Summary and recommendation
SaltStack Config (formerly VMware Aria Automation Config, now part of Broadcom's portfolio) does not support SCIM provisioning on any plan. While the platform offers SAML 2.0 SSO with just-in-time provisioning through identity providers like Okta, Entra ID, and Google Workspace, this creates a significant operational gap: users provisioned via SAML cannot be deleted through the SaltStack UI. This limitation forces IT teams into a hybrid management model where user creation happens automatically but deprovisioning requires manual intervention or API scripting.
The lack of proper SCIM support creates compliance risks for organizations managing critical infrastructure automation. When employees leave or change roles, their access to configuration management systems must be revoked immediately—but SaltStack's SAML-only approach leaves IT teams with no clean way to handle lifecycle management. The platform's limit of only 2 SAML providers simultaneously further constrains enterprise identity architecture options.
The strategic alternative
SaltStack has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | Yes |
| SSO available? | Yes |
| SSO protocol | SAML 2.0, OAuth/OIDC |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | ✓ | ❌ | SAML and OAuth/OIDC SSO supported with Okta. No SCIM provisioning documented. JIT user provisioning via SAML. Users provisioned via SAML cannot be deleted through UI. |
| Microsoft Entra ID | ✓ | ❌ | SAML SSO with Microsoft Entra ID possible. SCIM provisioning available for vCenter/vSphere integration but not SaltStack Config specifically. JIT user provisioning via SAML. |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages SaltStack accounts manually. Here's what that costs:
The SaltStack pricing problem
SaltStack gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| SCIM provisioning | ❌ Not available | ||
| SAML JIT provisioning | ✓ Available | ||
| Manual user creation | ✓ Available | ||
| LDAP sync | ✓ Available | Requires on-premises directory |
Provisioning options
| Method | Availability | Limitations |
|---|---|---|
| SCIM provisioning | ❌ Not available | No SCIM endpoint exists |
| SAML JIT provisioning | ✓ Available | Users cannot be deleted via UI |
| Manual user creation | ✓ Available | No automation possible |
| LDAP sync | ✓ Available | Requires on-premises directory |
What this means in practice
No automated deprovisioning: When employees leave or change roles, you cannot automatically remove their SaltStack access. Users created through SAML JIT cannot be deleted through the SaltStack UI - they must be manually managed through backend processes or remain as dormant accounts.
Limited scalability: For organizations with frequent role changes or seasonal contractors, the lack of automated provisioning creates significant administrative overhead. Each user must be manually managed or relies on JIT creation that cannot be properly cleaned up.
Compliance gaps: Without automated deprovisioning, maintaining SOX or SOC compliance becomes challenging. Terminated users may retain system access until manual cleanup occurs.
Additional constraints
Summary of challenges
- SaltStack does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What SaltStack actually offers for identity
SAML SSO (Enterprise)
SaltStack Config (VMware Tanzu Salt) provides SAML 2.0 single sign-on integration with major identity providers:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0, OAuth/OIDC |
| Supported IdPs | Okta, OneLogin, ADFS, Shibboleth, Google Workspace |
| JIT provisioning | ✓ Yes |
| SP-initiated | ✓ Yes |
| IdP-initiated | ✓ Yes |
| Provider limit | Maximum 2 SAML or 2 LDAP providers simultaneously |
User Provisioning Limitations
SaltStack's identity management has significant gaps:
Enterprise Licensing Reality
Since Broadcom's acquisition of VMware, SaltStack Config licensing has become:
Bottom line: SaltStack provides basic SAML SSO with JIT provisioning, but lacks any automated user lifecycle management capabilities. The inability to properly deprovision users creates ongoing security and compliance risks.
What IT admins are saying
SaltStack's limited provisioning capabilities frustrate IT teams managing infrastructure automation tools:
- No SCIM provisioning support means manual user management at scale
- SAML-provisioned users cannot be deleted through the UI, creating cleanup headaches
- Maximum of 2 SAML or 2 LDAP providers simultaneously limits flexibility
- Broadcom acquisition has created uncertainty around future licensing and feature development
Users provisioned via SAML cannot be deleted through UI.
Can use SAML and LDAP simultaneously... Max 2 SAML or 2 LDAP providers at once.
The recurring theme
While SaltStack offers SAML SSO with JIT provisioning, the inability to programmatically manage user lifecycles through SCIM creates operational overhead for IT teams who need to maintain clean user directories and proper offboarding processes.
The decision
| Your Situation | Recommendation |
|---|---|
| Small DevOps team (<10 users) | Manual management with SAML SSO is workable |
| Growing IT operations team (10-50 users) | Use Stitchflow: automation essential for scaling |
| Enterprise with strict access controls | Use Stitchflow: automation required for compliance |
| Multi-environment deployments | Use Stitchflow: consistent provisioning across environments |
| Organizations requiring user lifecycle management | Use Stitchflow: SaltStack can't delete SAML users via UI |
The bottom line
SaltStack Config offers SAML SSO with JIT provisioning but no SCIM support, and critically, users provisioned via SAML cannot be deleted through the UI. For IT teams managing configuration at scale who need proper user lifecycle management and provisioning automation, Stitchflow eliminates these operational headaches.
Make SaltStack workflows AI-native
SaltStack has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- No SCIM provisioning documented
- Cannot delete SAML-provisioned users via UI
- Max 2 SAML or 2 LDAP providers at once
- Acquired by Broadcom - licensing may change
Documentation not available.
Unlock SCIM for
SaltStack
SaltStack has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.
See how it works


