Stepwork logo
Why Stepwork
Capabilities
Security
Company
Book a Demo
Why StepworkCapabilitiesSecurityCompany
Stepwork logo

Interface automation that can automate any flow a human can do. No APIs needed.

Product

  • Why Stepwork
  • Capabilities
  • Benchmark

Compare

  • All Comparisons
  • Stepwork vs UiPath
  • Stepwork vs Zapier
  • Stepwork vs ServiceNow
  • Stepwork vs Scribe

Provisioning

  • Overview
  • Directory

Integrations

  • All Integrations
  • Okta
  • Microsoft Entra ID
  • Google Workspace
  • 1Password
  • OneLogin
  • Ping Identity

Company

  • About
  • Security

Legal

  • Terms and Conditions
  • Privacy Policy
  • Data Processing Agreement
  • Subprocessors
1849 Union St, San Francisco, CA 94123, USA·Loot Discount inc dba Stepwork
LinkedIn

© 2026 Stepwork. All rights reserved.·Design System

  1. Home /
  2. Provisioning /
  3. Security /
  4. ThreatConnect

Automate ThreatConnect User Provisioning
Without SCIM

ThreatConnect does not currently offer SCIM-based user provisioning. Stepwork automates ThreatConnect provisioning with 98% accuracy — no API required.

ThreatConnect

threatconnect.com/ ↗
No SCIM Support
Category: SecuritySign-On: SAMLSCIM: Not supported

Why This Is Painful

Primary: Manual Work
  • Leaving sensitive intelligence exposed
  • Slows security operations

Technical Constraint

No SCIM Support Complexity Vector: Analyst permissions, investigations, and integrations are high-risk and stateful. APIs expose data but don’t validate safe operational outcomes.

How Stepwork Solves This

Threat intelligence must be traceable from alert to response, yet evidence in ThreatConnect is often spread across tools. This complicates audit validation of detection and response controls, which is why teams use Stepwork to automate ThreatConnect flows with 98% accuracy without needing an API.

How Stepwork Authenticates to ThreatConnect

ThreatConnect supports SAML sign-on. Stepwork authenticates through your existing identity provider — the same way your employees do.

OktaMicrosoft Entra ID1PasswordGoogle Workspace
  • ✓Full MFA support — OTP, passkeys, push notifications
  • ✓Signs in via your SSO / identity provider
  • ✓No service accounts or separate credentials
  • ✓Every action logged and auditable for SOC2 / GDPR

Works Alongside Your Stack

Identity
OktaMicrosoft Entra ID
Compliance
SplunkMicrosoft SentinelSOC 2
Data
Snowflake

Frequently Asked Questions About ThreatConnect Provisioning

Does ThreatConnect support SCIM?

No. ThreatConnect does not currently offer SCIM-based user provisioning, leaving IT teams to manage user lifecycle changes manually.

How do you automate user provisioning in ThreatConnect?

Stepwork automates ThreatConnect provisioning through interface automation — the same way a human would, but with 98% accuracy and no API required. Record the flow once, and Stepwork runs it on demand or on a schedule.

Is Stepwork secure for ThreatConnect?

Yes. Stepwork authenticates to ThreatConnect through your existing identity provider (Okta, Microsoft Entra ID, 1Password, etc.) and completes MFA natively — including OTP, passkeys, and push notifications. No separate credentials or service accounts are needed.

What are the risks of manual ThreatConnect provisioning?

The primary risk is manual work. Additional risks include leaving sensitive intelligence exposed, slows security operations. Stepwork eliminates these risks by automating the entire provisioning workflow.

Does Stepwork bypass ThreatConnect MFA?

No. Stepwork completes MFA exactly like a human user — supporting OTP, passkeys, push notifications, and other methods. It signs in through your existing identity provider via SAML, mirroring your organization's security posture.

More Security Apps

1Password

SCIM Paywalled

Security

Abine

No SCIM Support

Security

Abnormal Security Portal

No SCIM Support

Security

Aembit

No SCIM Support

Security

Agari BP

No SCIM Support

Security

Airgap Networks (Acquired by Zscaler)

No SCIM Support

Security

Automate ThreatConnect Provisioning

See how Stepwork provisions users in ThreatConnect with 98% accuracy — in a 15-minute demo.

Book a Demo