Summary and recommendation
Mend.io (formerly WhiteSource), the software composition analysis platform, does not support SCIM provisioning on any plan, including their Enterprise tier that starts at $15,000 minimum. While Mend.io offers SAML-based single sign-on with just-in-time (JIT) provisioning, this creates significant operational overhead for IT teams managing developer access to security tooling. Users can be created automatically on first login via JIT, but there's no automated way to update user attributes, manage group memberships, or deactivate users when they leave the organization—critical gaps for a security tool that needs to be tightly integrated with developer workflows.
This limitation becomes particularly problematic given Mend.io's role in the software development lifecycle. Security engineers and DevSecOps teams need precise control over who has access to vulnerability data and security policies, but without proper provisioning automation, IT admins must manually manage user lifecycle events. This manual process increases security risks and compliance gaps, especially when developers change roles or leave the company but retain access to sensitive security findings.
The strategic alternative
WhiteSource has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | Yes |
| SSO available? | Yes |
| SSO protocol | SAML 2.0 |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | ✓ | ❌ | No SCIM available |
| Microsoft Entra ID | ✓ | ❌ | No SCIM available |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages WhiteSource accounts manually. Here's what that costs:
The WhiteSource pricing problem
WhiteSource gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Enterprise | Custom (~$15K minimum, ~$18K for 50 users) |
Pricing structure
| Plan | Pricing | SCIM | SSO |
|---|---|---|---|
| Enterprise | Custom (~$15K minimum, ~$18K for 50 users) | ❌ Not available | ✓ SAML only |
Market data on Mend.io costs
What this means in practice
With no SCIM support, IT teams managing Mend.io face significant operational overhead:
For a security tool that needs to integrate across your entire development pipeline, manual user management creates the exact type of access control gaps that Mend.io is supposed to help you avoid.
Additional constraints
Summary of challenges
- WhiteSource does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What WhiteSource actually offers for identity
SAML SSO Only (Enterprise tier)
Mend.io provides basic SAML 2.0 integration but no automated provisioning:
| Feature | Enterprise Tier |
|---|---|
| SAML SSO | ✓ Yes |
| OIDC SSO | ❌ No |
| JIT provisioning | ✓ Yes (SAML attributes) |
| SCIM provisioning | ❌ No |
| User lifecycle management | ❌ No |
| Group synchronization | ❌ No |
Critical setup requirement: You must contact Mend.io support to obtain SAML configuration values - there's no self-service portal for SSO setup.
What you're actually paying for
The $15,000 minimum Enterprise tier includes security scanning features that most teams buying purely for identity management won't use:
The reality: 90% of these security features are irrelevant if you just need user provisioning for your development team.
Why JIT provisioning falls short
Just-in-time provisioning via SAML creates users on first login, but provides no ongoing lifecycle management:
For a security tool that developers access daily, this creates significant administrative overhead and potential security gaps.
What IT admins are saying
Community sentiment on Mend.io's (formerly WhiteSource) provisioning options reveals significant friction for IT teams managing developer security tools:
- High minimum purchase requirements make it cost-prohibitive for smaller development teams
- Manual user provisioning required despite enterprise pricing - no SCIM automation available
- SSO configuration requires contacting support for basic setup values
- JIT provisioning via SAML is the only automated option, limiting control over user lifecycle
Minimum purchase requirement prohibitive for small teams
Must contact support for SSO configuration values
Configuration values require support team contact
The recurring theme
Despite charging enterprise-level prices with a $15,000 minimum commitment, Mend.io forces IT teams into manual user management workflows that don't scale with developer team growth.
The decision
| Your Situation | Recommendation |
|---|---|
| Small security team (<20 developers) | Consider manual management, but budget constraints make this expensive |
| Mid-size engineering team (20-100 developers) | Use Stitchflow: bypass the $15K minimum and high per-developer costs |
| Enterprise with existing Mend contract | Manual JIT provisioning acceptable if SSO is sufficient |
| Growing DevSecOps team with frequent onboarding | Use Stitchflow: automation essential for cost-effective scaling |
| Organizations requiring audit trails for security tools | Use Stitchflow: proper provisioning logs for compliance |
The bottom line
Mend.io (WhiteSource) offers no SCIM provisioning and requires a $15K minimum purchase with costly per-developer licensing. For teams that need security scanning without enterprise-level costs or want proper user lifecycle management, Stitchflow provides automated provisioning at a fraction of Mend's pricing model.
Make WhiteSource workflows AI-native
WhiteSource has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- No documented SCIM support
- JIT provisioning via SAML only
- Configuration values require support team contact
- Minimum 20 developer license requirement
Documentation not available.
Configuration for Entra ID
Integration type
Microsoft Entra Gallery app
Prerequisite
SSO must be configured before enabling SCIM.
Where to enable
Enterprise required for SCIM
Use Stitchflow for automated provisioning.
Unlock SCIM for
WhiteSource
WhiteSource has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.
See how it works


