Stitchflow
Pingdom logo

Pingdom SCIM guide

Connector Only

How to automate Pingdom user provisioning, and what it actually costs

Summary and recommendation

Pingdom (SolarWinds) does not support SCIM provisioning on any plan. While Pingdom offers SAML 2.0 SSO through SolarWinds unified login and supports role mapping via IdP groups, this approach still requires manual user provisioning and lacks the automated lifecycle management that SCIM provides. IT teams must manually create user accounts before SSO can function, and deprovisioning requires separate administrative action in both the IdP and Pingdom systems.

This creates significant operational overhead for DevOps and IT operations teams who need to manage access for developers, site reliability engineers, and monitoring specialists. The IdP group-based role mapping helps with permissions but doesn't eliminate the manual provisioning bottleneck. For organizations with frequent team changes or compliance requirements around timely access revocation, this manual process introduces both security risks and administrative burden.

The strategic alternative

Pingdom has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?No
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaOkta integration for SSO authentication. Supports Schema Discovery and Attribute Writeback but no SCIM user provisioning.
Microsoft Entra IDPingdom available in Azure Marketplace for SSO. No SCIM provisioning - use IdP group-based role mapping for access control.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Pingdom accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Pingdom pricing problem

Pingdom gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Synthetic Monitoring$10-15/month
Real User Monitoring$10-15/month
Enterprise SuiteCustom quote

Provisioning options

PlanPriceSSOSCIM
Synthetic Monitoring$10-15/month
Real User Monitoring$10-15/month
Enterprise SuiteCustom quote

Key limitation: No SCIM support exists across any Pingdom plan level. This is an architectural limitation, not a pricing tier restriction.

What this means in practice

Without SCIM, every Pingdom user requires manual intervention:

New hires
IT must manually create accounts in Pingdom before users can access via SSO
Role changes
Permission updates require manual changes in both the IdP groups AND Pingdom
Offboarding
Users must be manually deprovisioned from Pingdom (SSO logout alone isn't sufficient)
Audit compliance
No automated user lifecycle reporting - requires manual reconciliation

The only partial automation is role mapping through IdP groups, which still requires manual account creation first.

Additional constraints

SolarWinds dependency
SSO runs through SolarWinds Unified Login, adding another layer of complexity
Community requests ignored
SCIM has been repeatedly requested on SolarWinds THWACK forums with no roadmap commitment
Organization role requirement
Users need proper organization-level roles in Pingdom to successfully authenticate via SSO
First login friction
Initial login must occur from the IdP portal page, not directly to Pingdom

Summary of challenges

  • Pingdom does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What Pingdom actually offers for identity

SAML SSO (via SolarWinds Unified Login)

Pingdom supports SAML 2.0 integration through the SolarWinds platform:

SettingDetails
ProtocolSAML 2.0
Supported IdPsOkta, Entra ID, Google Workspace, OneLogin, generic SAML
ConfigurationConfigure via SolarWinds unified login portal
InitiationSP-initiated and IdP-initiated
Role mappingBased on IdP group membership

Critical limitation: Users must have an organization role assigned to successfully log in. Role mapping relies entirely on IdP group membership - no automated user provisioning exists.

Okta Integration (via OIN)

The official Okta Integration Network listing for Pingdom shows:

FeatureSupported?
SAML SSO✓ Yes
OIDC SSO❌ No
Create users❌ No
Update users❌ No
Deactivate users❌ No
Group push❌ No
SCIM provisioning❌ No

Microsoft Entra Integration

Available through Azure Marketplace with similar limitations:

SAML SSO authentication only
No automated user provisioning
Role assignment through IdP group mapping
Manual user management required

The bottom line: Pingdom has SSO but zero SCIM capabilities. IT admins are stuck with manual user provisioning and rely on IdP group-based role mapping for access control. The SolarWinds community has explicitly requested SCIM on their THWACK forums, but no timeline exists for native support.

What IT admins are saying

Community sentiment on Pingdom's provisioning capabilities centers around the complete absence of SCIM support, forcing IT teams into manual user management workflows.

  • No SCIM provisioning available despite community requests
  • Manual user creation required for every team member
  • Role management limited to IdP group mapping workarounds
  • Part of larger SolarWinds suite complicates identity management

SCIM requested as feature on THWACK forums

SolarWinds Community feedback

Users must have organization role to log in

SolarWinds Documentation

SAML 2.0 SSO via SolarWinds unified login. Role mapping based on IdP group membership. First login must be from IdP portal page. No SCIM - manual user management without groups.

Integration documentation

The recurring theme

Despite having SSO through SolarWinds unified login, Pingdom offers no automated provisioning. IT teams must manually create every user account and rely on IdP group-based role mapping as their only automation option—a workaround that doesn't eliminate the initial provisioning burden.

The decision

Your SituationRecommendation
Small DevOps team (<10 users) with stable membershipManual management is workable - use SSO with group-based roles
Growing engineering organization (15+ users)Use Stitchflow: manual provisioning doesn't scale
Enterprise with compliance requirementsUse Stitchflow: automation essential for audit trails
Multi-team monitoring with frequent role changesUse Stitchflow: group-based mapping isn't granular enough
SolarWinds suite user with existing workflowsConsider manual management if other SolarWinds tools lack SCIM too

The bottom line

Pingdom delivers solid website monitoring but completely lacks SCIM provisioning - you're stuck with manual user management and basic group-based role mapping. For DevOps teams that need automated provisioning with proper audit trails, Stitchflow eliminates the manual overhead entirely.

Make Pingdom workflows AI-native

Pingdom has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No SCIM provisioningRole mapping via IdP groups insteadUsers must have organization role to log inPart of SolarWinds Application Management suiteSCIM requested as feature on THWACK forums

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No SCIM provisioning
  • Role mapping via IdP groups instead
  • Users must have organization role to log in
  • Part of SolarWinds Application Management suite
  • SCIM requested as feature on THWACK forums

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Where to enable

Okta Admin Console → Applications → Pingdom → Sign On

Okta integration for SSO authentication. Supports Schema Discovery and Attribute Writeback but no SCIM user provisioning.

Use Stitchflow for automated provisioning.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app

Where to enable

Entra admin center → Enterprise applications → Pingdom → Single sign-on

Pingdom available in Azure Marketplace for SSO. No SCIM provisioning - use IdP group-based role mapping for access control.

Use Stitchflow for automated provisioning.

Unlock SCIM for
Pingdom

Pingdom has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
Pingdom logo
Pingdom
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
Aha! logo

Aha!

No SCIM

Product Management / Roadmapping

ProvisioningNot Supported
Manual Cost$11,754/yr

Aha! Roadmaps, the product roadmapping platform, does not support SCIM provisioning on any plan. While Aha! offers SAML 2.0 SSO integration with identity providers like Okta, Entra ID, and OneLogin, this only handles authentication through JIT (Just-In-Time) provisioning. The critical limitation: JIT provisioning creates user accounts with no default role or access permissions, requiring administrators to manually configure access for each user after they first sign in. For product teams managing strategic roadmaps and stakeholder access, this creates significant operational overhead. Since product roadmaps contain sensitive strategic information and stakeholder access typically varies by product area, IT administrators must manually assign appropriate roles and workspace permissions after each user is provisioned. There's no automatic deprovisioning when users leave the organization, creating potential security gaps. This manual process becomes particularly problematic for larger product organizations where dozens of stakeholders across different business units need carefully managed access to specific roadmaps.

View full guide
Appcues logo

Appcues

No SCIM

Product Adoption / User Onboarding

ProvisioningNot Supported
Manual Cost$11,754/yr

Appcues, the product adoption platform used by product managers and growth teams, explicitly does not support SCIM provisioning on any plan—not even Enterprise. While Appcues offers SAML 2.0 SSO integration starting at the Enterprise tier with just-in-time (JIT) provisioning, this only creates users during first login and provides no automated deprovisioning capabilities. For product teams where access needs change frequently as people move between projects or leave the company, this creates a significant security gap. The lack of SCIM means IT teams must manually manage user lifecycle for Appcues accounts, even though the platform handles sensitive product analytics and user flow data. When employees leave or change roles, their Appcues access remains active until manually revoked—a compliance risk that's particularly problematic given Appcues' role in tracking user behavior and product metrics. With MAU-based pricing starting at $300/month and scaling significantly with usage, paying for orphaned accounts also creates unnecessary cost bloat.

View full guide