Summary and recommendation
Rancher, SUSE's Kubernetes management platform, does not offer SCIM provisioning on any plan, including their Enterprise tier that starts at $7,594.99. While Rancher provides robust SAML 2.0 SSO integration with identity providers like Okta, Azure AD, and others, this only handles authentication. User provisioning relies entirely on Just-in-Time (JIT) provisioning, which creates accounts during first login but provides no lifecycle management for deprovisioning or role updates. Additionally, group-based access control requires an OpenLDAP backend for group search functionality, adding infrastructure complexity.
This creates a significant operational gap for IT teams managing Kubernetes environments at scale. Without automated deprovisioning, former employees retain access to critical container orchestration infrastructure until manually removed. The lack of role synchronization means permission changes in your IdP don't automatically reflect in Rancher, creating compliance risks in environments where developers and platform engineers need dynamic access to different clusters and projects. Given Rancher's recent shift to CPU/vCPU-based pricing (causing 4-9x cost increases for some enterprises), these manual administrative overhead costs compound the already substantial platform investment.
The strategic alternative
Rancher has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | Yes |
| SSO available? | Yes |
| SSO protocol | SAML 2.0 |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | ✓ | ❌ | SAML SSO only. No SCIM provisioning. JIT provisioning available. Requires OpenLDAP for group search. |
| Microsoft Entra ID | ✓ | ❌ | OAuth 2.0/OIDC authentication via Microsoft Graph API. No SCIM provisioning. |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages Rancher accounts manually. Here's what that costs:
The Rancher pricing problem
Rancher gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Community Edition | Free | ||
| Rancher Prime | Custom (CPU/vCPU-based) | ||
| Enterprise | $7,595 - $41,831/year |
Pricing structure
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Community Edition | Free | ||
| Rancher Prime | Custom (CPU/vCPU-based) | ||
| Enterprise | $7,595 - $41,831/year |
Key pricing changes: SUSE shifted from node-based to CPU/vCPU-based pricing in 2025, causing 4-9x cost increases for some enterprises migrating from legacy pricing models.
What this means in practice
Without SCIM, IT teams managing Rancher face several operational challenges:
Additional constraints
Summary of challenges
- Rancher does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What Rancher actually offers for identity
SAML 2.0 SSO (All Plans)
Rancher supports federated authentication through multiple identity providers:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0, OAuth 2.0/OIDC (Azure AD) |
| Supported IdPs | Okta, Azure AD, Ping, ADFS, Shibboleth, Keycloak, generic SAML |
| JIT Provisioning | ✓ Yes |
| Single Logout (SLO) | ✓ Yes |
| Group mapping | Requires OpenLDAP backend for SAML |
Key requirement: For SAML-based group mapping, you must configure an OpenLDAP backend to enable group search functionality. Azure AD integration uses Microsoft Graph API (the deprecated Azure AD Graph API is no longer supported).
What's Missing: SCIM Provisioning
Rancher's documentation contains no mention of SCIM provisioning capabilities:
| Feature | Supported? |
|---|---|
| Create users | ❌ No (JIT only) |
| Update users | ❌ No |
| Deactivate users | ❌ No |
| Group provisioning | ❌ No |
| Automated lifecycle | ❌ No |
Reality check: While Rancher handles SSO well, you're limited to just-in-time (JIT) provisioning. Users are created on first login, but there's no automated way to provision, update, or deprovision accounts. For Kubernetes platform management where access control is critical, this means manual user lifecycle management.
The OpenLDAP requirement for group mapping adds operational overhead—you need to maintain a separate directory service just to get proper group-based access controls working with SAML providers.
What IT admins are saying
Community sentiment on Rancher's provisioning capabilities reveals significant friction for IT teams managing Kubernetes environments at scale:
- No SCIM provisioning support forces manual user management despite enterprise pricing
- OpenLDAP backend requirement for group-based access adds unnecessary infrastructure complexity
- Recent CPU/vCPU-based pricing changes caught enterprises off guard with massive cost increases
- JIT provisioning helps with SSO but doesn't solve the broader automation gap
2025 CPU/vCPU-based pricing caused 4-9x cost increases for some enterprises
OpenLDAP needed for group search in SAML
The recurring theme
Rancher offers solid Kubernetes management and SAML SSO, but enterprises paying $7K+ annually still face manual provisioning workflows and unexpected infrastructure requirements that create operational overhead for IT teams.
The decision
| Your Situation | Recommendation |
|---|---|
| Small DevOps team (<10 users) on Community Edition | Manual management is acceptable |
| Mid-size platform team with stable membership | Manual management with SAML SSO for authentication |
| Enterprise with complex RBAC requirements | Use Stitchflow: automated role mapping essential |
| Multi-cluster environments with dynamic teams | Use Stitchflow: automation strongly recommended |
| Organizations requiring audit compliance | Use Stitchflow: automated provisioning trail required |
The bottom line
Rancher is an excellent Kubernetes management platform, but it completely lacks SCIM provisioning capabilities. You're limited to SAML SSO with manual user management or JIT provisioning—neither option scales well for enterprise environments with complex role-based access controls. For organizations that need true provisioning automation across their Rancher deployments, Stitchflow is the only viable solution.
Make Rancher workflows AI-native
Rancher has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- No SCIM provisioning documented
- OpenLDAP needed for group search in SAML
- SAML SLO supported
- Microsoft Graph API required for Azure AD (replaces deprecated Azure AD Graph API)
Documentation not available.
Configuration for Entra ID
Integration type
Microsoft Entra Gallery app
Prerequisite
SSO must be configured before enabling SCIM.
Where to enable
OAuth 2.0/OIDC authentication via Microsoft Graph API. No SCIM provisioning.
Use Stitchflow for automated provisioning.
Unlock SCIM for
Rancher
Rancher has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.
See how it works


