Summary and recommendation
Todoist, the popular task management platform, does not offer native SCIM provisioning. While the Business plan ($8/user/month) includes SAML 2.0 SSO with major identity providers like Okta and OneLogin, user provisioning is only available through OneLogin's proprietary connector—meaning organizations using Okta, Entra ID, or Google Workspace cannot automate user lifecycle management. This creates a significant operational bottleneck for IT teams managing Todoist access across distributed teams, especially given that Todoist pricing increased to $10/user/month in December 2025.
The OneLogin-only provisioning creates a problematic vendor lock-in scenario. Organizations already invested in other identity providers face the choice of either switching to OneLogin (adding complexity and cost) or manually managing user provisioning in Todoist. With SSO authentication but no automated deprovisioning, terminated employees retain access to shared projects and sensitive task data until manually removed—a clear security and compliance risk that scales poorly as teams grow.
The strategic alternative
Todoist has no native SCIM. That leaves a workflow gap in offboarding, access reviews, and license cleanup unless your team handles the app another way. Stitchflow builds and maintains the IT workflows your team still runs manually, across every app, including the ones without APIs.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | Yes |
| SSO available? | Yes |
| SSO protocol | SAML 2.0 |
| Documentation | Official docs |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | ✓ | ❌ | Okta OIN integration for SSO. No native SCIM provisioning via Okta. |
| Microsoft Entra ID | ✓ | ❌ | No native Entra provisioning. Microsoft Teams integration available. Use third-party automation (n8n, Zapier) for user sync. |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages Todoist accounts manually. Here's what that costs:
The Todoist pricing problem
Todoist gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Pro | $5/user/mo ($4 annual) | ||
| Business | $8/user/mo ($6 annual) | ⚠️ OneLogin only |
Pricing and provisioning capabilities
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Pro | $5/user/mo ($4 annual) | ||
| Business | $8/user/mo ($6 annual) | ⚠️ OneLogin only |
Note: Pricing increases to $10/user/mo ($8 annual) after December 10, 2025.
What this means in practice
For OneLogin customers: You can provision users automatically through OneLogin's Todoist connector, which handles user creation, updates, and deactivation.
For everyone else: No automated provisioning exists. IT teams must:
Additional constraints
Summary of challenges
- Todoist does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What Todoist actually offers for identity
SAML SSO (Business plan required)
Todoist supports SAML 2.0 integration on their Business plan:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0 |
| Supported IdPs | Okta, OneLogin, Azure AD, custom SAML providers |
| JIT Provisioning | ✓ Yes |
| SP-initiated SSO | ✓ Yes |
| IdP-initiated SSO | ✓ Yes |
| Plan requirement | Business ($8/user/mo, increasing to $10/user/mo Dec 2025) |
SCIM Provisioning (OneLogin only)
Todoist offers limited SCIM provisioning through a OneLogin connector:
| Feature | Supported? |
|---|---|
| Create users | ✓ Yes (via OneLogin) |
| Update user attributes | ✓ Yes (via OneLogin) |
| Deactivate users | ✓ Yes (via OneLogin) |
| Group management | ❌ No |
| Native SCIM API | ❌ No |
Critical limitation: SCIM provisioning is only available through OneLogin's proprietary connector. Organizations using Okta, Azure AD, or Google Workspace cannot provision users automatically.
Okta Integration (via OIN)
The official Okta Integration Network listing for Todoist shows:
| Feature | Supported? |
|---|---|
| SAML SSO | ✓ Yes |
| Create users | ❌ No |
| Update users | ❌ No |
| Deactivate users | ❌ No |
| Group push | ❌ No |
Translation: Okta users get SSO but must rely on JIT provisioning or manual user creation. No automated lifecycle management exists for the majority of enterprise identity providers.
The reality: Most IT teams need SCIM provisioning across multiple IdPs, not just OneLogin. Todoist's connector-based approach leaves Azure AD and Google Workspace users with no automated provisioning options.
What IT admins are saying
Community sentiment on Todoist's provisioning reveals frustration with limited automation options:
- OneLogin dependency - SCIM provisioning only works through OneLogin's connector, leaving Okta and Entra users without automated options
- No native SCIM API - Unlike other productivity tools, Todoist hasn't built direct provisioning capabilities into their platform
- Manual workarounds required - Teams using other IdPs resort to third-party automation tools like n8n or Zapier for basic user sync
- Business plan gate - Even basic SSO requires the $8/user/month Business plan, making automation expensive for smaller teams
SCIM provisioning available via OneLogin connector
No native SCIM provisioning via Okta
Use third-party automation (n8n, Zapier) for user sync
The recurring theme
Todoist's connector-based approach leaves most IT teams managing user lifecycles manually or cobbling together third-party solutions, despite paying premium Business plan pricing.
The decision
| Your Situation | Recommendation |
|---|---|
| Small team (<20 users) with OneLogin | Use OneLogin's SCIM connector directly |
| Teams using Okta, Entra, or Google Workspace | Use Stitchflow: no native SCIM support for these IdPs |
| Organizations with frequent user changes | Use Stitchflow: manual provisioning creates security gaps |
| Enterprise with compliance requirements | Use Stitchflow: automation essential for audit trails |
| Mixed IdP environment or planning to switch | Use Stitchflow: works with any identity provider |
The bottom line
Todoist has no native SCIM. That means one more workflow gap in offboarding, access reviews, and license cleanup unless your team handles it another way.
Close the Todoist workflow gap
Todoist is one gap in a broader workflow. Stitchflow builds and maintains the offboarding, access review, or license workflow across every app in your environment.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Not specifiedPlan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- SCIM via OneLogin (not all IdPs)
- Business plan required for SSO
- No native SCIM - connector-based provisioning
Configuration for Okta
Integration type
Okta Integration Network (OIN) app
Prerequisite
SSO must be configured before enabling SCIM.
Where to enable
Okta OIN integration for SSO. No native SCIM provisioning via Okta.
Use Stitchflow for automated provisioning.
Close the workflow gap in
Todoist
Todoist has no native SCIM. That leaves one more workflow gap in offboarding, access reviews, and license cleanup unless your team handles it another way.
Start with the free gap diagnostic


