Summary and recommendation
Rapid7's Insight Platform, a leading vulnerability management and security analytics solution, does not support SCIM provisioning on any plan. While Rapid7 offers SAML 2.0 SSO integration through both Okta and Microsoft Entra, this only handles authentication—not user lifecycle management. IT teams must manually create, update, and deactivate user accounts in Rapid7, creating a significant operational burden for organizations managing security teams across multiple locations and roles.
This manual provisioning gap becomes particularly problematic for security-focused organizations where rapid onboarding and offboarding is critical. When security analysts join or leave teams, IT administrators must remember to manually provision access to Rapid7 alongside other security tools, increasing the risk of delayed access for new hires or orphaned accounts for departing employees. For compliance frameworks like SOC 2 that require documented user access management, this manual process creates additional audit complexity.
The strategic alternative
Rapid7 has no native SCIM. That leaves a workflow gap in offboarding, access reviews, and license cleanup unless your team handles the app another way. Stitchflow builds and maintains the IT workflows your team still runs manually, across every app, including the ones without APIs.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | No |
| SSO available? | Yes |
| SSO protocol | SAML 2.0 |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | ✓ | ❌ | SSO only via SAML |
| Microsoft Entra ID | ✓ | ❌ | SSO via SAML only |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages Rapid7 accounts manually. Here's what that costs:
The Rapid7 pricing problem
Rapid7 gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Pro | Not disclosed | ||
| Business | Not disclosed | ||
| Enterprise | Custom quote |
Pricing and provisioning support
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Pro | Not disclosed | ||
| Business | Not disclosed | ||
| Enterprise | Custom quote |
Rapid7 uses custom pricing across all tiers, with no publicly available rate cards. Enterprise contracts are required for SAML SSO functionality.
What this means in practice
Without automated provisioning, your security team faces significant operational overhead:
For security tools handling sensitive vulnerability data and asset information, these manual processes create both operational friction and compliance risks.
Additional constraints
Summary of challenges
- Rapid7 does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What Rapid7 actually offers for identity
SAML SSO Only
Rapid7 supports SAML 2.0 authentication through their Insight Platform:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0 |
| Supported IdPs | Okta, Microsoft Entra ID, custom SAML providers |
| Configuration | Manual XML metadata exchange |
| User requirement | Manual user creation in Rapid7 required |
Critical gap: Rapid7 offers no automated provisioning capabilities. Every user account must be manually created, updated, and deactivated within the Rapid7 platform.
Identity Provider Integration Status
| IdP | SSO Support | Provisioning | Method |
|---|---|---|---|
| Okta (OIN) | ✓ SAML | ❌ None | Manual only |
| Microsoft Entra | ✓ SAML | ❌ None | Manual only |
| Google Workspace | ✓ Custom SAML | ❌ None | Manual only |
What's Missing
For security platforms handling sensitive data and compliance requirements, manual user management creates significant operational overhead and potential security gaps when users aren't promptly deprovisioned.
What IT admins are saying
Rapid7's lack of automated provisioning creates operational overhead for security teams managing user access:
- Manual user creation required for every new team member
- No automated deprovisioning when employees leave the organization
- SSO authentication available but doesn't eliminate account management tasks
- IT teams must maintain separate user lists outside their identity provider
Even though we have SSO working, we still have to manually create every user account in Rapid7 before they can actually log in through our IdP.
The lack of SCIM support means we're basically doing double work - managing users in our directory and then again in Rapid7. For a security platform, you'd expect better integration.
The recurring theme
Despite SSO availability, Rapid7 requires manual user lifecycle management, forcing IT teams to maintain parallel user databases and creating security risks when departing employees aren't promptly deprovisioned.
The decision
| Your Situation | Recommendation |
|---|---|
| Small security team (<10 users) with minimal changes | Manual management acceptable |
| Stable security operations with low turnover | Continue with manual provisioning and SSO |
| Growing security organization (25+ users) | Use Stitchflow: automation essential for scale |
| Enterprise with compliance requirements | Use Stitchflow: automation critical for audit trails |
| Multi-team security deployments across business units | Use Stitchflow: centralized provisioning mandatory |
The bottom line
Rapid7 has no native SCIM. That means one more workflow gap in offboarding, access reviews, and license cleanup unless your team handles it another way.
Close the Rapid7 workflow gap
Rapid7 is one gap in a broader workflow. Stitchflow builds and maintains the offboarding, access review, or license workflow across every app in your environment.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- No SCIM support available
- Manual user provisioning required
- SSO available for authentication
Documentation not available.
Configuration for Okta
Integration type
Okta Integration Network (OIN) app
Where to enable
Docs
SSO only via SAML
Use Stitchflow for automated provisioning.
Configuration for Entra ID
Integration type
Microsoft Entra Gallery app
Where to enable
SSO via SAML only
Use Stitchflow for automated provisioning.
Close the workflow gap in
Rapid7
Rapid7 has no native SCIM. That leaves one more workflow gap in offboarding, access reviews, and license cleanup unless your team handles it another way.
Start with the free gap diagnostic


