Summary and recommendation
Glassdoor exposes no REST or SCIM user-management API as of 2026-03-05. The legacy Glassdoor Partner API (v1) is closed to new applicants and covers only public review and job listing data - it has no endpoints for user accounts, seat provisioning, or role assignment.
SSO via SAML 2.0 is supported for Okta and Microsoft Entra ID, but this governs authentication only; it does not provision or deprovision user records.
For teams building an identity graph that maps SaaS accounts to employee identities, Glassdoor is a blind spot: there is no machine-readable user roster, no webhook for account events, and no SCIM endpoint to poll or subscribe to.
API quick reference
| Has user API | No |
| SCIM available | No |
| SCIM plan required | N/A |
Authentication
Auth method: Not documented
User object / data model
User object field mapping is not yet verified for this app.
Core endpoints
Endpoint coverage is not yet verified for this app.
Rate limits, pagination, and events
Rate limits: Not documented
Rate-limit headers: No
Retry-After header: No
Rate-limit notes: Not documented
Pagination method: none
Default page size: 0
Max page size: 0
Pagination pointer: Not documented
Webhooks available: No
Webhook notes: No webhook infrastructure for user-management events is documented by Glassdoor.
Alternative event strategy: User provisioning and deprovisioning must be performed manually via the Glassdoor Employer Center UI, or indirectly controlled through SSO (SAML 2.0) identity provider session policies.
SCIM API status
- SCIM available: No
- SCIM version: Not documented
- Plan required: N/A
- Endpoint: Not documented
Limitations:
- Glassdoor does not document SCIM 2.0 support in any official help or developer documentation.
- No SCIM endpoint has been publicly disclosed.
- User lifecycle management is not automatable via a published API.
Common scenarios
Three operational scenarios are relevant for engineers managing Glassdoor access. First, offboarding: there is no API call available - removal must be performed manually via Employer Center → Account Settings → User Management. Revoking an IdP session via SSO prevents future logins but leaves the Glassdoor account record intact.
Second, SSO enforcement via Okta requires contacting Glassdoor enterprise support to obtain SAML metadata, then configuring a SAML 2.0 app in Okta with the provided ACS URL and Entity ID. Critically, SSO enforcement does not auto-provision new user records; initial seat creation remains a manual step.
Third, the legacy Partner API (GET https://api.glassdoor.com/api/api.htm) is accessible only to existing partners with a partner key and user agent string. It returns employer and review data only - not account or seat data - and new partner access is not being granted.
Offboard an employee from Glassdoor employer account
- Log in to Glassdoor Employer Center (employer.glassdoor.com).
- Navigate to Account Settings > User Management.
- Locate the user and select 'Remove User'.
- Confirm removal - no API call available.
Watch out for: There is no API or SCIM endpoint to automate this. If SSO is configured, revoking the user's IdP session prevents future logins but does not remove the Glassdoor account record.
Enforce SSO for all employer users (Okta)
- Contact Glassdoor enterprise support to enable SSO on the account.
- Obtain the Glassdoor SAML metadata/ACS URL from your account representative.
- Configure a SAML 2.0 application in Okta with the provided ACS URL and Entity ID.
- Assign the Okta app to relevant users/groups.
- Test SSO login via the Glassdoor Employer Center.
Watch out for: SSO enforcement does not provision new Glassdoor user records automatically; initial user seats must still be created manually or by Glassdoor support.
Retrieve company review data via legacy partner API
- Note: The Glassdoor Partner API is closed to new applicants as of recent years.
- Existing partners authenticate with a partner key + user agent string (HTTP Basic-style header).
- GET https://api.glassdoor.com/api/api.htm?v=1&format=json&t.p=
&t.k= &action=employers - Parse JSON response for employer/review data.
Watch out for: This API covers public review/job data only - not user accounts or seat management. New partner access is not being granted.
Why building this yourself is a trap
The primary automation trap is assuming that SSO coverage equals lifecycle coverage. Configuring Glassdoor as a SAML app in your IdP closes the authentication gap but leaves provisioning and deprovisioning entirely manual.
An offboarded employee whose IdP account is disabled can no longer log in via SSO, but their Glassdoor Employer Center record persists and could be reactivated if SSO is ever bypassed or misconfigured.
With no SCIM endpoint, no webhooks, and no user-management API, there is no reliable programmatic path to keep an identity graph current for Glassdoor. Any automation layer - including an MCP server with 60+ deep IT/identity integrations - would need to treat Glassdoor as a manual-exception node rather than an auto-reconciled integration.
Engineers should document this gap explicitly in access review runbooks and not rely on IdP sync as a substitute for confirmed removal.
Automate Glassdoor workflows without one-off scripts
Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.