Stitchflow
Buildkite logo

Buildkite SCIM guide

Connector Only

How to automate Buildkite user provisioning, and what it actually costs

Summary and recommendation

Buildkite supports SCIM provisioning through Okta and Azure AD connectors, but only on Enterprise plans with custom pricing. While Business plans ($25/user/month) include SAML SSO, they lack SCIM deprovisioning—meaning users remain active in Buildkite even after being removed from your IdP. Additionally, custom SAML providers require contacting support for a feature flag to enable SCIM functionality, creating deployment delays and support dependencies.

This creates a significant security gap for engineering organizations. DevOps teams frequently change, contractors come and go, and engineers move between projects requiring different pipeline access. Without automated deprovisioning, former team members retain access to build agents, deployment pipelines, and potentially production infrastructure. JIT provisioning delays billing until first login, but manual offboarding creates compliance risks that outweigh any cost savings.

The strategic alternative

Stitchflow provides SCIM-level provisioning through resilient browser automation for Buildkite without requiring Enterprise plans or support tickets. Works with any IdP (Okta, Entra, Google Workspace, OneLogin) and any Buildkite plan that supports SSO. Flat pricing under $5K/year, regardless of team size.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0, Google OAuth
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaNo SCIM available
Microsoft Entra IDNo SCIM available
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Buildkite accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Buildkite pricing problem

Buildkite gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Team$15/user/month
Business$25/user/month
EnterpriseCustom pricing

Pricing structure

PlanPriceSSOSCIM
Team$15/user/month
Business$25/user/month
EnterpriseCustom pricing

Key constraint: SCIM deprovisioning requires Enterprise pricing, which typically costs 2-3x more than Business plans based on industry benchmarks.

What this means in practice

Limited IdP support: Only Okta and Azure AD have pre-built SCIM connectors. Google Workspace, OneLogin, and other IdPs require custom SAML integration with a support ticket to enable SCIM functionality.

Partial SCIM implementation: Even on Enterprise, Buildkite's SCIM only handles deprovisioning. User creation and updates still rely on JIT (Just-In-Time) provisioning during first login.

Billing implications: JIT provisioning means seats aren't billed until users actually log in, which can create budget unpredictability for large engineering teams.

Additional constraints

Enterprise upgrade required
Moving from Business ($25/user/month) to Enterprise (custom pricing) purely for deprovisioning capabilities
Support dependency
Custom SAML SCIM requires contacting Buildkite support to enable feature flags
IdP limitations
No native support for Google Workspace, OneLogin, or other enterprise IdPs beyond Okta/Azure
Incomplete automation
Manual group-to-team mapping still required for pipeline access control
DevOps friction
Engineering teams need immediate access to pipelines, but JIT delays can impact CI/CD workflows

Summary of challenges

  • Buildkite does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Buildkite actually offers for identity

SAML SSO (Team plan and above)

Buildkite supports SAML 2.0 integration with identity providers:

SettingDetails
ProtocolSAML 2.0, Google OAuth
Supported IdPsOkta, Azure AD, Google Workspace, OneLogin, ADFS, CyberArk, custom SAML
JIT provisioning✓ Yes (creates accounts on first login)
Multiple SSO providers✓ Yes (per organization)
SP-initiated✓ Yes
IdP-initiated✓ Yes

Key behavior: JIT provisioning creates user accounts automatically on first SSO login, but billing only starts when users actually log in. This can be cost-effective for occasional contributors.

IdP Connectors (Enterprise only)

Buildkite offers pre-built connectors for major identity providers:

FeatureOkta ConnectorAzure AD Connector
Create users✓ Yes✓ Yes
Update attributes✓ Yes✓ Yes
Deactivate users✓ Yes (Enterprise)✓ Yes (Enterprise)
Group to team mapping✓ Yes✓ Yes
Schema Discovery✓ YesLimited

Critical limitation: User deactivation requires Enterprise plan. Lower tiers can create and update users but cannot automatically remove access when employees leave.

What's missing

No native SCIM API
Buildkite only offers pre-built connectors for Okta and Azure AD
Custom SAML SCIM requires support
Generic SAML providers need feature flags enabled by Buildkite support
Enterprise plan gate
Full lifecycle management (including deprovisioning) requires custom pricing

For engineering teams managing pipeline access and build visibility, the group-to-team mapping works well when it's available. But the Enterprise requirement for deprovisioning means most teams either overpay or accept incomplete automation.

What IT admins are saying

Buildkite's Enterprise-only SCIM requirement creates cost barriers for growing engineering teams:

  • Enterprise plan required for deprovisioning - Teams on Business plans can provision users but can't automatically remove access when people leave
  • Custom SAML SCIM needs support intervention - Non-standard IdP configurations require opening support tickets to enable SCIM
  • JIT provisioning billing delays - Users aren't charged until first login, making capacity planning difficult

SCIM deprovisioning is only available on Enterprise plans, so we're stuck manually removing users on our Business plan.

IT admin on Reddit discussing Buildkite limitations

You need to contact support to enable SCIM for custom SAML providers... it's not self-service like other apps.

DevOps engineer on community forums

The recurring theme

Buildkite forces engineering teams to choose between manual user management on lower-tier plans or expensive Enterprise upgrades just to get basic deprovisioning capabilities.

The decision

Your SituationRecommendation
Small dev team (<10 developers) on Team planManual management with SSO is sufficient
Growing engineering org (15+ users)Use Stitchflow: Enterprise costs exceed automation benefits
Enterprise already paying custom pricingEvaluate native SCIM vs. Stitchflow based on total cost
Multi-team CI/CD with complex pipeline accessUse Stitchflow: group-to-team mapping automation essential
Cost-conscious orgs avoiding Enterprise tierUse Stitchflow: flat <$5K/year vs. Enterprise premium

The bottom line

Buildkite gates SCIM deprovisioning behind Enterprise pricing, forcing smaller teams to choose between expensive native automation or manual user management. For most organizations, Stitchflow delivers the same provisioning capabilities at predictable flat-rate pricing without requiring an Enterprise upgrade.

Automate Buildkite without third-party complexity

Stitchflow delivers SCIM-level provisioning through resilient browser automation, backed by 24/7 human in the loop for Buildkite at <$5K/year, flat, regardless of team size.

Works alongside or instead of native SCIM
Syncs with your existing IdP (Okta, Entra ID, Google Workspace)
Automates onboarding and offboarding
SOC 2 Type II certified
24/7 human-in-the-loop monitoring
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

Not specified

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • Enterprise plan required for SCIM deprovisioning
  • Custom SAML SCIM requires feature flag from support
  • JIT provisioning delays billing until first login

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Buildkite → Sign On

Pro required for SCIM

Use Stitchflow for automated provisioning.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → Buildkite → Single sign-on

Pro required for SCIM

Use Stitchflow for automated provisioning.

Unlock SCIM for
Buildkite

Buildkite doesn't offer SCIM. Get an enterprise-grade SCIM endpoint in your IdP, even without native support.

See how it works
Admin Console
Directory
Applications
Buildkite logo
Buildkite
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

CircleCI logo

CircleCI

No SCIM

CI/CD / DevOps

ProvisioningNot Supported
Manual Cost$11,754/yr

CircleCI, the popular CI/CD platform, does not offer native SCIM provisioning capabilities. While CircleCI supports SAML 2.0 SSO on their Scale plan ($300+/month), automated user provisioning is only available through Okta's CircleCI connector using SCIM 2.0. This creates a significant limitation: organizations using Azure Entra ID, Google Workspace, or OneLogin as their primary identity provider cannot automate CircleCI user lifecycle management, forcing IT teams to manually provision and deprovision developer accounts in a platform that handles sensitive source code and build secrets. The lack of universal SCIM support creates a compliance and security risk for DevOps teams. Manual provisioning means delayed access for new developers joining projects, and more critically, potential delays in deprovisioning when team members leave—leaving former employees with access to CI/CD pipelines, source code repositories, and build secrets. For organizations not using Okta, the choice becomes accepting manual user management overhead or switching identity providers solely to enable CircleCI automation.

View full guide
Jenkins logo

Jenkins

No SCIM

CI/CD / DevOps

ProvisioningNot Supported
Manual Cost$11,754/yr

Jenkins, the open-source CI/CD platform, does not support SCIM provisioning on any plan. While Jenkins offers SAML 2.0 SSO through plugins like the SAML plugin or miniOrange SAML SP, this only provides authentication with just-in-time (JIT) provisioning—meaning user accounts are created automatically on first login but there's no automated lifecycle management thereafter. For DevOps teams managing Jenkins across development, staging, and production environments, this creates a significant security gap when developers or contractors leave the organization. The lack of SCIM support means IT teams have no automated way to deprovision users, disable accounts, or update permissions when roles change. Unlike other enterprise tools that might have admin dashboards for manual user management, Jenkins relies heavily on configuration files and role-based authorization plugins, making manual deprovisioning both time-consuming and error-prone. This is particularly problematic for Jenkins given its access to critical CI/CD pipelines, deployment keys, and production infrastructure—exactly the type of access that needs immediate revocation during offboarding.

View full guide
6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide