Summary and recommendation
Buildkite supports SCIM provisioning through Okta and Azure AD connectors, but only on Enterprise plans with custom pricing. While Business plans ($25/user/month) include SAML SSO, they lack SCIM deprovisioning—meaning users remain active in Buildkite even after being removed from your IdP. Additionally, custom SAML providers require contacting support for a feature flag to enable SCIM functionality, creating deployment delays and support dependencies.
This creates a significant security gap for engineering organizations. DevOps teams frequently change, contractors come and go, and engineers move between projects requiring different pipeline access. Without automated deprovisioning, former team members retain access to build agents, deployment pipelines, and potentially production infrastructure. JIT provisioning delays billing until first login, but manual offboarding creates compliance risks that outweigh any cost savings.
The strategic alternative
Buildkite has no native SCIM. That leaves a workflow gap in offboarding, access reviews, and license cleanup unless your team handles the app another way. Stitchflow builds and maintains the IT workflows your team still runs manually, across every app, including the ones without APIs.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | Yes |
| SSO available? | Yes |
| SSO protocol | SAML 2.0, Google OAuth |
| Documentation | Official docs |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | ✓ | ❌ | No SCIM available |
| Microsoft Entra ID | ✓ | ❌ | No SCIM available |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages Buildkite accounts manually. Here's what that costs:
The Buildkite pricing problem
Buildkite gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Team | $15/user/month | ||
| Business | $25/user/month | ||
| Enterprise | Custom pricing |
Pricing structure
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Team | $15/user/month | ||
| Business | $25/user/month | ||
| Enterprise | Custom pricing |
Key constraint: SCIM deprovisioning requires Enterprise pricing, which typically costs 2-3x more than Business plans based on industry benchmarks.
What this means in practice
Limited IdP support: Only Okta and Azure AD have pre-built SCIM connectors. Google Workspace, OneLogin, and other IdPs require custom SAML integration with a support ticket to enable SCIM functionality.
Partial SCIM implementation: Even on Enterprise, Buildkite's SCIM only handles deprovisioning. User creation and updates still rely on JIT (Just-In-Time) provisioning during first login.
Billing implications: JIT provisioning means seats aren't billed until users actually log in, which can create budget unpredictability for large engineering teams.
Additional constraints
Summary of challenges
- Buildkite does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What Buildkite actually offers for identity
SAML SSO (Team plan and above)
Buildkite supports SAML 2.0 integration with identity providers:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0, Google OAuth |
| Supported IdPs | Okta, Azure AD, Google Workspace, OneLogin, ADFS, CyberArk, custom SAML |
| JIT provisioning | ✓ Yes (creates accounts on first login) |
| Multiple SSO providers | ✓ Yes (per organization) |
| SP-initiated | ✓ Yes |
| IdP-initiated | ✓ Yes |
Key behavior: JIT provisioning creates user accounts automatically on first SSO login, but billing only starts when users actually log in. This can be cost-effective for occasional contributors.
IdP Connectors (Enterprise only)
Buildkite offers pre-built connectors for major identity providers:
| Feature | Okta Connector | Azure AD Connector |
|---|---|---|
| Create users | ✓ Yes | ✓ Yes |
| Update attributes | ✓ Yes | ✓ Yes |
| Deactivate users | ✓ Yes (Enterprise) | ✓ Yes (Enterprise) |
| Group to team mapping | ✓ Yes | ✓ Yes |
| Schema Discovery | ✓ Yes | Limited |
Critical limitation: User deactivation requires Enterprise plan. Lower tiers can create and update users but cannot automatically remove access when employees leave.
What's missing
For engineering teams managing pipeline access and build visibility, the group-to-team mapping works well when it's available. But the Enterprise requirement for deprovisioning means most teams either overpay or accept incomplete automation.
What IT admins are saying
Buildkite's Enterprise-only SCIM requirement creates cost barriers for growing engineering teams:
- Enterprise plan required for deprovisioning - Teams on Business plans can provision users but can't automatically remove access when people leave
- Custom SAML SCIM needs support intervention - Non-standard IdP configurations require opening support tickets to enable SCIM
- JIT provisioning billing delays - Users aren't charged until first login, making capacity planning difficult
SCIM deprovisioning is only available on Enterprise plans, so we're stuck manually removing users on our Business plan.
You need to contact support to enable SCIM for custom SAML providers... it's not self-service like other apps.
The recurring theme
Buildkite forces engineering teams to choose between manual user management on lower-tier plans or expensive Enterprise upgrades just to get basic deprovisioning capabilities.
The decision
| Your Situation | Recommendation |
|---|---|
| Small dev team (<10 developers) on Team plan | Manual management with SSO is sufficient |
| Growing engineering org (15+ users) | Use Stitchflow: Enterprise costs exceed automation benefits |
| Enterprise already paying custom pricing | Evaluate native SCIM vs. Stitchflow based on total cost |
| Multi-team CI/CD with complex pipeline access | Use Stitchflow: group-to-team mapping automation essential |
| Cost-conscious orgs avoiding Enterprise tier | Use Stitchflow: start with a free gap diagnostic, then build the workflow across every app without asking your team to own the plumbing. |
The bottom line
Buildkite has no native SCIM. That means one more workflow gap in offboarding, access reviews, and license cleanup unless your team handles it another way.
Close the Buildkite workflow gap
Buildkite is one gap in a broader workflow. Stitchflow builds and maintains the offboarding, access review, or license workflow across every app in your environment.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Not specifiedPlan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- Enterprise plan required for SCIM deprovisioning
- Custom SAML SCIM requires feature flag from support
- JIT provisioning delays billing until first login
Configuration for Okta
Integration type
Okta Integration Network (OIN) app
Prerequisite
SSO must be configured before enabling SCIM.
Where to enable
Pro required for SCIM
Use Stitchflow for automated provisioning.
Configuration for Entra ID
Integration type
Microsoft Entra Gallery app
Prerequisite
SSO must be configured before enabling SCIM.
Where to enable
Pro required for SCIM
Use Stitchflow for automated provisioning.
Close the workflow gap in
Buildkite
Buildkite has no native SCIM. That leaves one more workflow gap in offboarding, access reviews, and license cleanup unless your team handles it another way.
Start with the free gap diagnostic


