Summary and recommendation
SolarWinds does not offer standard SCIM provisioning across its IT management suite. While SolarWinds Service Desk supports SCIM through Okta's connector, other products in the suite rely on Azure AD Connect Cloud Sync for user provisioning - a Microsoft-specific solution that doesn't work with other identity providers. This fragmented approach means organizations using multiple SolarWinds products must manage different provisioning methods, and those using non-Microsoft IdPs are limited to manual user management for most tools.
This creates significant operational overhead for IT teams managing SolarWinds deployments. Without unified provisioning, administrators must manually create accounts in various SolarWinds products when onboarding new IT staff, network administrators, or DevOps engineers. The reliance on Azure AD Connect also locks organizations into Microsoft's ecosystem for automated provisioning, limiting flexibility for those standardized on Okta, Google Workspace, or OneLogin.
The strategic alternative
SolarWinds has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | Yes |
| SSO available? | Yes |
| SSO protocol | SAML 2.0 |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | ✓ | ❌ | SolarWinds Service Desk supports SWA, SAML, and SCIM via Okta. Schema discovery and attribute writeback supported. |
| Microsoft Entra ID | ✓ | ❌ | User provisioning via Azure AD Connect Cloud Sync (not standard SCIM endpoint). |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages SolarWinds accounts manually. Here's what that costs:
The SolarWinds pricing problem
SolarWinds gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Team | $19/user/mo | ||
| Business | $39/user/mo | ||
| Professional | $69/user/mo | ||
| Service Desk | Separate product |
Pricing structure
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Team | $19/user/mo | ||
| Business | $39/user/mo | ||
| Professional | $69/user/mo | ||
| Service Desk | Separate product |
What this means in practice
Product-specific provisioning
Cost implications
Additional constraints
Summary of challenges
- SolarWinds does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What SolarWinds actually offers for identity
SAML SSO (Available across all plans)
SolarWinds supports SAML 2.0 integration across their IT management suite:
| Setting | Details |
|---|---|
| Protocol | SAML 2.0 |
| Supported IdPs | Okta, Microsoft Entra, Google Workspace, OneLogin |
| Configuration | SP-initiated and IdP-initiated flows |
| Product coverage | All SolarWinds products |
Limited SCIM via Okta (Service Desk only)
SolarWinds Service Desk offers SCIM provisioning, but only through Okta's Integration Network:
| Feature | Service Desk via Okta | Other SolarWinds Products |
|---|---|---|
| Create users | ✓ Yes | ❌ No |
| Update attributes | ✓ Yes | ❌ No |
| Deactivate users | ✓ Yes | ❌ No |
| Custom attributes | ❌ Requires API/CSV | ❌ Requires API/CSV |
| Multi-IdP support | ❌ Okta only | ❌ No SCIM |
Microsoft Entra Integration
For Microsoft shops, SolarWinds offers user provisioning via Azure AD Connect Cloud Sync:
Critical gaps: Most SolarWinds products lack any automated provisioning. Even Service Desk limits SCIM to Okta-only environments. Custom attributes require manual API work or CSV imports across the entire suite.
What IT admins are saying
SolarWinds's fragmented provisioning approach across its product suite creates operational headaches for IT teams:
- Product-specific SCIM support - Only Service Desk has proper SCIM integration via Okta
- Inconsistent provisioning methods - Azure AD Connect for some products, manual CSV imports for others
- Custom attribute limitations - Role assignments and product-specific attributes require API calls or manual CSV uploads
- SSO/provisioning disconnect - SAML SSO works across products, but provisioning capabilities vary wildly
The user provisioning via Microsoft Entra/Azure AD Connect works for basic attributes, but anything custom still requires manual intervention.
We have SSO working across all SolarWinds products, but managing user access to different modules still requires going into each product individually.
The recurring theme
While SolarWinds supports SSO well, provisioning is a patchwork of different methods depending on which products you're using, forcing IT teams to manage multiple provisioning workflows for a single vendor.
The decision
| Your Situation | Recommendation |
|---|---|
| Small IT team (<20 users) using Service Desk only | Use Okta's native SCIM connector if available |
| Multiple SolarWinds products with mixed provisioning needs | Use Stitchflow: unified automation across all products |
| Enterprise with compliance requirements | Use Stitchflow: consistent audit trail and access controls |
| Azure AD shop needing automated provisioning | Use Stitchflow: proper SCIM vs. Azure AD Connect workarounds |
| Multi-product SolarWinds deployment (NPM, SAM, Service Desk) | Use Stitchflow: automation essential for complex environments |
The bottom line
SolarWinds' provisioning story is fragmented—Service Desk has SCIM via Okta, other products rely on Azure AD Connect, and custom attributes require API calls or CSV imports. For organizations running multiple SolarWinds products or needing consistent provisioning across their IT management stack, Stitchflow eliminates the complexity with unified automation.
Make SolarWinds workflows AI-native
SolarWinds has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- SCIM support varies by product
- Service Desk has SCIM via Okta connector
- Custom attributes require API/CSV
- SSO and provisioning not tightly coupled
Documentation not available.
Configuration for Okta
Integration type
Okta Integration Network (OIN) app
Prerequisite
SSO must be configured before enabling SCIM.
Where to enable
Docs
SolarWinds Service Desk supports SWA, SAML, and SCIM via Okta. Schema discovery and attribute writeback supported.
Use Stitchflow for automated provisioning.
Configuration for Entra ID
Integration type
Microsoft Entra Gallery app
Prerequisite
SSO must be configured before enabling SCIM.
Where to enable
User provisioning via Azure AD Connect Cloud Sync (not standard SCIM endpoint).
Use Stitchflow for automated provisioning.
Unlock SCIM for
SolarWinds
SolarWinds has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.
See how it works


