Summary and recommendation
Honeycomb, the observability platform for complex systems, does not support native SCIM provisioning on any plan. While Honeycomb offers SAML SSO integration with identity providers like Okta and Microsoft Entra ID (available on Pro and Enterprise plans), this only handles authentication. Users must still be manually invited to teams, assigned roles through the Honeycomb interface, and managed through a combination of SSO groups and manual configuration. The platform assigns users a default role via SSO, but any role changes or team assignments require manual intervention.
This creates a significant operational burden for IT teams managing observability access across development and operations teams. Manual user management becomes particularly problematic as engineering teams scale and require dynamic access to different Honeycomb environments and datasets. Without automated provisioning, IT admins face ongoing ticket volume for access requests, role changes, and offboarding - precisely the kind of repetitive work that SCIM is designed to eliminate.
The strategic alternative
Honeycomb has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | No |
| SSO available? | Yes |
| SSO protocol | SAML 2.0 |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | ✓ | ❌ | Honeycomb supports Okta SAML SSO but no SCIM provisioning found in documentation. |
| Microsoft Entra ID | ✓ | ❌ | Honeycomb supports Microsoft Entra ID SAML SSO. No SCIM documentation found. |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages Honeycomb accounts manually. Here's what that costs:
The Honeycomb pricing problem
Honeycomb gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Free | $0 (20M events/mo) | ||
| Pro | $100/mo (100-450M events) | ||
| Enterprise | $24,000/yr (10B events base) |
Pricing and provisioning matrix
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Free | $0 (20M events/mo) | ||
| Pro | $100/mo (100-450M events) | ||
| Enterprise | $24,000/yr (10B events base) |
What this means in practice
Without SCIM provisioning, IT teams must manually create and manage Honeycomb accounts for every user, even on the $24,000/year Enterprise plan. This creates several operational challenges:
Additional constraints
Summary of challenges
- Honeycomb does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What Honeycomb actually offers for identity
SAML SSO (Pro and Enterprise plans)
Honeycomb supports SAML 2.0 integration with identity providers:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0 |
| Supported IdPs | Okta, Microsoft Entra ID, Google Workspace |
| User creation | Manual only - no automated provisioning |
| Role assignment | Default role assigned via SSO |
| Team management | Team-based access control |
Critical limitation: Honeycomb's SSO implementation provides authentication only. User accounts must be manually created and managed within Honeycomb - there's no SCIM provisioning to automate user lifecycle management.
What's actually missing
The current identity offerings fall short for enterprise IT management:
Bottom line: Honeycomb's Pro ($100/month) and Enterprise ($24,000/year) plans include basic SAML SSO, but zero provisioning automation. You're paying enterprise prices for manual user management overhead.
What IT admins are saying
Honeycomb's lack of automated provisioning creates operational overhead for observability teams:
- Manual user account creation required despite SSO being configured
- No automated role assignment based on group membership
- Team access must be managed separately from identity provider
- Offboarding process requires manual cleanup in Honeycomb
Even with SAML SSO working, we still have to manually invite users to Honeycomb and assign them to the right teams. It defeats the purpose of centralized identity management.
The disconnect between our IdP groups and Honeycomb's team structure means we're constantly playing catch-up when people change roles or leave the company.
The recurring theme
While Honeycomb provides solid observability capabilities, the manual user lifecycle management creates friction for IT teams who expect automated provisioning with their observability tools.
The decision
| Your Situation | Recommendation |
|---|---|
| Small observability team (<10 users) | Manual management is acceptable |
| Development team with stable roster | Manual management with SSO for authentication |
| Growing engineering organization (25+ users) | Use Stitchflow: automation essential for scale |
| Enterprise with frequent team changes | Use Stitchflow: automation essential for user lifecycle |
| Multi-environment deployments with compliance needs | Use Stitchflow: automation strongly recommended for audit trail |
The bottom line
Honeycomb provides excellent observability insights, but it completely lacks SCIM provisioning capabilities across all plans. With SSO requiring Pro+ plans and all user management remaining manual, growing engineering teams face significant administrative overhead. For organizations that need automated user provisioning without the manual burden, Stitchflow is the clear solution.
Make Honeycomb workflows AI-native
Honeycomb has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- SSO available on Pro and Enterprise plans
- No native SCIM provisioning documented
- Team-based access control via SSO
- Users assigned default role via SSO
Documentation not available.
Configuration for Entra ID
Integration type
Microsoft Entra Gallery app
Where to enable
Honeycomb supports Microsoft Entra ID SAML SSO. No SCIM documentation found.
Use Stitchflow for automated provisioning.
Unlock SCIM for
Honeycomb
Honeycomb has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.
See how it works


