Stitchflow
Apache Superset logo

Apache Superset SCIM guide

Connector Only

How to automate Apache Superset user provisioning, and what it actually costs

Native SCIM requires Open Source (Free) plan

Summary and recommendation

Apache Superset, the open-source business intelligence platform, provides no native SCIM provisioning capabilities. While Superset supports various authentication methods including OAuth2, OIDC, and LDAP, SAML SSO requires custom development through a CustomSsoSecurityManager class implementation. Even with SSO configured, user provisioning must be handled manually or through Superset's beta User API, which isn't enabled by default and requires additional configuration in superset_config.py.

This creates a significant operational burden for IT teams managing data analysts, engineers, and business users who need access to dashboards and datasets. The lack of automated provisioning means manual account creation for every new hire, plus ongoing management of complex dashboard permissions and row-level security settings. For organizations running self-hosted Superset instances, this translates to custom development work just to achieve basic enterprise SSO integration, let alone automated user lifecycle management.

The strategic alternative

Stitchflow provides managed provisioning automation for Apache Superset without requiring any custom security manager implementations or code changes. Works with self-hosted instances and integrates with any IdP. Flat pricing under $5K/year, regardless of team size.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?Yes
SSO available?Yes
SSO protocolOAuth2, OIDC, LDAP, SAML (custom)
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaVia third-partyPreset (managed Superset) has Okta integration with SAML SSO and user provisioning. Open-source Superset requires custom OAuth2/OIDC configuration in superset_config.py.
Microsoft Entra IDVia third-partyNo native Entra integration. Requires custom SAML security manager implementation. Azure ADFS/SAML possible with custom code.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Apache Superset accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Apache Superset pricing problem

Apache Superset gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Open SourceFree

Pricing structure

PlanPriceSSOSCIM
Open SourceFree

Note: Preset offers a managed Superset service with easier SSO integration, but pricing is not publicly available.

What this means in practice

Without native SCIM or SSO support, every enterprise deployment requires:

Custom security manager development
SAML SSO requires writing a CustomSsoSecurityManager class and modifying superset_config.py
Manual user management
No automated provisioning means IT teams manually create/delete user accounts
Complex permission mapping
Dashboard and dataset permissions must be configured individually
Ongoing maintenance burden
Custom SSO code needs updates when Superset versions change

The User API exists but is in beta status and disabled by default, making any automation unreliable.

Additional constraints

No row-level security automation
Data access controls require manual configuration per user
Limited SSO protocol support
OAuth2/OIDC works better than SAML, but still requires custom configuration
Version upgrade risks
Custom authentication code may break during Superset updates
Documentation gaps
Enterprise SSO setup relies heavily on community tutorials rather than official docs
Development expertise required
Implementing enterprise auth features requires Python/Flask knowledge

Summary of challenges

  • Apache Superset does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Apache Superset actually offers for identity

Open Source Authentication Options

Apache Superset provides several authentication methods, but none include automated provisioning:

MethodDetails
DatabaseBuilt-in username/password authentication
LDAPConnect to Active Directory or other LDAP servers
OAuth2/OIDCIntegration with Google, GitHub, or custom OAuth providers
SAMLRequires custom security manager implementation

Critical limitation: All SSO methods require manual configuration in superset_config.py and custom Python code for SAML implementations.

What's Actually Missing

No SCIM provisioning
Users must be manually created or rely on JIT provisioning
No native SAML support
Requires writing a custom CustomSsoSecurityManager class
Beta User API
The REST API for user management isn't production-ready
Complex SSO setup
Every IdP integration requires code changes to configuration files

Preset's Managed Alternative

The commercial Preset Cloud offers easier identity integration:

FeatureOpen Source SupersetPreset Cloud
SAML SSOCustom code requiredBuilt-in support
Okta integrationManual OAuth2 setupNative connector
User provisioningManual/JIT onlySCIM-like API
ConfigurationCode changes requiredWeb UI

Translation: If you need enterprise SSO without custom development, Apache Superset's open-source nature means you'll either need internal engineering resources or should consider Preset's managed service.

For data teams that need automated provisioning, the lack of native SCIM support means every user onboarding and offboarding requires manual intervention or custom API development.

What IT admins are saying

Apache Superset's open-source nature creates significant integration challenges for enterprise IT teams:

  • Custom development required for SAML SSO implementation
  • No native SCIM provisioning capabilities
  • Complex authentication setup requiring code changes
  • Manual user management even after SSO configuration

"No out-of-box SAML support" and "Custom development required for enterprise SSO" are consistent complaints across community forums and implementation guides.

SAML requires custom CustomSsoSecurityManager class

Apache Superset Security Documentation

Secure Apache Superset with SAML SSO custom integration with Azure ADFS or any SAML provider

Medium implementation guide highlighting the custom development requirement

The recurring theme

While Apache Superset is powerful for data visualization, its open-source architecture pushes authentication and provisioning complexity onto IT teams. Most organizations end up considering Preset (the managed version) or building custom solutions to handle enterprise identity requirements.

The decision

Your SituationRecommendation
Small data team (<10 users) with technical skillsManual user management acceptable with custom SSO setup
Growing analytics team (10-50 users)Use Stitchflow: eliminates custom development overhead
Enterprise deployment with compliance needsUse Stitchflow: automation essential for audit trails
Multi-environment setup (dev/staging/prod)Use Stitchflow: consistent provisioning across environments
Consider Preset (managed Superset) insteadPreset offers native Okta integration, but still lacks SCIM

The bottom line

Apache Superset's open-source nature means you'll need custom development for enterprise SSO and zero native provisioning capabilities. For data teams that want to focus on analytics instead of authentication code, Stitchflow eliminates the technical overhead and provides automated user lifecycle management that Superset simply can't offer natively.

Automate Apache Superset without third-party complexity

Stitchflow delivers SCIM-level provisioning through resilient browser automation, backed by 24/7 human in the loop for Apache Superset at <$5K/year, flat, regardless of team size.

Works alongside or instead of native SCIM
Syncs with your existing IdP (Okta, Entra ID, Google Workspace)
Automates onboarding and offboarding
SOC 2 Type II certified
24/7 human-in-the-loop monitoring
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No native SCIM provisioningSAML requires custom security manager implementationUser API is in beta and not enabled by defaultSSO configuration requires code changes to superset_config.py

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No native SCIM provisioning
  • SAML requires custom security manager implementation
  • User API is in beta and not enabled by default
  • SSO configuration requires code changes to superset_config.py

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Apache Superset → Sign On

Preset (managed Superset) has Okta integration with SAML SSO and user provisioning. Open-source Superset requires custom OAuth2/OIDC configuration in superset_config.py.

Use Stitchflow for automated provisioning.

Unlock SCIM for
Apache Superset

Apache Superset doesn't offer SCIM. Get an enterprise-grade SCIM endpoint in your IdP, even without native support.

See how it works
Admin Console
Directory
Applications
Apache Superset logo
Apache Superset
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.