Stitchflow
Training Orchestra logo

Training Orchestra SCIM guide

Connector Only

How to automate Training Orchestra user provisioning, and what it actually costs

Summary and recommendation

Training Orchestra, the instructor-led training (ILT) scheduling and resource management platform, does not offer SCIM provisioning on any plan. The platform focuses primarily on training session coordination, resource booking, and integration with HRIS and LMS systems rather than user lifecycle management. Without native SCIM support, IT teams managing Training Orchestra deployments must manually create, update, and deactivate user accounts across the platform, creating operational overhead that scales poorly as training programs grow.

This limitation is particularly problematic for organizations running large-scale training operations where learners, instructors, and administrators frequently change roles or leave the organization. Manual user management in Training Orchestra creates security risks when departing employees retain access to training resources and scheduling capabilities. The lack of automated provisioning also complicates compliance reporting, as IT teams cannot easily demonstrate proper access governance for training systems.

The strategic alternative

Training Orchestra has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaVia third-partyNo Okta OIN integration found for Training Orchestra.
Microsoft Entra IDVia third-partyNo Microsoft Entra gallery integration found for Training Orchestra.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Training Orchestra accounts manually. Here's what that costs:

Source: Stitchflow research, normalized to 500 employees:
Orphaned accounts (ex-employees with access)5
Unused licenses12
IT hours spent on manual management/year85 hours
Unused license cost/year$3,500
IT labor cost/year$5,100
Cost of compliance misses/year$890
Total annual financial impact$9,490

The Training Orchestra pricing problem

Training Orchestra gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Free Trial$0
Custom PlansStarting ~$560/month

Pricing structure

PlanPriceSCIM
Free Trial$0
Custom PlansStarting ~$560/month

Training Orchestra uses entirely custom pricing based on client requirements, training volume, and integration needs. No standardized plans are publicly available.

What this means in practice

Without SCIM provisioning, IT teams must manually manage user accounts through Training Orchestra's web interface. This creates several operational challenges:

Manual account creation
Every new employee requiring training access needs individual account setup
No automated deprovisioning
Departing employees' accounts remain active unless manually disabled
Group membership gaps
Training cohorts and permissions must be managed separately from your identity provider
Audit trail complexity
User access changes aren't automatically logged or synced with your IdP

Additional constraints

No identity provider integrations
Training Orchestra isn't found in Okta OIN or Microsoft Entra gallery
Limited SSO documentation
No clear SAML or OAuth implementation guidance available
Custom integration complexity
Any automation requires building against Training Orchestra's proprietary APIs
HRIS dependency
Most user data flows through separate HRIS integrations rather than direct identity management
Training-specific workflows
User provisioning often tied to specific course enrollments rather than general access

Summary of challenges

  • Training Orchestra does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Training Orchestra actually offers for identity

Training Orchestra focuses on scheduling and resource management for instructor-led training (ILT) and virtual instructor-led training (vILT). The platform doesn't offer native SCIM provisioning or federated SSO capabilities.

Current Identity Management

Training Orchestra's identity features are limited to basic account management:

FeatureAvailability
User accountsManual creation only
Role-based accessBasic trainer/admin/learner roles
SAML SSO❌ No
OIDC SSO❌ No
SCIM provisioning❌ No
Okta integration❌ No OIN listing
Entra integration❌ No gallery app

Integration Focus

Training Orchestra's integrations target operational workflows, not identity:

HRIS systems
Pull employee data for training assignments
LMS platforms
Sync course completions and certifications
Accounting software
Track training costs and billing
Calendar systems
Manage instructor and room scheduling

The gap: While Training Orchestra excels at training logistics, it lacks the identity infrastructure that enterprise IT teams expect. There's no automated user lifecycle management, no SSO integration, and no way to sync user attributes from your identity provider.

Real-world impact: IT teams must manually create and manage every user account, manually assign roles, and manually deactivate users when they leave the organization. For companies with hundreds of learners and trainers, this creates significant operational overhead.

What IT admins are saying

Training Orchestra's lack of automated provisioning forces IT teams into manual user management workflows:

  • Manual account creation required for every new learner or instructor
  • No automated deprovisioning when employees leave the organization
  • User data must be manually synchronized between HRIS and Training Orchestra
  • Role assignments and permissions require individual configuration

Training Orchestra integrates with your existing HRIS, LMS, and accounting platforms, but user provisioning still requires manual coordination between systems.

Training Orchestra product documentation

For organizations managing hundreds of training participants, the lack of SCIM means constant manual overhead every time staff changes occur.

IT admin on Reddit discussing learning platform challenges

The recurring theme

Without automated provisioning, IT teams must manually create accounts, assign roles, and remember to deprovision users in Training Orchestra separately from their identity management workflows - creating ongoing administrative burden and security risks.

The decision

Your SituationRecommendation
Small training departments (<10 users)Manual management is acceptable
Dedicated training teams with low turnoverManual management may suffice
Large organizations with complex training needs (50+ users)Use Stitchflow: automation essential
Multi-location training operationsUse Stitchflow: automation strongly recommended
Enterprise with compliance and audit requirementsUse Stitchflow: automation essential for proper oversight

The bottom line

Training Orchestra excels at instructor-led training management but offers no identity provisioning capabilities whatsoever. With custom enterprise pricing starting around $560/month and no SCIM support, manual user management becomes a significant operational burden at scale. For organizations that need automated provisioning alongside their training orchestration, Stitchflow delivers the missing piece.

Make Training Orchestra workflows AI-native

Training Orchestra has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

Training scheduling and resource management softwareNo SCIM provisioning documentation foundIntegrates with HRIS, LMS, and accounting platformsFocus is on ILT/vILT session scheduling, not user provisioningCustom pricing based on client needs

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • Training scheduling and resource management software
  • No SCIM provisioning documentation found
  • Integrates with HRIS, LMS, and accounting platforms
  • Focus is on ILT/vILT session scheduling, not user provisioning
  • Custom pricing based on client needs

Documentation not available.

Unlock SCIM for
Training Orchestra

Training Orchestra has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Training Orchestra logo
Training Orchestra
via Stitchflow

Last updated: 2026-01-20

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Abnormal Security logo

Abnormal Security

No SCIM

Security / Email Security

ProvisioningNot Supported
Manual Cost$9,490/yr

Abnormal Security, the AI-powered email security platform protecting against BEC and phishing attacks, does not offer SCIM provisioning on any plan. While the platform supports SAML 2.0 SSO integration with identity providers like Okta and Entra ID, this only handles authentication—not automated user lifecycle management. Security teams must manually provision and deprovision analyst access through Abnormal's portal, creating operational overhead and potential security gaps in a platform specifically designed to protect against email-based threats. This manual provisioning model creates significant challenges for security operations. When new SOC analysts join or existing team members change roles, IT admins must coordinate manual account creation and permission updates in Abnormal Security. For a platform that's critical to threat detection and incident response, delays in provisioning can leave security gaps, while delayed deprovisioning creates compliance risks. The irony is stark: a security platform designed to prevent account takeover and credential abuse lacks the automated provisioning controls that prevent exactly these risks.

View full guide
Airwallex logo

Airwallex

No SCIM
ProvisioningNot Supported
Manual Cost$9,490/yr

Airwallex, the global payments and treasury platform, offers no SCIM provisioning support on any plan, including their custom Accelerate enterprise tier. Despite being positioned for enterprise use with features like multi-entity management and advanced treasury controls, Airwallex lacks any official identity provider integrations—no SSO, no provisioning, and no presence in major IdP galleries like Okta's OIN or Microsoft Entra. This creates a significant operational burden for IT teams managing financial access across growing organizations, where manual user provisioning and deprovisioning in a payments platform presents both efficiency and security risks. The absence of identity management capabilities means IT administrators must manually create, update, and remove user accounts in Airwallex—a particularly concerning gap given that this platform handles sensitive financial operations, cross-border payments, and treasury management. Without automated deprovisioning, former employees could retain access to financial systems, creating compliance risks and potential security vulnerabilities that most finance and IT teams cannot afford to overlook.

View full guide
Alkami logo

Alkami

No SCIM
ProvisioningNot Supported
Manual Cost$9,490/yr

Alkami, the digital banking platform used by banks and credit unions, does not offer SCIM provisioning or public SSO integrations. As an enterprise-only platform with custom pricing, Alkami appears to handle user management through direct account administration rather than standardized identity protocols. This creates significant challenges for financial institutions that need to integrate Alkami with their existing identity infrastructure—particularly problematic given the compliance requirements and security standards that banks must maintain. The lack of automated provisioning means IT teams at financial institutions must manually create, update, and deprovision user accounts in Alkami. For a platform handling sensitive financial data and customer information, this manual approach introduces compliance risks and operational overhead. Banks typically require seamless integration between their core identity systems and all applications accessing customer data.

View full guide