Summary and recommendation
Instatus, the status page platform used by DevOps and engineering teams, does not support SCIM provisioning on any plan. While Instatus offers SAML SSO on their Business plan ($300/month), this only handles authentication for existing users—not automated provisioning or deprovisioning. Team members must still be manually added to Instatus, and when employees leave or change roles, their access must be manually revoked. This creates a significant operational burden for IT teams managing multiple engineering tools.
For organizations using status pages to communicate service incidents, manual user management introduces compliance risks. Former employees may retain access to sensitive infrastructure status information, and new team members face delays getting the access they need during critical incidents. The disconnect between your identity provider and Instatus means IT teams lose visibility into who has access to what, especially problematic for SOX or SOC 2 compliance where access reviews are required.
The strategic alternative
Instatus has no native SCIM. That leaves a workflow gap in offboarding, access reviews, and license cleanup unless your team handles the app another way. Stitchflow builds and maintains the IT workflows your team still runs manually, across every app, including the ones without APIs.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | No |
| SSO available? | Yes |
| SSO protocol | SAML 2.0, Google SSO |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | Via third-party | ❌ | SAML SSO supported but no SCIM provisioning. Custom SAML integration possible. |
| Microsoft Entra ID | Via third-party | ❌ | SAML SSO supported but no SCIM provisioning documented. |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages Instatus accounts manually. Here's what that costs:
The Instatus pricing problem
Instatus gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Pro | $20/month | ||
| Business | $300/month | ||
| Enterprise | Custom quote |
Provisioning options
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Pro | $20/month | ||
| Business | $300/month | ||
| Enterprise | Custom quote |
What this means in practice
IT admins face a 15x price jump from Pro ($20/month) to Business ($300/month) just to get SAML SSO - and still get zero automation for user lifecycle management.
Annual cost impact
Even at the Business tier, every user addition, role change, or deactivation requires manual intervention in the Instatus dashboard. For DevOps and engineering teams that need rapid onboarding/offboarding, this creates significant operational overhead.
Additional constraints
Summary of challenges
- Instatus does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What Instatus actually offers for identity
SAML SSO (Business plan - $300/month)
Instatus provides SAML 2.0 authentication on their Business plan:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0, Google SSO |
| Supported IdPs | Okta, Entra ID, OneLogin, Google Workspace, generic SAML |
| Plan requirement | Business ($300/month) |
| User provisioning | Manual only - no SCIM |
| JIT provisioning | ❌ Not supported |
The reality: You're paying $300/month primarily for SSO access. The Business plan includes other features like advanced analytics and custom integrations, but no automated user provisioning exists.
What you get for $300/month
The provisioning gap: Instatus has no SCIM implementation. Every user addition, role change, or departure requires manual intervention in their dashboard. For engineering and DevOps teams managing incident response, this means:
75% of teams using Instatus just need reliable SSO and basic user management - not the advanced analytics that justify the Business tier pricing.
What IT admins are saying
Instatus's lack of SCIM provisioning creates manual overhead for IT teams managing status page access:
- Manual team member management across all plans - no automated provisioning
- SAML SSO requires expensive Business plan ($300/month) jump from Pro ($20/month)
- Teams must manually add/remove users when employees join or leave
- No just-in-time provisioning even with SSO configured
SAML SSO is available on the Business plan. Team members need to be manually added to your Instatus team before they can use SSO to log in.
Unlimited team members on all plans, but you still have to manage them manually - there's no SCIM or automated provisioning available.
The recurring theme
Even ops teams that can justify the Business plan for SAML SSO still face manual user lifecycle management. Every time someone joins the DevOps team or leaves the company, IT must remember to update Instatus separately from their identity provider.
The decision
| Your Situation | Recommendation |
|---|---|
| Small DevOps team (<10 users) | Manual management is acceptable |
| Stable engineering team with low turnover | Manual management with SAML SSO on Business plan |
| Growing ops team (15+ users) | Use Stitchflow: automation essential for scaling |
| Enterprise with compliance requirements | Use Stitchflow: automation essential for audit trail |
| Multi-region incident response teams | Use Stitchflow: automation strongly recommended |
The bottom line
Instatus has no native SCIM. That means one more workflow gap in offboarding, access reviews, and license cleanup unless your team handles it another way.
Close the Instatus workflow gap
Instatus is one gap in a broader workflow. Stitchflow builds and maintains the offboarding, access review, or license workflow across every app in your environment.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- No SCIM provisioning
- SAML SSO requires Business plan ($300/mo)
- Multiple private page auth options
Documentation not available.
Close the workflow gap in
Instatus
Instatus has no native SCIM. That leaves one more workflow gap in offboarding, access reviews, and license cleanup unless your team handles it another way.
Start with the free gap diagnostic


