IdenTrust does not currently offer SCIM-based user provisioning. Stepwork automates IdenTrust provisioning with 98% accuracy — no API required.
No SCIM/SSO surface. Complexity Vector: Certificate lifecycle operations require repeatable UI workflows and evidence capture.
You are correct; IdenTrust does not natively support SCIM. That forces teams to manage certificate access and lifecycle steps manually in the portal, which is why teams use Stepwork to automate IdenTrust flows with 98% accuracy without needing an API.
No. IdenTrust does not currently offer SCIM-based user provisioning, leaving IT teams to manage user lifecycle changes manually.
Stepwork automates IdenTrust provisioning through interface automation — the same way a human would, but with 98% accuracy and no API required. Record the flow once, and Stepwork runs it on demand or on a schedule.
Yes. Stepwork authenticates to IdenTrust through your existing identity provider (Okta, Microsoft Entra ID, 1Password, etc.) and completes MFA natively — including OTP, passkeys, and push notifications. No separate credentials or service accounts are needed.
The primary risk is no scim lifecycle.. Additional risks include account/password access, certificate workflows are manual, audit evidence is portal-driven.. Stepwork eliminates these risks by automating the entire provisioning workflow.
No. Stepwork completes MFA exactly like a human user — supporting OTP, passkeys, push notifications, and other methods. It signs in through your existing identity provider, mirroring your organization's security posture.
See how Stepwork provisions users in IdenTrust with 98% accuracy — in a 15-minute demo.
Book a Demo