Stitchflow
Apache Superset logo

Apache Superset SCIM guide

Connector Only

How to automate Apache Superset user provisioning, and what it actually costs

Summary and recommendation

Apache Superset, the open-source business intelligence platform, provides no native SCIM provisioning capabilities. While Superset supports various authentication methods including OAuth2, OIDC, and LDAP, SAML SSO requires custom development through a CustomSsoSecurityManager class implementation. Even with SSO configured, user provisioning must be handled manually or through Superset's beta User API, which isn't enabled by default and requires additional configuration in superset_config.py.

This creates a significant operational burden for IT teams managing data analysts, engineers, and business users who need access to dashboards and datasets. The lack of automated provisioning means manual account creation for every new hire, plus ongoing management of complex dashboard permissions and row-level security settings. For organizations running self-hosted Superset instances, this translates to custom development work just to achieve basic enterprise SSO integration, let alone automated user lifecycle management.

The strategic alternative

Apache Superset has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?Yes
SSO available?Yes
SSO protocolOAuth2, OIDC, LDAP, SAML (custom)
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaVia third-partyPreset (managed Superset) has Okta integration with SAML SSO and user provisioning. Open-source Superset requires custom OAuth2/OIDC configuration in superset_config.py.
Microsoft Entra IDVia third-partyNo native Entra integration. Requires custom SAML security manager implementation. Azure ADFS/SAML possible with custom code.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Apache Superset accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Apache Superset pricing problem

Apache Superset gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Open SourceFree

Pricing structure

PlanPriceSSOSCIM
Open SourceFree

Note: Preset offers a managed Superset service with easier SSO integration, but pricing is not publicly available.

What this means in practice

Without native SCIM or SSO support, every enterprise deployment requires:

Custom security manager development
SAML SSO requires writing a CustomSsoSecurityManager class and modifying superset_config.py
Manual user management
No automated provisioning means IT teams manually create/delete user accounts
Complex permission mapping
Dashboard and dataset permissions must be configured individually
Ongoing maintenance burden
Custom SSO code needs updates when Superset versions change

The User API exists but is in beta status and disabled by default, making any automation unreliable.

Additional constraints

No row-level security automation
Data access controls require manual configuration per user
Limited SSO protocol support
OAuth2/OIDC works better than SAML, but still requires custom configuration
Version upgrade risks
Custom authentication code may break during Superset updates
Documentation gaps
Enterprise SSO setup relies heavily on community tutorials rather than official docs
Development expertise required
Implementing enterprise auth features requires Python/Flask knowledge

Summary of challenges

  • Apache Superset does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Apache Superset actually offers for identity

Open Source Authentication Options

Apache Superset provides several authentication methods, but none include automated provisioning:

MethodDetails
DatabaseBuilt-in username/password authentication
LDAPConnect to Active Directory or other LDAP servers
OAuth2/OIDCIntegration with Google, GitHub, or custom OAuth providers
SAMLRequires custom security manager implementation

Critical limitation: All SSO methods require manual configuration in superset_config.py and custom Python code for SAML implementations.

What's Actually Missing

No SCIM provisioning
Users must be manually created or rely on JIT provisioning
No native SAML support
Requires writing a custom CustomSsoSecurityManager class
Beta User API
The REST API for user management isn't production-ready
Complex SSO setup
Every IdP integration requires code changes to configuration files

Preset's Managed Alternative

The commercial Preset Cloud offers easier identity integration:

FeatureOpen Source SupersetPreset Cloud
SAML SSOCustom code requiredBuilt-in support
Okta integrationManual OAuth2 setupNative connector
User provisioningManual/JIT onlySCIM-like API
ConfigurationCode changes requiredWeb UI

Translation: If you need enterprise SSO without custom development, Apache Superset's open-source nature means you'll either need internal engineering resources or should consider Preset's managed service.

For data teams that need automated provisioning, the lack of native SCIM support means every user onboarding and offboarding requires manual intervention or custom API development.

What IT admins are saying

Apache Superset's open-source nature creates significant integration challenges for enterprise IT teams:

  • Custom development required for SAML SSO implementation
  • No native SCIM provisioning capabilities
  • Complex authentication setup requiring code changes
  • Manual user management even after SSO configuration

"No out-of-box SAML support" and "Custom development required for enterprise SSO" are consistent complaints across community forums and implementation guides.

SAML requires custom CustomSsoSecurityManager class

Apache Superset Security Documentation

Secure Apache Superset with SAML SSO custom integration with Azure ADFS or any SAML provider

Medium implementation guide highlighting the custom development requirement

The recurring theme

While Apache Superset is powerful for data visualization, its open-source architecture pushes authentication and provisioning complexity onto IT teams. Most organizations end up considering Preset (the managed version) or building custom solutions to handle enterprise identity requirements.

The decision

Your SituationRecommendation
Small data team (<10 users) with technical skillsManual user management acceptable with custom SSO setup
Growing analytics team (10-50 users)Use Stitchflow: eliminates custom development overhead
Enterprise deployment with compliance needsUse Stitchflow: automation essential for audit trails
Multi-environment setup (dev/staging/prod)Use Stitchflow: consistent provisioning across environments
Consider Preset (managed Superset) insteadPreset offers native Okta integration, but still lacks SCIM

The bottom line

Apache Superset's open-source nature means you'll need custom development for enterprise SSO and zero native provisioning capabilities. For data teams that want to focus on analytics instead of authentication code, Stitchflow eliminates the technical overhead and provides automated user lifecycle management that Superset simply can't offer natively.

Make Apache Superset workflows AI-native

Apache Superset has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No native SCIM provisioningSAML requires custom security manager implementationUser API is in beta and not enabled by defaultSSO configuration requires code changes to superset_config.py

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No native SCIM provisioning
  • SAML requires custom security manager implementation
  • User API is in beta and not enabled by default
  • SSO configuration requires code changes to superset_config.py

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Apache Superset → Sign On

Preset (managed Superset) has Okta integration with SAML SSO and user provisioning. Open-source Superset requires custom OAuth2/OIDC configuration in superset_config.py.

Use Stitchflow for automated provisioning.

Unlock SCIM for
Apache Superset

Apache Superset has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Apache Superset logo
Apache Superset
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Redash logo

Redash

No SCIM

Business Intelligence / Data Visualization

ProvisioningNot Supported
Manual Cost$11,754/yr

Redash, the open-source data visualization platform, does not support SCIM provisioning. Since Databricks discontinued the cloud service in November 2021, Redash is now only available as a self-hosted solution with SAML 2.0 SSO and JIT (Just-In-Time) provisioning. Users are automatically created on their first SAML login, with group membership controlled through the RedashGroups SAML attribute. While this works for small teams, it creates significant operational overhead for larger organizations that need predictable user lifecycle management. The JIT-only approach means IT teams have no visibility into who will have access until users actually log in, making it impossible to audit access rights or ensure proper deprovisioning when employees leave. For organizations using Redash for sensitive business intelligence and data visualization, this creates compliance gaps and security risks. Self-hosting requirements add additional complexity, as teams must manage both the application infrastructure and user provisioning workflows manually.

View full guide
Tableau logo

Tableau

SCIM Tax

Business Intelligence / Data Visualization

SCIM StatusIncluded
Manual Cost$11,754/yr

Tableau supports SCIM 2.0 for automated user provisioning across all Tableau Cloud tiers, starting at $75/user/month for Creator licenses. However, SCIM requires SAML SSO to be configured first—you cannot enable SCIM provisioning without SSO. Once SCIM is active, any changes made directly in Tableau Cloud get overwritten by your identity provider, and you cannot disable SAML configuration while SCIM remains enabled. This creates operational friction for IT teams managing mixed authentication scenarios or organizations that need flexibility in user management approaches. The SAML prerequisite means you're locked into a specific authentication flow, and the overwrite behavior can disrupt workflows when users or admins make direct changes in Tableau that then get reverted during the next sync cycle.

View full guide
6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide