Summary and recommendation
Puppet Enterprise, the configuration management platform for infrastructure automation, does not offer SCIM provisioning on any plan. While Puppet Enterprise provides SAML 2.0 SSO integration with major identity providers like Okta and PingID, this only handles authentication for existing users. User accounts must be manually created and managed within Puppet Enterprise's Role-Based Access Control (RBAC) system, requiring IT teams to maintain separate user lifecycle processes outside their centralized identity management workflows.
This creates a significant operational gap for DevOps and IT operations teams managing infrastructure at scale. Without automated provisioning, new engineers joining infrastructure teams require manual account creation in Puppet Enterprise, and departing team members need manual deprovisioning—a critical security risk when dealing with production infrastructure access. The lack of group-based provisioning also means IT cannot automatically assign appropriate roles based on team membership, forcing administrators to manually configure permissions for each user's infrastructure management responsibilities.
The strategic alternative
Puppet has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | No |
| SSO available? | Yes |
| SSO protocol | SAML 2.0 |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | ✓ | ❌ | SAML SSO documented. No SCIM or provisioning support found. Manual user management required. |
| Microsoft Entra ID | ✓ | ❌ | SAML SSO likely supported (any SAML 2.0 IdP). No SCIM or provisioning documented. |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages Puppet accounts manually. Here's what that costs:
The Puppet pricing problem
Puppet gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| SCIM | ❌ Not available | ||
| SAML JIT | ❌ Not supported | Users must be pre-created | |
| Manual | ✓ Available | Requires PE admin access | |
| API | Unknown |
Provisioning options
| Method | Availability | User Management | Limitations |
|---|---|---|---|
| SCIM | ❌ Not available | N/A | No automated provisioning |
| SAML JIT | ❌ Not supported | Manual account creation required | Users must be pre-created |
| Manual | ✓ Available | Admin console | Requires PE admin access |
| API | Unknown | Potential custom integration | No documented provisioning API |
What this means in practice
For a 500-node Puppet deployment ($60K+/year)
The workflow reality
1. New hire request comes in → IT creates Puppet account manually 2. Role change → Admin logs into Puppet to modify permissions 3. Termination → Hope someone remembers to disable the Puppet account 4. Audit time → Export user lists and cross-reference with HR systems
Additional constraints
Summary of challenges
- Puppet does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What Puppet actually offers for identity
SAML SSO (Enterprise plans)
Puppet Enterprise provides SAML 2.0 authentication starting with version 2021.2.0+:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0 |
| Supported IdPs | Okta, PingID, Salesforce, any SAML 2.0 provider |
| Configuration | Access control > SSO settings with attribute binding |
| User requirement | Manual user creation required before SSO login |
Critical limitation: Puppet's SAML implementation requires manual user provisioning. There's no just-in-time (JIT) provisioning or automated account creation.
No SCIM Provisioning
Puppet Enterprise has no documented SCIM support whatsoever:
| Feature | Supported? |
|---|---|
| SCIM provisioning | ❌ No |
| Create users | ❌ Manual only |
| Update users | ❌ Manual only |
| Deactivate users | ❌ Manual only |
| Group sync | ❌ Manual only |
The Manual Reality
Without SCIM, your IT team faces:
For infrastructure automation software, the lack of user provisioning automation is particularly ironic.
What IT admins are saying
Puppet Enterprise's lack of automated provisioning forces IT teams into manual user management workflows:
- No SCIM provisioning support documented anywhere in Puppet's official documentation
- Manual user creation required even after configuring SAML SSO
- Configuration complexity with attribute binding requirements for proper SSO setup
- Enterprise-level pricing required just to get basic SSO functionality
SAML SSO with Okta, PingID, Salesforce. Configure in Access control > SSO. Attribute binding maps PE attributes to IdP.
SAML SSO requires v2021.2.0+
The recurring theme
Puppet Enterprise provides enterprise-grade configuration management but treats user provisioning like it's still 2015. IT teams pay enterprise prices for per-node licensing but still manually manage user accounts, creating operational overhead that scales poorly with team growth.
The decision
| Your Situation | Recommendation |
|---|---|
| Small DevOps team (<10 nodes) | Manual user management is workable with free evaluation |
| Established infrastructure team with low turnover | Manual management with SAML SSO for authentication |
| Large enterprise deployment (100+ nodes) | Use Stitchflow: automation essential for scale |
| Multi-environment setups with frequent team changes | Use Stitchflow: automation strongly recommended |
| Organizations with compliance requirements | Use Stitchflow: automation essential for audit trail |
The bottom line
Puppet Enterprise is a robust configuration management platform, but it completely lacks SCIM provisioning capabilities. With only SAML SSO available and no automated user lifecycle management, scaling access management becomes a manual burden. For infrastructure teams that need provisioning automation without the operational overhead, Stitchflow is the clear solution.
Make Puppet workflows AI-native
Puppet has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- No SCIM provisioning documented
- SAML SSO requires v2021.2.0+
- Attribute binding configuration required
Documentation not available.
Unlock SCIM for
Puppet
Puppet has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.
See how it works


