Summary and recommendation
HashiCorp Vault, the secrets management platform trusted by enterprise security teams, does not support SCIM provisioning on any plan. While Vault Enterprise offers SAML 2.0 and OIDC authentication for human users, this only handles login—not automated user lifecycle management. IT teams must manually create user accounts and manage Vault policies separately from their identity provider. This creates a dangerous gap where departing employees may retain access to critical secrets and API tokens, even after being deprovisioned from other systems.
The security implications are severe. Without automated deprovisioning, former employees could potentially access production secrets, database credentials, and API keys long after termination. Manual policy management also introduces configuration drift and increases the risk of privilege creep as teams grow. For organizations managing hundreds of secrets across multiple environments, this manual overhead becomes a significant operational burden and compliance risk.
The strategic alternative
HashiCorp Vault has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | Yes |
| SSO available? | Yes |
| SSO protocol | SAML 2.0, OIDC |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | Via third-party | ❌ | OIDC and SAML authentication supported. No SCIM provisioning. Vault policies and access managed within Vault. OIDC enables Okta groups for policy assignment. |
| Microsoft Entra ID | Via third-party | ❌ | SAML (Enterprise v1.15.0+) and OIDC auth supported. No SCIM provisioning. Vault policies and tokens managed separately. |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages HashiCorp Vault accounts manually. Here's what that costs:
The HashiCorp Vault pricing problem
HashiCorp Vault gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Vault OSS | Free (self-managed) | ||
| HCP Vault | $0.03/hour (~$262/month) | ||
| Enterprise | Custom pricing |
Pricing structure
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Vault OSS | Free (self-managed) | ||
| HCP Vault | $0.03/hour (~$262/month) | ||
| Enterprise | Custom pricing |
Key pricing considerations
What this means in practice
Without SCIM provisioning, IT teams face these operational challenges:
Manual user management
Policy management complexity
Token and secrets sprawl
Additional constraints
Summary of challenges
- HashiCorp Vault does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What HashiCorp Vault actually offers for identity
SAML SSO (Enterprise only)
HashiCorp Vault's Enterprise edition (v1.15.0+) includes SAML 2.0 authentication for human users:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0 |
| Supported IdPs | Okta, Entra ID, generic SAML providers |
| Configuration | Configure SAML auth method in Vault |
| User requirement | Vault policies must be configured separately |
Key limitation: SAML authentication gets users into Vault, but all access policies, tokens, and permissions must be managed within Vault itself. There's no automated provisioning of user accounts or policy assignments.
OIDC Authentication (All editions)
Available in both open-source and commercial versions:
| Feature | Details |
|---|---|
| Protocol | OpenID Connect |
| IdP support | Okta, Entra ID, Google Workspace, generic OIDC |
| Group claims | Supported for policy assignment |
| Token management | Manual configuration required |
What's Missing
HashiCorp Vault has no SCIM provisioning capabilities:
| SCIM Feature | Supported? |
|---|---|
| Create users | ❌ No |
| Update users | ❌ No |
| Deactivate users | ❌ No |
| Group membership | ❌ No |
| Automated policy assignment | ❌ No |
The reality: Vault handles authentication (who you are) but requires manual configuration of authorization (what you can access). Every user's policies, token permissions, and secret access must be configured within Vault's own policy engine.
For security teams managing hundreds of developers across multiple projects, this means maintaining parallel access control systems—your IdP for authentication and Vault's policy system for authorization.
What IT admins are saying
HashiCorp Vault's lack of SCIM provisioning creates ongoing administrative overhead for security teams managing access at scale:
- Manual user management required - No automated provisioning means every developer and security team member must be manually added to Vault policies
- Vault policy management separate from IdP - Access controls live entirely within Vault, disconnected from your identity provider's group structure
- Enterprise license gate for SAML - Basic SSO authentication requires expensive Enterprise licensing, while OIDC works across all tiers
- Token lifecycle complexity - No automated deprovisioning means manual cleanup of tokens and policies when employees leave
SAML auth requires Enterprise license... Vault policies manage access separately.
User accounts must exist in Parse.ly Dash to use single sign-on... SSO does not substitute account creation.
The recurring theme
Vault provides enterprise-grade secrets management but forces IT teams to maintain a parallel user management system. When your security team scales beyond a handful of users, the lack of automated provisioning becomes a significant operational burden.
The decision
| Your Situation | Recommendation |
|---|---|
| Small security team (<10 users) with basic Vault usage | Manual user management is acceptable |
| Development teams using Vault OSS for secrets management | Stick with OIDC auth and manual policy assignment |
| Enterprise security teams (25+ users) with frequent changes | Use Stitchflow: automate user lifecycle and policy mapping |
| Multi-environment deployments with complex access patterns | Use Stitchflow: essential for consistent policy enforcement |
| Organizations with strict compliance requirements | Use Stitchflow: automated audit trails and access reviews |
The bottom line
HashiCorp Vault is critical infrastructure for secrets management, but it has zero SCIM support—even Enterprise only gets you SAML authentication while policies remain manually managed. For security teams that need automated user provisioning and policy assignment without the operational overhead, Stitchflow bridges the gap between your identity provider and Vault's access controls.
Make HashiCorp Vault workflows AI-native
HashiCorp Vault has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- SAML auth requires Enterprise license
- No SCIM provisioning
- OIDC auth available in all editions
- Policies and access managed within Vault
Documentation not available.
Configuration for Okta
Integration type
Okta Integration Network (OIN) app
Prerequisite
SSO must be configured before enabling SCIM.
Where to enable
Docs
OIDC and SAML authentication supported. No SCIM provisioning. Vault policies and access managed within Vault. OIDC enables Okta groups for policy assignment.
Use Stitchflow for automated provisioning.
Configuration for Entra ID
Integration type
Microsoft Entra Gallery app
Prerequisite
SSO must be configured before enabling SCIM.
Where to enable
SAML (Enterprise v1.15.0+) and OIDC auth supported. No SCIM provisioning. Vault policies and tokens managed separately.
Use Stitchflow for automated provisioning.
Unlock SCIM for
HashiCorp Vault
HashiCorp Vault has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.
See how it works


