Summary and recommendation
Pingdom (SolarWinds) does not support SCIM provisioning on any plan. While Pingdom offers SAML 2.0 SSO through SolarWinds unified login and supports role mapping via IdP groups, this approach still requires manual user provisioning and lacks the automated lifecycle management that SCIM provides. IT teams must manually create user accounts before SSO can function, and deprovisioning requires separate administrative action in both the IdP and Pingdom systems.
This creates significant operational overhead for DevOps and IT operations teams who need to manage access for developers, site reliability engineers, and monitoring specialists. The IdP group-based role mapping helps with permissions but doesn't eliminate the manual provisioning bottleneck. For organizations with frequent team changes or compliance requirements around timely access revocation, this manual process introduces both security risks and administrative burden.
The strategic alternative
Pingdom has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | No |
| SSO available? | Yes |
| SSO protocol | SAML 2.0 |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | ✓ | ❌ | Okta integration for SSO authentication. Supports Schema Discovery and Attribute Writeback but no SCIM user provisioning. |
| Microsoft Entra ID | ✓ | ❌ | Pingdom available in Azure Marketplace for SSO. No SCIM provisioning - use IdP group-based role mapping for access control. |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages Pingdom accounts manually. Here's what that costs:
The Pingdom pricing problem
Pingdom gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Synthetic Monitoring | $10-15/month | ||
| Real User Monitoring | $10-15/month | ||
| Enterprise Suite | Custom quote |
Provisioning options
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Synthetic Monitoring | $10-15/month | ||
| Real User Monitoring | $10-15/month | ||
| Enterprise Suite | Custom quote |
Key limitation: No SCIM support exists across any Pingdom plan level. This is an architectural limitation, not a pricing tier restriction.
What this means in practice
Without SCIM, every Pingdom user requires manual intervention:
The only partial automation is role mapping through IdP groups, which still requires manual account creation first.
Additional constraints
Summary of challenges
- Pingdom does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What Pingdom actually offers for identity
SAML SSO (via SolarWinds Unified Login)
Pingdom supports SAML 2.0 integration through the SolarWinds platform:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0 |
| Supported IdPs | Okta, Entra ID, Google Workspace, OneLogin, generic SAML |
| Configuration | Configure via SolarWinds unified login portal |
| Initiation | SP-initiated and IdP-initiated |
| Role mapping | Based on IdP group membership |
Critical limitation: Users must have an organization role assigned to successfully log in. Role mapping relies entirely on IdP group membership - no automated user provisioning exists.
Okta Integration (via OIN)
The official Okta Integration Network listing for Pingdom shows:
| Feature | Supported? |
|---|---|
| SAML SSO | ✓ Yes |
| OIDC SSO | ❌ No |
| Create users | ❌ No |
| Update users | ❌ No |
| Deactivate users | ❌ No |
| Group push | ❌ No |
| SCIM provisioning | ❌ No |
Microsoft Entra Integration
Available through Azure Marketplace with similar limitations:
The bottom line: Pingdom has SSO but zero SCIM capabilities. IT admins are stuck with manual user provisioning and rely on IdP group-based role mapping for access control. The SolarWinds community has explicitly requested SCIM on their THWACK forums, but no timeline exists for native support.
What IT admins are saying
Community sentiment on Pingdom's provisioning capabilities centers around the complete absence of SCIM support, forcing IT teams into manual user management workflows.
- No SCIM provisioning available despite community requests
- Manual user creation required for every team member
- Role management limited to IdP group mapping workarounds
- Part of larger SolarWinds suite complicates identity management
SCIM requested as feature on THWACK forums
Users must have organization role to log in
SAML 2.0 SSO via SolarWinds unified login. Role mapping based on IdP group membership. First login must be from IdP portal page. No SCIM - manual user management without groups.
The recurring theme
Despite having SSO through SolarWinds unified login, Pingdom offers no automated provisioning. IT teams must manually create every user account and rely on IdP group-based role mapping as their only automation option—a workaround that doesn't eliminate the initial provisioning burden.
The decision
| Your Situation | Recommendation |
|---|---|
| Small DevOps team (<10 users) with stable membership | Manual management is workable - use SSO with group-based roles |
| Growing engineering organization (15+ users) | Use Stitchflow: manual provisioning doesn't scale |
| Enterprise with compliance requirements | Use Stitchflow: automation essential for audit trails |
| Multi-team monitoring with frequent role changes | Use Stitchflow: group-based mapping isn't granular enough |
| SolarWinds suite user with existing workflows | Consider manual management if other SolarWinds tools lack SCIM too |
The bottom line
Pingdom delivers solid website monitoring but completely lacks SCIM provisioning - you're stuck with manual user management and basic group-based role mapping. For DevOps teams that need automated provisioning with proper audit trails, Stitchflow eliminates the manual overhead entirely.
Make Pingdom workflows AI-native
Pingdom has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- No SCIM provisioning
- Role mapping via IdP groups instead
- Users must have organization role to log in
- Part of SolarWinds Application Management suite
- SCIM requested as feature on THWACK forums
Documentation not available.
Configuration for Okta
Integration type
Okta Integration Network (OIN) app
Where to enable
Docs
Okta integration for SSO authentication. Supports Schema Discovery and Attribute Writeback but no SCIM user provisioning.
Use Stitchflow for automated provisioning.
Configuration for Entra ID
Integration type
Microsoft Entra Gallery app
Where to enable
Pingdom available in Azure Marketplace for SSO. No SCIM provisioning - use IdP group-based role mapping for access control.
Use Stitchflow for automated provisioning.
Unlock SCIM for
Pingdom
Pingdom has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.
See how it works


