Stitchflow
Ansible Tower logo

Ansible Tower SCIM guide

Connector Only

How to automate Ansible Tower user provisioning, and what it actually costs

Summary and recommendation

Red Hat Ansible Automation Platform (formerly Ansible Tower) does not support SCIM provisioning on any plan, despite enterprise subscription pricing ranging from $5,000 to $14,000 per year. Instead, Ansible relies on SAML attribute mapping or LDAP synchronization for user provisioning. While this approach can technically automate user creation through just-in-time (JIT) provisioning, it creates significant operational overhead—IT teams must carefully configure SAML attributes to map users to the correct teams and organizations within Ansible, and any changes to team structure or permissions require manual SAML configuration updates.

For DevOps teams managing automation credentials and playbook access, this limitation creates a compliance risk. Without true SCIM provisioning, there's no standardized way to automatically provision users with appropriate permissions or deprovision them when they leave teams. The SAML attribute mapping workaround means user access depends on maintaining complex attribute configurations across your identity provider, making it difficult to ensure least-privilege access to critical automation infrastructure.

The strategic alternative

Ansible Tower has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0, OAuth2/OIDC, LDAP
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaVia third-partyOkta SSO via SAML is supported. Requires specific Okta configuration including attribute and group statements. No SCIM provisioning - uses SAML attributes for user/team mapping.
Microsoft Entra IDVia third-partyMicrosoft Entra ID supported as SAML IdP or OAuth2/OIDC provider. AAP 2.5+ has direct Entra ID authentication type. JIT provisioning via SAML/OIDC attributes. No SCIM.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Ansible Tower accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Ansible Tower pricing problem

Ansible Tower gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
AWX (Open Source)Free
Ansible Automation Platform Standard$5,000 - $14,000
Ansible Automation Platform PremiumCustom pricing

Pricing structure

PlanPriceSSOSCIM
AWX (Open Source)Free
Ansible Automation Platform Standard$5,000 - $14,000
Ansible Automation Platform PremiumCustom pricing

Pricing notes

Cost varies based on managed nodes (typically 100+ nodes minimum)
Enterprise support and SLAs only available with paid Red Hat subscriptions
Free AWX version lacks production support guarantees

What this means in practice

Without SCIM, Ansible Tower provisioning becomes a manual workflow:

User onboarding requires

1. IT admin manually creates user account in Ansible Tower 2. Assigns appropriate teams and permissions based on role 3. User can then authenticate via SSO on subsequent logins

User offboarding gaps

Departing employees retain Ansible Tower access until manually removed
No automated cleanup of playbook permissions or team memberships
SAML attribute mapping only works for active directory users

Team management friction

Role changes require manual permission updates in Ansible Tower
No automated mapping of IdP groups to Ansible Tower teams
LDAP sync requires maintaining parallel directory structures

Additional constraints

No API-based provisioning alternative
Red Hat doesn't provide SCIM or equivalent REST APIs for user lifecycle management
SAML-only automation risks
Just-in-time provisioning via SAML attributes creates users but doesn't handle role changes or deprovisioning
DevOps credential exposure
Manual user management increases risk of automation credentials persisting after team members leave
Compliance reporting gaps
No centralized audit trail for user access changes across automation playbooks and inventories

Summary of challenges

  • Ansible Tower does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Ansible Tower actually offers for identity

SAML/LDAP Authentication (Red Hat Subscription)

Red Hat Ansible Automation Platform supports federated authentication through multiple protocols:

SettingDetails
ProtocolSAML 2.0, OAuth2/OIDC, LDAP
Supported IdPsOkta, Microsoft Entra ID, generic SAML providers
JIT provisioning✓ Yes (via SAML attribute mapping)
Team mapping✓ Yes (via SAML groups or LDAP sync)
User provisioningManual or LDAP sync only

Critical limitation: Ansible Tower has no native SCIM support. User lifecycle management relies entirely on SAML attribute mapping during login or periodic LDAP synchronization.

Okta Integration

The Ansible Tower + Okta integration provides:

FeatureSupported?
SAML SSO✓ Yes
SCIM provisioning❌ No
JIT user creation✓ Yes (via SAML attributes)
Team assignment✓ Yes (via SAML group statements)
Automated deprovisioning❌ No

Microsoft Entra ID Integration

AAP 2.5+ includes direct Entra ID support:

FeatureSupported?
OAuth2/OIDC SSO✓ Yes
SAML SSO✓ Yes
SCIM provisioning❌ No
JIT user creation✓ Yes
Group sync✓ Yes (via token attributes)

The real problem: Without SCIM, deprovisioning users requires manual action in Ansible Tower or depends on session timeouts. For DevOps teams managing automation credentials and playbook permissions, this creates security gaps when team members leave or change roles.

What IT admins are saying

Ansible Tower's lack of native SCIM provisioning frustrates IT teams managing DevOps automation platforms:

  • Manual user provisioning despite enterprise pricing - no automated sync from identity providers
  • Complex SAML attribute mapping required for team assignments and role-based access
  • LDAP sync as the only semi-automated option, but requires additional infrastructure
  • AWX (free version) offers no production support when provisioning issues arise

No SCIM means manual or LDAP-based provisioning

Community feedback on automation platform limitations

User provisioning via SAML attribute mapping or LDAP sync

Red Hat Ansible documentation, highlighting the workaround approaches

The recurring theme

For a platform designed to automate everything else, Ansible Tower ironically requires manual intervention for user lifecycle management. IT teams must rely on SAML attributes or maintain separate LDAP infrastructure just to provision users into their automation platform.

The decision

Your SituationRecommendation
Small DevOps team (<10 users) with stable membershipManual management is acceptable
AWX free version for development/testingManual user creation with SAML SSO
Enterprise with 50+ automation usersUse Stitchflow: LDAP sync is complex and brittle
Multi-team environment with frequent role changesUse Stitchflow: SAML attribute mapping insufficient
Compliance requirements for access audit trailsUse Stitchflow: automation essential for SOC/SOX compliance

The bottom line

Red Hat Ansible Automation Platform is enterprise-grade automation software, but it lacks SCIM provisioning entirely. Your only options are manual user management, complex LDAP synchronization, or unreliable SAML attribute mapping. For DevOps teams that need proper user lifecycle automation, Stitchflow delivers the missing SCIM layer without the operational overhead.

Make Ansible Tower workflows AI-native

Ansible Tower has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No native SCIM provisioning supportUser provisioning via SAML attribute mapping or LDAP syncAWX (free version) has no SLA or enterprise supportMultiple SAML IdPs supported but require configuration

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No native SCIM provisioning support
  • User provisioning via SAML attribute mapping or LDAP sync
  • AWX (free version) has no SLA or enterprise support
  • Multiple SAML IdPs supported but require configuration

Documentation not available.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app

Where to enable

Entra admin center → Enterprise applications → Ansible Tower → Single sign-on

Microsoft Entra ID supported as SAML IdP or OAuth2/OIDC provider. AAP 2.5+ has direct Entra ID authentication type. JIT provisioning via SAML/OIDC attributes. No SCIM.

Use Stitchflow for automated provisioning.

Unlock SCIM for
Ansible Tower

Ansible Tower has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Ansible Tower logo
Ansible Tower
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
ActiveCampaign logo

ActiveCampaign

No SCIM

Marketing Automation / Email

ProvisioningNot Supported
Manual Cost$11,754/yr

ActiveCampaign, the marketing automation platform, does not offer native SCIM provisioning on any plan. While the Enterprise plan ($145+/month) includes SAML 2.0 SSO with just-in-time (JIT) provisioning, this only creates user accounts on first login—there's no automated deprovisioning when employees leave or change roles. New SSO users are automatically added to a generic "SSO Users" group with configurable permissions, but IT teams have no way to programmatically manage user lifecycles or enforce granular access controls based on department or role changes. This creates a significant gap for marketing teams that need to manage access to customer data and campaign tools. When employees leave the company or change departments, their ActiveCampaign access must be manually revoked, creating compliance risks and potential data exposure. The lack of automated deprovisioning means former employees could theoretically retain access to sensitive marketing data and customer information until someone manually removes them from the platform.

View full guide
Adyen logo

Adyen

No SCIM

Payments / Fintech

ProvisioningNot Supported
Manual Cost$11,754/yr

Adyen offers SCIM 2.0 provisioning, but only through Okta's integration—there's no native SCIM endpoint. This creates a significant vendor lock-in scenario where your provisioning capabilities are entirely dependent on using Okta as your identity provider. Teams using Azure Entra, Google Workspace, or OneLogin are left with manual user management despite Adyen supporting SAML SSO with these platforms. The Okta integration itself requires maintaining a company account (not just a merchant account) and keeping at least one non-SSO admin for troubleshooting, adding operational complexity. For payment platforms handling sensitive financial data, this provisioning gap creates serious compliance risks. Your finance team, payment operations staff, and developers need timely access to process transactions and manage risk controls, but without automated provisioning, you're stuck with manual onboarding that can delay critical payment operations. The requirement to maintain non-SSO admin accounts also creates a security backdoor that compliance auditors will flag.

View full guide