Summary and recommendation
VMware Carbon Black Cloud (now part of Broadcom's portfolio) does not provide native SCIM provisioning capabilities. While SCIM functionality is available through Okta's connector with features like Group Linking and Schema Discovery, this creates a significant gap for organizations using other identity providers like Entra ID, Google Workspace, or OneLogin. For a critical endpoint security platform protecting against advanced threats, manual user provisioning creates both operational overhead and security risks—especially problematic when security analysts and SOC teams need immediate access during incident response scenarios.
The lack of universal SCIM support means IT teams face a choice between limiting themselves to Okta's ecosystem or maintaining manual provisioning workflows for their security platform. Given Carbon Black's role in threat detection and response, delayed user provisioning or deprovisioning can directly impact security posture and compliance requirements. With Broadcom's acquisition of VMware, pricing transparency has also decreased, making it difficult to assess the total cost of ownership for enterprise deployments.
The strategic alternative
Carbon Black has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | Yes |
| SSO available? | Yes |
| SSO protocol | SAML 2.0 |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | ✓ | ❌ | No SCIM available |
| Microsoft Entra ID | ✓ | ❌ | No SCIM available |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages Carbon Black accounts manually. Here's what that costs:
The Carbon Black pricing problem
Carbon Black gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Manual provisioning | Enterprise pricing (~$53/endpoint MSRP) | ||
| Okta SCIM connector | Enterprise pricing + Okta license | Okta-only, third-party dependency | |
| Other IdPs | Enterprise pricing | Manual provisioning only |
Provisioning options
| Method | Cost | Limitations |
|---|---|---|
| Manual provisioning | Enterprise pricing (~$53/endpoint MSRP) | No automation, manual user creation/deletion |
| Okta SCIM connector | Enterprise pricing + Okta license | Okta-only, third-party dependency |
| Other IdPs | Enterprise pricing | Manual provisioning only |
Carbon Black Cloud pricing
What this means in practice
For a 500-endpoint deployment, you're looking at ~$26,500/year minimum just for Carbon Black licenses, with no native way to automate user provisioning. If you're using Entra ID, Google Workspace, or OneLogin, you're stuck with manual user management despite paying enterprise prices.
The Okta connector provides SCIM 2.0 support with group linking and schema discovery, but creates a single point of failure. If Okta's connector breaks or has issues, your entire user provisioning workflow stops.
Additional constraints
Summary of challenges
- Carbon Black does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What Carbon Black actually offers for identity
SAML SSO (Enterprise pricing)
VMware Carbon Black Cloud supports SAML 2.0 integration with identity providers:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0 |
| Supported IdPs | Okta, Entra ID, OneLogin, generic SAML |
| JIT provisioning | ✓ Yes |
| SP-initiated | ✓ Yes |
| IdP-initiated | ✓ Yes |
Setup complexity: Documentation warns about SAML misconfiguration risks and recommends multiple browser sessions during setup to avoid lockouts.
SCIM provisioning (Okta only)
Carbon Black provides limited SCIM capabilities exclusively through Okta:
| Feature | Supported? |
|---|---|
| Native SCIM API | ❌ No |
| Okta SCIM connector | ✓ Yes |
| Entra ID provisioning | ❌ No |
| Google Workspace | ❌ No |
| OneLogin provisioning | ❌ No |
| Group linking | ✓ Yes (Okta only) |
| Schema discovery | ✓ Yes (Okta only) |
| Attribute writeback | ✓ Yes (Okta only) |
Critical limitation: If you're not using Okta as your primary IdP, there's no automated provisioning option. Entra ID, Google Workspace, and OneLogin users must manually manage Carbon Black accounts despite having SSO access.
What you're actually paying for
Carbon Black's Enterprise pricing (~$53/endpoint MSRP) includes the entire endpoint security platform - threat detection, behavioral analysis, incident response tools, and compliance reporting. The SCIM provisioning capability represents a fraction of what you're paying for.
For security teams that just need automated user provisioning, you're essentially buying a full EDR platform to get basic identity management features that only work with one IdP.
What IT admins are saying
Community sentiment on Carbon Black's provisioning limitations centers around manual overhead and SSO complexity:
- Native SCIM provisioning is not documented or available for most identity providers
- SAML SSO configuration is complex and prone to misconfigurations that lock out users
- Only Okta users get automated provisioning through a connector - everyone else is stuck with manual account management
- Concerns about pricing changes under Broadcom ownership affecting existing deployments
Multiple browser sessions recommended during SSO setup
SAML misconfiguration can lock out users
The recurring theme
Carbon Black forces most organizations into a manual provisioning workflow where security team access - arguably the most critical for incident response - requires IT to manually create and update user accounts separate from their identity provider.
The decision
| Your Situation | Recommendation |
|---|---|
| Small security team (<20 users) with Okta | Use native Okta integration for SCIM provisioning |
| Enterprise with mixed IdP environment | Use Stitchflow: works with any IdP at flat pricing |
| SOC teams requiring rapid incident response access | Use Stitchflow: automated provisioning prevents access delays |
| Organizations concerned about Broadcom pricing changes | Use Stitchflow: build complete workflows across every app in less than a week (~2 hours of your time). |
| Multi-tenant MSP managing multiple Carbon Black instances | Use Stitchflow: centralized automation across all tenants |
The bottom line
VMware Carbon Black Cloud offers SCIM provisioning only through Okta's connector, leaving Entra ID, Google Workspace, and OneLogin users without automation options. For security teams that can't afford manual provisioning delays during critical incidents, Stitchflow delivers consistent automation across any identity provider.
Make Carbon Black workflows AI-native
Carbon Black has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- Native SCIM not documented for Carbon Black Cloud
- SCIM via Okta integration with group linking/schema discovery
- Multiple browser sessions recommended during SSO setup
- SAML misconfiguration can lock out users
- Part of Broadcom portfolio - pricing model may change
Documentation not available.
Configuration for Okta
Integration type
Okta Integration Network (OIN) app
Prerequisite
SSO must be configured before enabling SCIM.
Where to enable
Docs
Enterprise required for SCIM
Use Stitchflow for automated provisioning.
Configuration for Entra ID
Integration type
Microsoft Entra Gallery app
Prerequisite
SSO must be configured before enabling SCIM.
Where to enable
Enterprise required for SCIM
Use Stitchflow for automated provisioning.
Unlock SCIM for
Carbon Black
Carbon Black has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.
See how it works


