Summary and recommendation
Puppet Enterprise, the configuration management platform for infrastructure automation, does not offer SCIM provisioning on any plan. While Puppet Enterprise provides SAML 2.0 SSO integration with major identity providers like Okta and PingID, this only handles authentication for existing users. User accounts must be manually created and managed within Puppet Enterprise's Role-Based Access Control (RBAC) system, requiring IT teams to maintain separate user lifecycle processes outside their centralized identity management workflows.
This creates a significant operational gap for DevOps and IT operations teams managing infrastructure at scale. Without automated provisioning, new engineers joining infrastructure teams require manual account creation in Puppet Enterprise, and departing team members need manual deprovisioning—a critical security risk when dealing with production infrastructure access. The lack of group-based provisioning also means IT cannot automatically assign appropriate roles based on team membership, forcing administrators to manually configure permissions for each user's infrastructure management responsibilities.
The strategic alternative
Puppet has no native SCIM. That leaves a workflow gap in offboarding, access reviews, and license cleanup unless your team handles the app another way. Stitchflow builds and maintains the IT workflows your team still runs manually, across every app, including the ones without APIs.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | No |
| SSO available? | Yes |
| SSO protocol | SAML 2.0 |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | ✓ | ❌ | SAML SSO documented. No SCIM or provisioning support found. Manual user management required. |
| Microsoft Entra ID | ✓ | ❌ | SAML SSO likely supported (any SAML 2.0 IdP). No SCIM or provisioning documented. |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages Puppet accounts manually. Here's what that costs:
The Puppet pricing problem
Puppet gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| SCIM | ❌ Not available | ||
| SAML JIT | ❌ Not supported | Users must be pre-created | |
| Manual | ✓ Available | Requires PE admin access | |
| API | Unknown |
Provisioning options
| Method | Availability | User Management | Limitations |
|---|---|---|---|
| SCIM | ❌ Not available | N/A | No automated provisioning |
| SAML JIT | ❌ Not supported | Manual account creation required | Users must be pre-created |
| Manual | ✓ Available | Admin console | Requires PE admin access |
| API | Unknown | Potential custom integration | No documented provisioning API |
What this means in practice
For a 500-node Puppet deployment ($60K+/year)
The workflow reality
1. New hire request comes in → IT creates Puppet account manually 2. Role change → Admin logs into Puppet to modify permissions 3. Termination → Hope someone remembers to disable the Puppet account 4. Audit time → Export user lists and cross-reference with HR systems
Additional constraints
Summary of challenges
- Puppet does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What Puppet actually offers for identity
SAML SSO (Enterprise plans)
Puppet Enterprise provides SAML 2.0 authentication starting with version 2021.2.0+:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0 |
| Supported IdPs | Okta, PingID, Salesforce, any SAML 2.0 provider |
| Configuration | Access control > SSO settings with attribute binding |
| User requirement | Manual user creation required before SSO login |
Critical limitation: Puppet's SAML implementation requires manual user provisioning. There's no just-in-time (JIT) provisioning or automated account creation.
No SCIM Provisioning
Puppet Enterprise has no documented SCIM support whatsoever:
| Feature | Supported? |
|---|---|
| SCIM provisioning | ❌ No |
| Create users | ❌ Manual only |
| Update users | ❌ Manual only |
| Deactivate users | ❌ Manual only |
| Group sync | ❌ Manual only |
The Manual Reality
Without SCIM, your IT team faces:
For infrastructure automation software, the lack of user provisioning automation is particularly ironic.
What IT admins are saying
Puppet Enterprise's lack of automated provisioning forces IT teams into manual user management workflows:
- No SCIM provisioning support documented anywhere in Puppet's official documentation
- Manual user creation required even after configuring SAML SSO
- Configuration complexity with attribute binding requirements for proper SSO setup
- Enterprise-level pricing required just to get basic SSO functionality
SAML SSO with Okta, PingID, Salesforce. Configure in Access control > SSO. Attribute binding maps PE attributes to IdP.
SAML SSO requires v2021.2.0+
The recurring theme
Puppet Enterprise provides enterprise-grade configuration management but treats user provisioning like it's still 2015. IT teams pay enterprise prices for per-node licensing but still manually manage user accounts, creating operational overhead that scales poorly with team growth.
The decision
| Your Situation | Recommendation |
|---|---|
| Small DevOps team (<10 nodes) | Manual user management is workable with free evaluation |
| Established infrastructure team with low turnover | Manual management with SAML SSO for authentication |
| Large enterprise deployment (100+ nodes) | Use Stitchflow: automation essential for scale |
| Multi-environment setups with frequent team changes | Use Stitchflow: automation strongly recommended |
| Organizations with compliance requirements | Use Stitchflow: automation essential for audit trail |
The bottom line
Puppet has no native SCIM. That means one more workflow gap in offboarding, access reviews, and license cleanup unless your team handles it another way.
Close the Puppet workflow gap
Puppet is one gap in a broader workflow. Stitchflow builds and maintains the offboarding, access review, or license workflow across every app in your environment.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- No SCIM provisioning documented
- SAML SSO requires v2021.2.0+
- Attribute binding configuration required
Documentation not available.
Close the workflow gap in
Puppet
Puppet has no native SCIM. That leaves one more workflow gap in offboarding, access reviews, and license cleanup unless your team handles it another way.
Start with the free gap diagnostic


