Stitchflow
Vidyard logo

Vidyard SCIM guide

Connector Only

How to automate Vidyard user provisioning, and what it actually costs

Summary and recommendation

Vidyard, the video marketing platform used by sales and marketing teams, does not offer native SCIM provisioning on any plan. While Vidyard provides SAML SSO integration with Enterprise plans (~$1,316/user/year for 100+ users), this only handles authentication through Just-in-Time (JIT) provisioning. Users are automatically created on first login, but there's no way to programmatically manage user attributes, deactivate accounts, or handle group assignments beyond basic team mapping via SAML attributes. This creates a significant gap for IT teams managing video platforms where sales users frequently join, change roles, or leave the organization.

The JIT-only approach becomes particularly problematic for Vidyard's core use case: sales prospecting and customer success video outreach. When sales reps need immediate access to create personalized videos for hot prospects, they're dependent on remembering to use IdP-initiated login flows and manual team assignments. More critically, when employees leave, their Vidyard accounts remain active indefinitely since there's no automated deprovisioning, creating potential data exposure risks with recorded videos and customer interaction data.

The strategic alternative

Vidyard has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaNo SCIM available
Microsoft Entra IDNo SCIM available
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Vidyard accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Vidyard pricing problem

Vidyard gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Starter$59/user/month (annual)
Pro (Teams)$99/user/month
EnterpriseCustom (~$1,316/user/year)

Pricing and provisioning options

PlanPricingSCIMSSO
Starter$59/user/month (annual)❌ Not available❌ Not available
Pro (Teams)$99/user/month❌ Not available❌ Not available
EnterpriseCustom (~$1,316/user/year)❌ Not available✓ SAML only

What this means in practice

Minimum Enterprise commitment: For a 50-user deployment, you're looking at ~$65,800/year just to get basic SSO functionality. There's no SCIM at any tier - even Enterprise customers rely on JIT provisioning through SAML attributes.

Okta integration confusion: While Okta's app catalog claims "SCIM provisioning supported," this is misleading. Vidyard only supports attribute mapping through SAML, not true SCIM lifecycle management.

Additional constraints

IdP-initiated login requirement
New users must complete their first login through the IdP interface - they cannot start from Vidyard's login page
Team assignment limitations
User team assignments happen via the vyTeam SAML attribute, requiring careful attribute mapping in your IdP
No automated deprovisioning
Disabling users in your IdP doesn't automatically deactivate their Vidyard accounts
Limited IdP support
OneLogin integration not documented, despite being a common enterprise IdP
JIT-only provisioning
Users aren't created until they actually log in, making it impossible to pre-provision accounts or audit user access

Summary of challenges

  • Vidyard does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Vidyard actually offers for identity

SAML SSO (Enterprise only)

Vidyard's Enterprise plan includes SAML 2.0 single sign-on with these capabilities:

FeatureDetails
ProtocolSAML 2.0
Supported IdPsOkta, Entra ID, Google Workspace
JIT Provisioning✓ Yes (enabled by default)
Team AssignmentVia vyTeam SAML attribute
First LoginMust be IdP-initiated

Key limitation: Users are created automatically on first login, but there's no way to pre-provision accounts or manage user attributes after creation.

What's Actually Missing

Despite the Okta Integration Network listing showing "provisioning supported," Vidyard has no native SCIM implementation:

SCIM FeatureSupported?
Create users❌ No
Update user attributes❌ No
Deactivate users❌ No
Group provisioning❌ No
Bulk operations❌ No

The Enterprise Pricing Reality

To get basic SSO, you're looking at:

~$1,316/user/year for Enterprise (100+ user minimum)
3-year contract required for meaningful discounts
Custom AI avatars, advanced security features you probably don't need

For most teams wanting automated user provisioning, you're paying for video marketing features when you just need identity management. The SSO-only approach means manual cleanup when employees leave and no centralized attribute management.

What IT admins are saying

Vidyard's lack of native SCIM support creates ongoing manual work for IT teams managing video sales and marketing tools:

The confusing part: Okta's integration catalog claims "provisioning supported" with SCIM, but Vidyard's own documentation shows no native SCIM capabilities - only JIT provisioning through SAML.

  • Manual user provisioning required despite Enterprise pricing
  • JIT provisioning only works after first IdP-initiated login
  • Team assignments must be managed through SAML attributes
  • No automated deprovisioning when employees leave

JIT enabled by default. Users must use IdP-initiated login first time.

Vidyard Knowledge Base

Team assignment via vyTeam SAML attribute

Okta Integration Guide

The recurring theme

IT teams pay Enterprise prices (~$1,316/user/year) but still manually manage user lifecycles in a platform their sales teams use daily for prospect outreach.

The decision

Your SituationRecommendation
Small sales team (<20 users) with stable headcountManual management is acceptable
Growing sales organization with frequent onboardingUse Stitchflow: automation essential for rapid user access
Enterprise with multiple teams (sales, marketing, CS)Use Stitchflow: automation strongly recommended
Using Okta with existing SCIM workflowsUse Stitchflow: Okta's integration lacks reliability guarantees
Compliance-heavy environment requiring audit trailsUse Stitchflow: automation essential for proper governance

The bottom line

Vidyard is essential for modern sales teams, but its SAML-only approach creates friction when reps need immediate video access for time-sensitive prospects. With Enterprise pricing already at ~$1,316/user/year, adding Stitchflow's <$5K flat-rate automation removes the provisioning bottleneck without breaking your budget.

Make Vidyard workflows AI-native

Vidyard has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No native SCIM supportJIT provisioning via SAML onlyTeam assignment via vyTeam SAML attributeFirst login must be IdP-initiated

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No native SCIM support
  • JIT provisioning via SAML only
  • Team assignment via vyTeam SAML attribute
  • First login must be IdP-initiated

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Where to enable

Okta Admin Console → Applications → Vidyard → Sign On

Enterprise required for SCIM

Use Stitchflow for automated provisioning.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app

Where to enable

Entra admin center → Enterprise applications → Vidyard → Single sign-on

Enterprise required for SCIM

Use Stitchflow for automated provisioning.

Unlock SCIM for
Vidyard

Vidyard has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Vidyard logo
Vidyard
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Builder.io logo

Builder.io

No SCIM

Visual CMS / Headless CMS

ProvisioningNot Supported
Manual Cost$11,754/yr

Builder.io, the visual CMS platform used by developers and content teams, does not offer SCIM provisioning on any plan. While Builder.io provides SAML 2.0 SSO integration on their Enterprise tier with identity providers like Okta, Azure AD, and Google Workspace, this only handles authentication—not the automated provisioning and deprovisioning of user accounts. IT teams must manually create and manage user accounts in Builder.io, then separately assign appropriate permissions for different Spaces and projects. This creates a significant operational gap for organizations using Builder.io across multiple content teams. Without SCIM, departing employees retain access to Builder.io Spaces until manually removed, creating security risks around content management systems that often contain sensitive marketing materials and website code. The manual overhead becomes particularly problematic when managing access across multiple Builder.io Spaces, each requiring individual permission management for developers, marketers, and content editors.

View full guide
Culture Amp logo

Culture Amp

No SCIM

Employee Engagement / People Analytics

ProvisioningNot Supported
Manual Cost$11,754/yr

Culture Amp, the employee engagement and people analytics platform, explicitly does not support SCIM provisioning on any plan. This is an intentional design decision - Culture Amp separates authentication (handled via SAML SSO) from employee data management (handled via HRIS integrations). While this approach works for their core HR use case, it creates a significant gap for IT teams managing user lifecycle across multiple SaaS applications through their identity provider. The lack of SCIM support means IT admins cannot automate user provisioning, deprovisioning, or attribute updates through standard identity governance workflows. Since Culture Amp contains sensitive employee feedback data and organizational hierarchy information that affects survey visibility, manual user management creates both security risks and operational overhead. Organizations are forced to rely on separate HRIS integrations or manual processes, breaking the unified provisioning model that most enterprises expect from their SaaS stack.

View full guide
Gladly logo

Gladly

No SCIM

Customer Service / Contact Center

ProvisioningNot Supported
Manual Cost$11,754/yr

Gladly, the customer service platform, does not support SCIM provisioning on any plan. While Gladly offers SAML 2.0 SSO integration with enterprise identity providers like Okta and Azure AD, this only handles authentication—users must still be manually created in Gladly's admin panel before they can sign in via SSO. Even on Enterprise plans with custom pricing, there's no automated user lifecycle management, meaning IT teams must manually provision and deprovision every customer service agent. This creates a significant operational burden for contact centers, where staff turnover rates are notoriously high and seasonal scaling is common. Without automated provisioning, IT teams face delays onboarding new agents during peak seasons, and security risks from lingering accounts when agents leave. The manual process becomes particularly problematic for organizations running large support teams or multiple contact centers, where dozens of agents may need to be onboarded weekly.

View full guide