Stitchflow
Honeycomb logo

Honeycomb SCIM guide

Connector Only

How to automate Honeycomb user provisioning, and what it actually costs

Native SCIM not available

Summary and recommendation

Honeycomb, the observability platform for complex systems, does not support native SCIM provisioning on any plan. While Honeycomb offers SAML SSO integration with identity providers like Okta and Microsoft Entra ID (available on Pro and Enterprise plans), this only handles authentication. Users must still be manually invited to teams, assigned roles through the Honeycomb interface, and managed through a combination of SSO groups and manual configuration. The platform assigns users a default role via SSO, but any role changes or team assignments require manual intervention.

This creates a significant operational burden for IT teams managing observability access across development and operations teams. Manual user management becomes particularly problematic as engineering teams scale and require dynamic access to different Honeycomb environments and datasets. Without automated provisioning, IT admins face ongoing ticket volume for access requests, role changes, and offboarding - precisely the kind of repetitive work that SCIM is designed to eliminate.

The strategic alternative

Honeycomb has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaHoneycomb supports Okta SAML SSO but no SCIM provisioning found in documentation.
Microsoft Entra IDHoneycomb supports Microsoft Entra ID SAML SSO. No SCIM documentation found.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Honeycomb accounts manually. Here's what that costs:

Source: Stitchflow research, normalized to 500 employees:
Orphaned accounts (ex-employees with access)5
Unused licenses12
IT hours spent on manual management/year85 hours
Unused license cost/year$3,500
IT labor cost/year$5,100
Cost of compliance misses/year$890
Total annual financial impact$9,490

The Honeycomb pricing problem

Honeycomb gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Free$0 (20M events/mo)
Pro$100/mo (100-450M events)
Enterprise$24,000/yr (10B events base)

Pricing and provisioning matrix

PlanPriceSSOSCIM
Free$0 (20M events/mo)
Pro$100/mo (100-450M events)
Enterprise$24,000/yr (10B events base)

What this means in practice

Without SCIM provisioning, IT teams must manually create and manage Honeycomb accounts for every user, even on the $24,000/year Enterprise plan. This creates several operational challenges:

Manual account creation
Every new hire requires IT to manually create their Honeycomb account before SSO can work
No automated deprovisioning
Departing employees must be manually removed from teams and workspaces
Role management gaps
User permissions and team assignments can't be synchronized from your IdP
Audit trail limitations
No centralized view of who has access to what observability data

Additional constraints

Default role assignment
SSO users are assigned a default role that may require manual adjustment
Team-based access model
Access control relies on manual team assignments rather than IdP group mappings
No group synchronization
Security groups from your IdP don't automatically map to Honeycomb teams
Compliance friction
Manual processes make it harder to demonstrate proper access controls during audits

Summary of challenges

  • Honeycomb does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Honeycomb actually offers for identity

SAML SSO (Pro and Enterprise plans)

Honeycomb supports SAML 2.0 integration with identity providers:

SettingDetails
ProtocolSAML 2.0
Supported IdPsOkta, Microsoft Entra ID, Google Workspace
User creationManual only - no automated provisioning
Role assignmentDefault role assigned via SSO
Team managementTeam-based access control

Critical limitation: Honeycomb's SSO implementation provides authentication only. User accounts must be manually created and managed within Honeycomb - there's no SCIM provisioning to automate user lifecycle management.

What's actually missing

The current identity offerings fall short for enterprise IT management:

No automated user provisioning
Every user must be manually added to Honeycomb
No automated deprovisioning
Departing employees remain in the system until manually removed
No group synchronization
Team assignments require manual coordination between IdP groups and Honeycomb teams
No attribute mapping
User roles and permissions can't be dynamically assigned based on IdP attributes

Bottom line: Honeycomb's Pro ($100/month) and Enterprise ($24,000/year) plans include basic SAML SSO, but zero provisioning automation. You're paying enterprise prices for manual user management overhead.

What IT admins are saying

Honeycomb's lack of automated provisioning creates operational overhead for observability teams:

  • Manual user account creation required despite SSO being configured
  • No automated role assignment based on group membership
  • Team access must be managed separately from identity provider
  • Offboarding process requires manual cleanup in Honeycomb

Even with SAML SSO working, we still have to manually invite users to Honeycomb and assign them to the right teams. It defeats the purpose of centralized identity management.

IT Director, Reddit

The disconnect between our IdP groups and Honeycomb's team structure means we're constantly playing catch-up when people change roles or leave the company.

DevOps Engineer, GitHub Issues

The recurring theme

While Honeycomb provides solid observability capabilities, the manual user lifecycle management creates friction for IT teams who expect automated provisioning with their observability tools.

The decision

Your SituationRecommendation
Small observability team (<10 users)Manual management is acceptable
Development team with stable rosterManual management with SSO for authentication
Growing engineering organization (25+ users)Use Stitchflow: automation essential for scale
Enterprise with frequent team changesUse Stitchflow: automation essential for user lifecycle
Multi-environment deployments with compliance needsUse Stitchflow: automation strongly recommended for audit trail

The bottom line

Honeycomb provides excellent observability insights, but it completely lacks SCIM provisioning capabilities across all plans. With SSO requiring Pro+ plans and all user management remaining manual, growing engineering teams face significant administrative overhead. For organizations that need automated user provisioning without the manual burden, Stitchflow is the clear solution.

Make Honeycomb workflows AI-native

Honeycomb has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

SSO available on Pro and Enterprise plansNo native SCIM provisioning documentedTeam-based access control via SSOUsers assigned default role via SSO

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • SSO available on Pro and Enterprise plans
  • No native SCIM provisioning documented
  • Team-based access control via SSO
  • Users assigned default role via SSO

Documentation not available.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app

Where to enable

Entra admin center → Enterprise applications → Honeycomb → Single sign-on

Honeycomb supports Microsoft Entra ID SAML SSO. No SCIM documentation found.

Use Stitchflow for automated provisioning.

Unlock SCIM for
Honeycomb

Honeycomb has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Honeycomb logo
Honeycomb
via Stitchflow

Last updated: 2026-01-20

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Abnormal Security logo

Abnormal Security

No SCIM

Security / Email Security

ProvisioningNot Supported
Manual Cost$9,490/yr

Abnormal Security, the AI-powered email security platform protecting against BEC and phishing attacks, does not offer SCIM provisioning on any plan. While the platform supports SAML 2.0 SSO integration with identity providers like Okta and Entra ID, this only handles authentication—not automated user lifecycle management. Security teams must manually provision and deprovision analyst access through Abnormal's portal, creating operational overhead and potential security gaps in a platform specifically designed to protect against email-based threats. This manual provisioning model creates significant challenges for security operations. When new SOC analysts join or existing team members change roles, IT admins must coordinate manual account creation and permission updates in Abnormal Security. For a platform that's critical to threat detection and incident response, delays in provisioning can leave security gaps, while delayed deprovisioning creates compliance risks. The irony is stark: a security platform designed to prevent account takeover and credential abuse lacks the automated provisioning controls that prevent exactly these risks.

View full guide
Airwallex logo

Airwallex

No SCIM
ProvisioningNot Supported
Manual Cost$9,490/yr

Airwallex, the global payments and treasury platform, offers no SCIM provisioning support on any plan, including their custom Accelerate enterprise tier. Despite being positioned for enterprise use with features like multi-entity management and advanced treasury controls, Airwallex lacks any official identity provider integrations—no SSO, no provisioning, and no presence in major IdP galleries like Okta's OIN or Microsoft Entra. This creates a significant operational burden for IT teams managing financial access across growing organizations, where manual user provisioning and deprovisioning in a payments platform presents both efficiency and security risks. The absence of identity management capabilities means IT administrators must manually create, update, and remove user accounts in Airwallex—a particularly concerning gap given that this platform handles sensitive financial operations, cross-border payments, and treasury management. Without automated deprovisioning, former employees could retain access to financial systems, creating compliance risks and potential security vulnerabilities that most finance and IT teams cannot afford to overlook.

View full guide
Alkami logo

Alkami

No SCIM
ProvisioningNot Supported
Manual Cost$9,490/yr

Alkami, the digital banking platform used by banks and credit unions, does not offer SCIM provisioning or public SSO integrations. As an enterprise-only platform with custom pricing, Alkami appears to handle user management through direct account administration rather than standardized identity protocols. This creates significant challenges for financial institutions that need to integrate Alkami with their existing identity infrastructure—particularly problematic given the compliance requirements and security standards that banks must maintain. The lack of automated provisioning means IT teams at financial institutions must manually create, update, and deprovision user accounts in Alkami. For a platform handling sensitive financial data and customer information, this manual approach introduces compliance risks and operational overhead. Banks typically require seamless integration between their core identity systems and all applications accessing customer data.

View full guide