Stitchflow
Zoho Workplace logo

Zoho Workplace SCIM guide

Connector Only

How to automate Zoho Workplace user provisioning, and what it actually costs

Summary and recommendation

Zoho Workplace, the Google Workspace alternative that includes email, docs, and collaboration tools, takes an unconventional approach to SCIM provisioning. Rather than offering native SCIM within Workplace itself, Zoho routes all provisioning through their separate Zoho Directory service at the organization level. This means IT admins must manage user lifecycles through an additional layer, with SCIM connections flowing from your IdP (like Okta or Entra ID) to Zoho Directory, which then provisions users across the Workplace suite. While this works, it adds complexity and requires Enterprise-level pricing to access.

The indirect provisioning model creates operational friction for IT teams. Instead of managing Workplace users directly, you're essentially managing a separate directory service that happens to provision Workplace accounts. This becomes particularly problematic in hybrid environments where you need granular control over which users get access to specific Workplace applications versus the broader Zoho ecosystem. Additionally, certain limitations like JIT provisioning not being supported in Zoho One with Okta mean you can't rely on just-in-time user creation for seamless onboarding.

The strategic alternative

Zoho Workplace has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaSAML SSO with JIT provisioning. JIT not supported in Zoho One (Okta).
Microsoft Entra IDRecommended: Entra SCIM to Zoho Directory for hybrid environments.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Zoho Workplace accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Zoho Workplace pricing problem

Zoho Workplace gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Mail OnlyFrom $1/user/mo
WorkplaceFrom $4/user/mo
Enterprise/Zoho OneCustom pricing

Provisioning structure

PlanPriceSSOSCIM
Mail OnlyFrom $1/user/mo
WorkplaceFrom $4/user/mo
Enterprise/Zoho OneCustom pricing

What this means in practice

You can't provision users directly to Zoho Workplace. Every provisioning action must flow through Zoho Directory first:

IdP → Zoho Directory → Zoho Workplace

This creates a multi-step process where your identity provider talks to Zoho Directory via SCIM, and Zoho Directory then manages access to individual Zoho applications. While this works for organizations fully committed to the Zoho ecosystem, it adds complexity for companies using Zoho Workplace alongside other productivity tools.

Additional constraints

Okta limitation
JIT provisioning is not supported when using Zoho One with Okta integration
Architectural dependency
All user lifecycle management depends on Zoho Directory being properly configured and maintained
IdP restrictions
Google Workspace and OneLogin lack documented SCIM integration paths to Zoho Directory
Migration complexity
Zoho's recommended approach for Microsoft 365 migrations involves running Entra ID SCIM alongside Zoho Directory in a hybrid configuration

Summary of challenges

  • Zoho Workplace does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Zoho Workplace actually offers for identity

SAML SSO (Enterprise/Zoho One)

Zoho Workplace supports SAML 2.0 integration with identity providers:

SettingDetails
ProtocolSAML 2.0
Supported IdPsOkta, Entra ID, generic SAML providers
JIT ProvisioningAvailable (with limitations)
ConfigurationVia Zoho Directory organization settings

Critical limitation: JIT provisioning is explicitly not supported when using Zoho One with Okta, forcing manual user creation or alternative provisioning methods.

Zoho Directory SCIM (Enterprise/Zoho One)

User provisioning happens through Zoho Directory, not directly to Workplace:

FeatureSupported?
Create users✓ Yes (via Zoho Directory)
Update attributes✓ Yes (via Zoho Directory)
Deactivate users✓ Yes (via Zoho Directory)
Group provisioning✓ Yes (via Zoho Directory)

The catch: Provisioning operates at the organization level through Zoho Directory, not application-level. This creates complexity for companies that only want to provision specific Workplace applications rather than the entire Zoho ecosystem.

Entra ID Integration

Zoho's documentation explicitly recommends using Entra ID SCIM → Zoho Directory for hybrid Microsoft 365 migration scenarios. This adds an extra layer of complexity but provides more reliable provisioning than JIT methods.

Real-world implication: You're not just buying Workplace provisioning—you're implementing organization-wide Zoho Directory provisioning that affects all Zoho services. For teams wanting simple email and collaboration provisioning, this architectural approach introduces unnecessary overhead.

What IT admins are saying

Zoho Workplace's complex provisioning architecture creates confusion for IT teams managing hybrid environments:

  • SCIM provisioning requires going through Zoho Directory at the org level, not directly to Workplace apps
  • JIT provisioning is inconsistent - works with some IdPs but "not supported in Zoho One (Okta)"
  • Enterprise tier requirement locks out smaller organizations from automated provisioning
  • Multi-step setup process for hybrid environments adds operational complexity

JIT not supported in Zoho One (Okta)

Zoho official documentation

Recommended: Entra SCIM → Zoho Directory for hybrid

Zoho migration guide

The recurring theme

IT admins struggle with Zoho's indirect provisioning model that requires routing through Zoho Directory rather than direct app provisioning, creating an extra layer of complexity especially for organizations trying to replace Google Workspace or Microsoft 365.

The decision

Your SituationRecommendation
Small team with Google Workspace/basic Zoho setupStick with manual management and JIT provisioning
Growing organization needing productivity suite automationUse Stitchflow: simpler than Zoho Directory complexity
Enterprise migrating from Microsoft 365 to ZohoUse Stitchflow: avoid hybrid Entra→Zoho Directory setup
Large organization (100+ users) with compliance needsUse Stitchflow: automation essential for audit trail
Multi-app Zoho ecosystem deploymentUse Stitchflow: organization-wide provisioning made simple

The bottom line

Zoho Workplace offers productivity tools as a Microsoft 365 alternative, but provisioning requires navigating Zoho Directory at the organization level—adding complexity most IT teams don't want. For organizations that need automated user lifecycle management without architectural overhead, Stitchflow delivers the automation Zoho should have built natively.

Make Zoho Workplace workflows AI-native

Zoho Workplace has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

JIT not supported in Zoho One (Okta)SCIM via Zoho Directory at org levelRecommended: Entra SCIM → Zoho Directory for hybrid

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • JIT not supported in Zoho One (Okta)
  • SCIM via Zoho Directory at org level
  • Recommended: Entra SCIM → Zoho Directory for hybrid

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Zoho Workplace → Sign On

SAML SSO with JIT provisioning. JIT not supported in Zoho One (Okta).

Use Stitchflow for automated provisioning.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → Zoho Workplace → Single sign-on

Recommended: Entra SCIM to Zoho Directory for hybrid environments.

Use Stitchflow for automated provisioning.

Unlock SCIM for
Zoho Workplace

Zoho Workplace has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Zoho Workplace logo
Zoho Workplace
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
ActiveCampaign logo

ActiveCampaign

No SCIM

Marketing Automation / Email

ProvisioningNot Supported
Manual Cost$11,754/yr

ActiveCampaign, the marketing automation platform, does not offer native SCIM provisioning on any plan. While the Enterprise plan ($145+/month) includes SAML 2.0 SSO with just-in-time (JIT) provisioning, this only creates user accounts on first login—there's no automated deprovisioning when employees leave or change roles. New SSO users are automatically added to a generic "SSO Users" group with configurable permissions, but IT teams have no way to programmatically manage user lifecycles or enforce granular access controls based on department or role changes. This creates a significant gap for marketing teams that need to manage access to customer data and campaign tools. When employees leave the company or change departments, their ActiveCampaign access must be manually revoked, creating compliance risks and potential data exposure. The lack of automated deprovisioning means former employees could theoretically retain access to sensitive marketing data and customer information until someone manually removes them from the platform.

View full guide
Adyen logo

Adyen

No SCIM

Payments / Fintech

ProvisioningNot Supported
Manual Cost$11,754/yr

Adyen offers SCIM 2.0 provisioning, but only through Okta's integration—there's no native SCIM endpoint. This creates a significant vendor lock-in scenario where your provisioning capabilities are entirely dependent on using Okta as your identity provider. Teams using Azure Entra, Google Workspace, or OneLogin are left with manual user management despite Adyen supporting SAML SSO with these platforms. The Okta integration itself requires maintaining a company account (not just a merchant account) and keeping at least one non-SSO admin for troubleshooting, adding operational complexity. For payment platforms handling sensitive financial data, this provisioning gap creates serious compliance risks. Your finance team, payment operations staff, and developers need timely access to process transactions and manage risk controls, but without automated provisioning, you're stuck with manual onboarding that can delay critical payment operations. The requirement to maintain non-SSO admin accounts also creates a security backdoor that compliance auditors will flag.

View full guide