Summary and recommendation
Axure Cloud for Business has no publicly documented REST API for user management as of February 2026. There are no endpoints for creating, reading, updating, or deactivating users programmatically.
The 'Axure RP API' (axure.com/axure-rp-api) is a legacy, read-only C#/.NET library for parsing local .rp files - it has no cloud or user-management capability and should not be confused with a cloud REST API.
No SCIM endpoint is published in official Axure documentation, and no SCIM provisioning is available on any plan. There are no official SDKs, CLI tools, or webhooks for user lifecycle events.
API quick reference
| Has user API | No |
| SCIM available | No |
| SCIM plan required | Not available on any plan as of February 2026; no native SCIM provisioning is documented by Axure. |
Authentication
Auth method: Not documented
User object / data model
User object field mapping is not yet verified for this app.
Core endpoints
Endpoint coverage is not yet verified for this app.
Rate limits, pagination, and events
Rate limits: Not documented
Rate-limit headers: No
Retry-After header: No
Rate-limit notes: Not documented
Pagination method: none
Default page size: 0
Max page size: 0
Pagination pointer: Not documented
Webhooks available: No
Webhook notes: Axure Cloud supports outbound activity notifications to Slack and Microsoft Teams (via Teams Workflows/incoming webhook URLs) for project discussion and check-in events, but these are end-user notification integrations, not a programmable webhook system for user lifecycle events. No user-management webhook API is documented.
Alternative event strategy: Configure SAML 2.0 SSO with Okta or Azure AD for identity-provider-driven user lifecycle management. For on-premises deployments, Active Directory or LDAP integration is available via the admin UI.
SCIM API status
- SCIM available: No
- SCIM version: Not documented
- Plan required: Not available on any plan as of February 2026; no native SCIM provisioning is documented by Axure.
- Endpoint: Not documented
Limitations:
- No SCIM endpoint is published in official Axure documentation.
- User provisioning must be performed manually via the Axure Cloud for Business admin UI (Members page) or via SAML JIT if the IdP supports it.
- Active Directory and LDAP integrations are restricted to on-premises Axure Cloud for Business server deployments only.
- SAML SSO (Okta, Azure AD) is available on Business/Enterprise plans but does not include automated SCIM provisioning.
Common scenarios
The only supported path for reducing manual provisioning overhead is SAML 2. 0 SSO via Okta or Azure AD, available on Business and Enterprise plans.
SAML JIT can provision a session on first login if the IdP is configured correctly, but it does not handle deprovisioning - removing a user from Okta or Azure AD does not deactivate their Axure Cloud for Business account. Admins must still manually deactivate users in the Members page.
For on-premises deployments only, Active Directory and LDAP authentication are available via the admin UI. When AD/LDAP is enabled, SAML settings are ignored - the two cannot coexist on the same server.
Teams requiring automated provisioning across their SaaS portfolio should evaluate an MCP server with ~100 deep IT/identity integrations, as Axure's native API surface does not support programmatic user lifecycle management in any form.
Onboard a new team member via SAML SSO (Okta)
- In Okta Admin Console, create a custom SAML 2.0 app integration for Axure Cloud for Business.
- Set the ACS URL to https://[domain].axure.cloud/identity/consume and Entity ID to https://[domain].axure.cloud.
- Download the X.509 certificate from Okta.
- In Axure Cloud for Business, go to Account Settings → Authentication → Configure and enter the Okta SSO URL and upload the certificate.
- On the Members page, click 'Add members', enter the user's email, and check 'Use SSO' to assign SAML authentication.
- Assign the appropriate role (e.g., Member, Admin) before saving.
Watch out for: The user must also have or create a public Axure Cloud account separately. SSO configuration must be completed before adding SSO-enabled members, or authentication will fall back to standard password login.
Onboard a new team member via Azure AD SAML
- In Azure portal, create a new non-gallery Enterprise Application.
- Configure SAML SSO: set Identifier (Entity ID) to https://[domain].axure.cloud and ACS URL to https://[domain].axure.cloud/identity/consume.
- Download the Base64 SAML signing certificate from Azure.
- Copy the Login URL from the 'Set up Axure Cloud for Business' section in Azure.
- In Axure Cloud for Business, go to Account Settings → Authentication → Configure, paste the Login URL as Sign On URL, and upload the certificate.
- Add the user on the Members page with 'Use SSO' checked.
Watch out for: Azure AD SAML integration does not include SCIM provisioning; users must still be manually added in the Axure Cloud for Business Members page. Deprovisioning in Azure AD does not automatically deactivate the Axure account.
Deactivate a departing user (on-premises)
- Sign in to Axure Cloud for Business as Super Admin or Technical Admin.
- Navigate to Organization Settings → Members.
- Locate the user in the members table.
- Click the deactivate option for that user.
- If using AD/LDAP on-premises, also disable or remove the user from the directory to prevent re-authentication.
Watch out for: Deactivating a user in Axure Cloud for Business only prevents sign-in and publishing to that server; it does not affect the user's separate public Axure Cloud account. There is no API to automate this step - it must be done manually in the admin UI.
Why building this yourself is a trap
The primary integration trap is assuming that SAML SSO covers the full user lifecycle. It does not: SAML handles authentication, not provisioning or deprovisioning. A user removed from the IdP retains their Axure Cloud for Business account and any assigned License Portal seat until an admin manually deactivates both.
A secondary trap is the two-account architecture: the admin creates the Cloud for Business account, but the user must independently hold a public Axure Cloud account to activate their RP subscription. No API surface exists to automate or verify this linkage.
Finally, Axure Cloud's outbound notifications to Slack and Microsoft Teams are end-user activity alerts, not programmable webhooks - they cannot be used to trigger user lifecycle workflows.
Automate Axure RP workflows without one-off scripts
Stitchflow builds and maintains identity workflows for your exact setup. We cover every app, including the ones without APIs, and run deterministic trigger-to-report workflows with human approvals where they matter.