder access, this creates significant operational overhead. Since product roadmaps contain sensitive strategic information and stakeholder access typically varies by product area, IT administrators must manually assign appropriate roles and workspace permissions after each user is provisioned. There's no automatic deprovisioning when users leave the organization, creating potential security gaps. This manual process becomes particularly problematic for larger product organizations where dozens of stakeholders across different business units need carefully managed access to specific roadmaps.

View full guide