Stitchflow
Instatus logo

Instatus SCIM guide

Connector Only

How to automate Instatus user provisioning, and what it actually costs

Summary and recommendation

Instatus, the status page platform used by DevOps and engineering teams, does not support SCIM provisioning on any plan. While Instatus offers SAML SSO on their Business plan ($300/month), this only handles authentication for existing users—not automated provisioning or deprovisioning. Team members must still be manually added to Instatus, and when employees leave or change roles, their access must be manually revoked. This creates a significant operational burden for IT teams managing multiple engineering tools.

For organizations using status pages to communicate service incidents, manual user management introduces compliance risks. Former employees may retain access to sensitive infrastructure status information, and new team members face delays getting the access they need during critical incidents. The disconnect between your identity provider and Instatus means IT teams lose visibility into who has access to what, especially problematic for SOX or SOC 2 compliance where access reviews are required.

The strategic alternative

Instatus has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0, Google SSO
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaVia third-partySAML SSO supported but no SCIM provisioning. Custom SAML integration possible.
Microsoft Entra IDVia third-partySAML SSO supported but no SCIM provisioning documented.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Instatus accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Instatus pricing problem

Instatus gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Pro$20/month
Business$300/month
EnterpriseCustom quote

Provisioning options

PlanPriceSSOSCIM
Pro$20/month
Business$300/month
EnterpriseCustom quote

What this means in practice

IT admins face a 15x price jump from Pro ($20/month) to Business ($300/month) just to get SAML SSO - and still get zero automation for user lifecycle management.

Annual cost impact

Pro plan
$240/year (SSO unavailable)
Business plan
$3,600/year (SSO enabled, still no SCIM)
Price increase
$3,360/year just for SAML

Even at the Business tier, every user addition, role change, or deactivation requires manual intervention in the Instatus dashboard. For DevOps and engineering teams that need rapid onboarding/offboarding, this creates significant operational overhead.

Additional constraints

No JIT provisioning
Users must be manually created before they can authenticate via SAML
Status page focus
Instatus is purpose-built for status pages, not enterprise user management
Manual role assignment
Team roles and permissions require individual configuration
No group mapping
IdP groups cannot be automatically mapped to Instatus permissions

Summary of challenges

  • Instatus does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Instatus actually offers for identity

SAML SSO (Business plan - $300/month)

Instatus provides SAML 2.0 authentication on their Business plan:

SettingDetails
ProtocolSAML 2.0, Google SSO
Supported IdPsOkta, Entra ID, OneLogin, Google Workspace, generic SAML
Plan requirementBusiness ($300/month)
User provisioningManual only - no SCIM
JIT provisioning❌ Not supported

The reality: You're paying $300/month primarily for SSO access. The Business plan includes other features like advanced analytics and custom integrations, but no automated user provisioning exists.

What you get for $300/month

SAML SSO for team authentication
Private page access controls (Google SSO, IP whitelist, password, SAML)
Advanced analytics and reporting
Custom integrations and webhooks
Priority support

The provisioning gap: Instatus has no SCIM implementation. Every user addition, role change, or departure requires manual intervention in their dashboard. For engineering and DevOps teams managing incident response, this means:

New team members can't be automatically provisioned during onboarding
Role changes require manual updates across both your IdP and Instatus
Offboarding requires remember to manually remove users from status page access

75% of teams using Instatus just need reliable SSO and basic user management - not the advanced analytics that justify the Business tier pricing.

What IT admins are saying

Instatus's lack of SCIM provisioning creates manual overhead for IT teams managing status page access:

  • Manual team member management across all plans - no automated provisioning
  • SAML SSO requires expensive Business plan ($300/month) jump from Pro ($20/month)
  • Teams must manually add/remove users when employees join or leave
  • No just-in-time provisioning even with SSO configured

SAML SSO is available on the Business plan. Team members need to be manually added to your Instatus team before they can use SSO to log in.

Instatus documentation

Unlimited team members on all plans, but you still have to manage them manually - there's no SCIM or automated provisioning available.

IT admin on Reddit

The recurring theme

Even ops teams that can justify the Business plan for SAML SSO still face manual user lifecycle management. Every time someone joins the DevOps team or leaves the company, IT must remember to update Instatus separately from their identity provider.

The decision

Your SituationRecommendation
Small DevOps team (<10 users)Manual management is acceptable
Stable engineering team with low turnoverManual management with SAML SSO on Business plan
Growing ops team (15+ users)Use Stitchflow: automation essential for scaling
Enterprise with compliance requirementsUse Stitchflow: automation essential for audit trail
Multi-region incident response teamsUse Stitchflow: automation strongly recommended

The bottom line

Instatus is a solid status page platform with flat-rate pricing, but it offers no SCIM provisioning capabilities whatsoever. Even with SAML SSO on the $300/month Business plan, all team management remains manual. For operations teams that need automated user provisioning and deprovision workflows, Stitchflow is the only viable path.

Make Instatus workflows AI-native

Instatus has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No SCIM provisioningSAML SSO requires Business plan ($300/mo)Multiple private page auth options

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No SCIM provisioning
  • SAML SSO requires Business plan ($300/mo)
  • Multiple private page auth options

Documentation not available.

Unlock SCIM for
Instatus

Instatus has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Instatus logo
Instatus
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
Aha! logo

Aha!

No SCIM

Product Management / Roadmapping

ProvisioningNot Supported
Manual Cost$11,754/yr

Aha! Roadmaps, the product roadmapping platform, does not support SCIM provisioning on any plan. While Aha! offers SAML 2.0 SSO integration with identity providers like Okta, Entra ID, and OneLogin, this only handles authentication through JIT (Just-In-Time) provisioning. The critical limitation: JIT provisioning creates user accounts with no default role or access permissions, requiring administrators to manually configure access for each user after they first sign in. For product teams managing strategic roadmaps and stakeholder access, this creates significant operational overhead. Since product roadmaps contain sensitive strategic information and stakeholder access typically varies by product area, IT administrators must manually assign appropriate roles and workspace permissions after each user is provisioned. There's no automatic deprovisioning when users leave the organization, creating potential security gaps. This manual process becomes particularly problematic for larger product organizations where dozens of stakeholders across different business units need carefully managed access to specific roadmaps.

View full guide
Appcues logo

Appcues

No SCIM

Product Adoption / User Onboarding

ProvisioningNot Supported
Manual Cost$11,754/yr

Appcues, the product adoption platform used by product managers and growth teams, explicitly does not support SCIM provisioning on any plan—not even Enterprise. While Appcues offers SAML 2.0 SSO integration starting at the Enterprise tier with just-in-time (JIT) provisioning, this only creates users during first login and provides no automated deprovisioning capabilities. For product teams where access needs change frequently as people move between projects or leave the company, this creates a significant security gap. The lack of SCIM means IT teams must manually manage user lifecycle for Appcues accounts, even though the platform handles sensitive product analytics and user flow data. When employees leave or change roles, their Appcues access remains active until manually revoked—a compliance risk that's particularly problematic given Appcues' role in tracking user behavior and product metrics. With MAU-based pricing starting at $300/month and scaling significantly with usage, paying for orphaned accounts also creates unnecessary cost bloat.

View full guide