Summary and recommendation
Instatus, the status page platform used by DevOps and engineering teams, does not support SCIM provisioning on any plan. While Instatus offers SAML SSO on their Business plan ($300/month), this only handles authentication for existing users—not automated provisioning or deprovisioning. Team members must still be manually added to Instatus, and when employees leave or change roles, their access must be manually revoked. This creates a significant operational burden for IT teams managing multiple engineering tools.
For organizations using status pages to communicate service incidents, manual user management introduces compliance risks. Former employees may retain access to sensitive infrastructure status information, and new team members face delays getting the access they need during critical incidents. The disconnect between your identity provider and Instatus means IT teams lose visibility into who has access to what, especially problematic for SOX or SOC 2 compliance where access reviews are required.
The strategic alternative
Instatus has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | No |
| SSO available? | Yes |
| SSO protocol | SAML 2.0, Google SSO |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | Via third-party | ❌ | SAML SSO supported but no SCIM provisioning. Custom SAML integration possible. |
| Microsoft Entra ID | Via third-party | ❌ | SAML SSO supported but no SCIM provisioning documented. |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages Instatus accounts manually. Here's what that costs:
The Instatus pricing problem
Instatus gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Pro | $20/month | ||
| Business | $300/month | ||
| Enterprise | Custom quote |
Provisioning options
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Pro | $20/month | ||
| Business | $300/month | ||
| Enterprise | Custom quote |
What this means in practice
IT admins face a 15x price jump from Pro ($20/month) to Business ($300/month) just to get SAML SSO - and still get zero automation for user lifecycle management.
Annual cost impact
Even at the Business tier, every user addition, role change, or deactivation requires manual intervention in the Instatus dashboard. For DevOps and engineering teams that need rapid onboarding/offboarding, this creates significant operational overhead.
Additional constraints
Summary of challenges
- Instatus does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What Instatus actually offers for identity
SAML SSO (Business plan - $300/month)
Instatus provides SAML 2.0 authentication on their Business plan:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0, Google SSO |
| Supported IdPs | Okta, Entra ID, OneLogin, Google Workspace, generic SAML |
| Plan requirement | Business ($300/month) |
| User provisioning | Manual only - no SCIM |
| JIT provisioning | ❌ Not supported |
The reality: You're paying $300/month primarily for SSO access. The Business plan includes other features like advanced analytics and custom integrations, but no automated user provisioning exists.
What you get for $300/month
The provisioning gap: Instatus has no SCIM implementation. Every user addition, role change, or departure requires manual intervention in their dashboard. For engineering and DevOps teams managing incident response, this means:
75% of teams using Instatus just need reliable SSO and basic user management - not the advanced analytics that justify the Business tier pricing.
What IT admins are saying
Instatus's lack of SCIM provisioning creates manual overhead for IT teams managing status page access:
- Manual team member management across all plans - no automated provisioning
- SAML SSO requires expensive Business plan ($300/month) jump from Pro ($20/month)
- Teams must manually add/remove users when employees join or leave
- No just-in-time provisioning even with SSO configured
SAML SSO is available on the Business plan. Team members need to be manually added to your Instatus team before they can use SSO to log in.
Unlimited team members on all plans, but you still have to manage them manually - there's no SCIM or automated provisioning available.
The recurring theme
Even ops teams that can justify the Business plan for SAML SSO still face manual user lifecycle management. Every time someone joins the DevOps team or leaves the company, IT must remember to update Instatus separately from their identity provider.
The decision
| Your Situation | Recommendation |
|---|---|
| Small DevOps team (<10 users) | Manual management is acceptable |
| Stable engineering team with low turnover | Manual management with SAML SSO on Business plan |
| Growing ops team (15+ users) | Use Stitchflow: automation essential for scaling |
| Enterprise with compliance requirements | Use Stitchflow: automation essential for audit trail |
| Multi-region incident response teams | Use Stitchflow: automation strongly recommended |
The bottom line
Instatus is a solid status page platform with flat-rate pricing, but it offers no SCIM provisioning capabilities whatsoever. Even with SAML SSO on the $300/month Business plan, all team management remains manual. For operations teams that need automated user provisioning and deprovision workflows, Stitchflow is the only viable path.
Make Instatus workflows AI-native
Instatus has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- No SCIM provisioning
- SAML SSO requires Business plan ($300/mo)
- Multiple private page auth options
Documentation not available.
Unlock SCIM for
Instatus
Instatus has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.
See how it works


