Stitchflow
SaltStack logo

SaltStack SCIM guide

Connector Only

How to automate SaltStack user provisioning, and what it actually costs

Summary and recommendation

SaltStack Config (formerly VMware Aria Automation Config, now part of Broadcom's portfolio) does not support SCIM provisioning on any plan. While the platform offers SAML 2.0 SSO with just-in-time provisioning through identity providers like Okta, Entra ID, and Google Workspace, this creates a significant operational gap: users provisioned via SAML cannot be deleted through the SaltStack UI. This limitation forces IT teams into a hybrid management model where user creation happens automatically but deprovisioning requires manual intervention or API scripting.

The lack of proper SCIM support creates compliance risks for organizations managing critical infrastructure automation. When employees leave or change roles, their access to configuration management systems must be revoked immediately—but SaltStack's SAML-only approach leaves IT teams with no clean way to handle lifecycle management. The platform's limit of only 2 SAML providers simultaneously further constrains enterprise identity architecture options.

The strategic alternative

SaltStack has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0, OAuth/OIDC
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaSAML and OAuth/OIDC SSO supported with Okta. No SCIM provisioning documented. JIT user provisioning via SAML. Users provisioned via SAML cannot be deleted through UI.
Microsoft Entra IDSAML SSO with Microsoft Entra ID possible. SCIM provisioning available for vCenter/vSphere integration but not SaltStack Config specifically. JIT user provisioning via SAML.
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages SaltStack accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The SaltStack pricing problem

SaltStack gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
SCIM provisioning❌ Not available
SAML JIT provisioning✓ Available
Manual user creation✓ Available
LDAP sync✓ Available
Requires on-premises directory

Provisioning options

MethodAvailabilityLimitations
SCIM provisioning❌ Not availableNo SCIM endpoint exists
SAML JIT provisioning✓ AvailableUsers cannot be deleted via UI
Manual user creation✓ AvailableNo automation possible
LDAP sync✓ AvailableRequires on-premises directory

What this means in practice

No automated deprovisioning: When employees leave or change roles, you cannot automatically remove their SaltStack access. Users created through SAML JIT cannot be deleted through the SaltStack UI - they must be manually managed through backend processes or remain as dormant accounts.

Limited scalability: For organizations with frequent role changes or seasonal contractors, the lack of automated provisioning creates significant administrative overhead. Each user must be manually managed or relies on JIT creation that cannot be properly cleaned up.

Compliance gaps: Without automated deprovisioning, maintaining SOX or SOC compliance becomes challenging. Terminated users may retain system access until manual cleanup occurs.

Additional constraints

Maximum 2 SAML providers
Cannot integrate with multiple identity providers simultaneously beyond this limit
Broadcom acquisition uncertainty
Recent ownership changes may affect licensing and integration roadmaps
Enterprise-only SSO
SAML authentication requires Enterprise-tier licensing with custom Broadcom pricing
UI deletion restrictions
SAML-provisioned users create permanent account records that cannot be removed through standard interfaces

Summary of challenges

  • SaltStack does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What SaltStack actually offers for identity

SAML SSO (Enterprise)

SaltStack Config (VMware Tanzu Salt) provides SAML 2.0 single sign-on integration with major identity providers:

SettingDetails
ProtocolSAML 2.0, OAuth/OIDC
Supported IdPsOkta, OneLogin, ADFS, Shibboleth, Google Workspace
JIT provisioning✓ Yes
SP-initiated✓ Yes
IdP-initiated✓ Yes
Provider limitMaximum 2 SAML or 2 LDAP providers simultaneously

User Provisioning Limitations

SaltStack's identity management has significant gaps:

No SCIM provisioning
Users can only be created through JIT provisioning via SAML
Cannot delete SAML users
Users provisioned through SAML authentication cannot be removed via the UI
Manual cleanup required
Deprovisioning must be handled outside the platform
Limited provider support
Can only configure 2 SAML providers at once

Enterprise Licensing Reality

Since Broadcom's acquisition of VMware, SaltStack Config licensing has become:

Contact-only pricing
No published rates or transparent pricing tiers
Enterprise-only features
Identity integration requires top-tier licensing
Uncertain roadmap
Multiple ownership changes may impact future development

Bottom line: SaltStack provides basic SAML SSO with JIT provisioning, but lacks any automated user lifecycle management capabilities. The inability to properly deprovision users creates ongoing security and compliance risks.

What IT admins are saying

SaltStack's limited provisioning capabilities frustrate IT teams managing infrastructure automation tools:

  • No SCIM provisioning support means manual user management at scale
  • SAML-provisioned users cannot be deleted through the UI, creating cleanup headaches
  • Maximum of 2 SAML or 2 LDAP providers simultaneously limits flexibility
  • Broadcom acquisition has created uncertainty around future licensing and feature development

Users provisioned via SAML cannot be deleted through UI.

VMware official documentation

Can use SAML and LDAP simultaneously... Max 2 SAML or 2 LDAP providers at once.

VMware Tanzu Salt configuration guide

The recurring theme

While SaltStack offers SAML SSO with JIT provisioning, the inability to programmatically manage user lifecycles through SCIM creates operational overhead for IT teams who need to maintain clean user directories and proper offboarding processes.

The decision

Your SituationRecommendation
Small DevOps team (<10 users)Manual management with SAML SSO is workable
Growing IT operations team (10-50 users)Use Stitchflow: automation essential for scaling
Enterprise with strict access controlsUse Stitchflow: automation required for compliance
Multi-environment deploymentsUse Stitchflow: consistent provisioning across environments
Organizations requiring user lifecycle managementUse Stitchflow: SaltStack can't delete SAML users via UI

The bottom line

SaltStack Config offers SAML SSO with JIT provisioning but no SCIM support, and critically, users provisioned via SAML cannot be deleted through the UI. For IT teams managing configuration at scale who need proper user lifecycle management and provisioning automation, Stitchflow eliminates these operational headaches.

Make SaltStack workflows AI-native

SaltStack has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

No SCIM provisioning documentedCannot delete SAML-provisioned users via UIMax 2 SAML or 2 LDAP providers at onceAcquired by Broadcom - licensing may change

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • No SCIM provisioning documented
  • Cannot delete SAML-provisioned users via UI
  • Max 2 SAML or 2 LDAP providers at once
  • Acquired by Broadcom - licensing may change

Documentation not available.

Unlock SCIM for
SaltStack

SaltStack has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
SaltStack logo
SaltStack
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Puppet logo

Puppet

No SCIM

IT Automation / Configuration Management

ProvisioningNot Supported
Manual Cost$11,754/yr

Puppet Enterprise, the configuration management platform for infrastructure automation, does not offer SCIM provisioning on any plan. While Puppet Enterprise provides SAML 2.0 SSO integration with major identity providers like Okta and PingID, this only handles authentication for existing users. User accounts must be manually created and managed within Puppet Enterprise's Role-Based Access Control (RBAC) system, requiring IT teams to maintain separate user lifecycle processes outside their centralized identity management workflows. This creates a significant operational gap for DevOps and IT operations teams managing infrastructure at scale. Without automated provisioning, new engineers joining infrastructure teams require manual account creation in Puppet Enterprise, and departing team members need manual deprovisioning—a critical security risk when dealing with production infrastructure access. The lack of group-based provisioning also means IT cannot automatically assign appropriate roles based on team membership, forcing administrators to manually configure permissions for each user's infrastructure management responsibilities.

View full guide
6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
Aha! logo

Aha!

No SCIM

Product Management / Roadmapping

ProvisioningNot Supported
Manual Cost$11,754/yr

Aha! Roadmaps, the product roadmapping platform, does not support SCIM provisioning on any plan. While Aha! offers SAML 2.0 SSO integration with identity providers like Okta, Entra ID, and OneLogin, this only handles authentication through JIT (Just-In-Time) provisioning. The critical limitation: JIT provisioning creates user accounts with no default role or access permissions, requiring administrators to manually configure access for each user after they first sign in. For product teams managing strategic roadmaps and stakeholder access, this creates significant operational overhead. Since product roadmaps contain sensitive strategic information and stakeholder access typically varies by product area, IT administrators must manually assign appropriate roles and workspace permissions after each user is provisioned. There's no automatic deprovisioning when users leave the organization, creating potential security gaps. This manual process becomes particularly problematic for larger product organizations where dozens of stakeholders across different business units need carefully managed access to specific roadmaps.

View full guide