Stitchflow
SolarWinds logo

SolarWinds SCIM guide

Connector Only

How to automate SolarWinds user provisioning, and what it actually costs

Summary and recommendation

SolarWinds does not offer standard SCIM provisioning across its IT management suite. While SolarWinds Service Desk supports SCIM through Okta's connector, other products in the suite rely on Azure AD Connect Cloud Sync for user provisioning - a Microsoft-specific solution that doesn't work with other identity providers. This fragmented approach means organizations using multiple SolarWinds products must manage different provisioning methods, and those using non-Microsoft IdPs are limited to manual user management for most tools.

This creates significant operational overhead for IT teams managing SolarWinds deployments. Without unified provisioning, administrators must manually create accounts in various SolarWinds products when onboarding new IT staff, network administrators, or DevOps engineers. The reliance on Azure AD Connect also locks organizations into Microsoft's ecosystem for automated provisioning, limiting flexibility for those standardized on Okta, Google Workspace, or OneLogin.

The strategic alternative

SolarWinds has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationNot available

Supported identity providers

IdPSSOSCIMNotes
OktaSolarWinds Service Desk supports SWA, SAML, and SCIM via Okta. Schema discovery and attribute writeback supported.
Microsoft Entra IDUser provisioning via Azure AD Connect Cloud Sync (not standard SCIM endpoint).
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages SolarWinds accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The SolarWinds pricing problem

SolarWinds gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Team$19/user/mo
Business$39/user/mo
Professional$69/user/mo
Service DeskSeparate product

Pricing structure

PlanPriceSSOSCIM
Team$19/user/mo
Business$39/user/mo
Professional$69/user/mo
Service DeskSeparate product

What this means in practice

Product-specific provisioning

Service Desk users can be provisioned via Okta's SCIM connector
Other SolarWinds products (Network Performance Monitor, Server & Application Monitor, etc.) require Azure AD Connect Cloud Sync or manual user management
No unified provisioning across the entire SolarWinds suite

Cost implications

Organizations need separate licensing for Service Desk to get any SCIM support
Multi-product SolarWinds deployments require multiple provisioning methods
IT teams manage different user onboarding workflows for different SolarWinds tools

Additional constraints

IdP dependency
SCIM only works with Okta for Service Desk - not a standard SCIM endpoint
Product fragmentation
Each SolarWinds product may have different user management requirements
Azure AD Connect dependency
Non-Service Desk products rely on Azure AD Connect Cloud Sync, not standard SCIM
Custom attributes
Role assignments and product-specific permissions require API calls or CSV imports
Decoupled architecture
SSO and provisioning aren't tightly integrated across products

Summary of challenges

  • SolarWinds does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What SolarWinds actually offers for identity

SAML SSO (Available across all plans)

SolarWinds supports SAML 2.0 integration across their IT management suite:

SettingDetails
ProtocolSAML 2.0
Supported IdPsOkta, Microsoft Entra, Google Workspace, OneLogin
ConfigurationSP-initiated and IdP-initiated flows
Product coverageAll SolarWinds products

Limited SCIM via Okta (Service Desk only)

SolarWinds Service Desk offers SCIM provisioning, but only through Okta's Integration Network:

FeatureService Desk via OktaOther SolarWinds Products
Create users✓ Yes❌ No
Update attributes✓ Yes❌ No
Deactivate users✓ Yes❌ No
Custom attributes❌ Requires API/CSV❌ Requires API/CSV
Multi-IdP support❌ Okta only❌ No SCIM

Microsoft Entra Integration

For Microsoft shops, SolarWinds offers user provisioning via Azure AD Connect Cloud Sync:

Method
Azure AD Connect Cloud Sync (not standard SCIM)
Supported operations
User creation, updates, deactivation
Limitation
Microsoft-specific, not portable to other IdPs

Critical gaps: Most SolarWinds products lack any automated provisioning. Even Service Desk limits SCIM to Okta-only environments. Custom attributes require manual API work or CSV imports across the entire suite.

What IT admins are saying

SolarWinds's fragmented provisioning approach across its product suite creates operational headaches for IT teams:

  • Product-specific SCIM support - Only Service Desk has proper SCIM integration via Okta
  • Inconsistent provisioning methods - Azure AD Connect for some products, manual CSV imports for others
  • Custom attribute limitations - Role assignments and product-specific attributes require API calls or manual CSV uploads
  • SSO/provisioning disconnect - SAML SSO works across products, but provisioning capabilities vary wildly

The user provisioning via Microsoft Entra/Azure AD Connect works for basic attributes, but anything custom still requires manual intervention.

SolarWinds documentation community feedback

We have SSO working across all SolarWinds products, but managing user access to different modules still requires going into each product individually.

IT Admin, Reddit

The recurring theme

While SolarWinds supports SSO well, provisioning is a patchwork of different methods depending on which products you're using, forcing IT teams to manage multiple provisioning workflows for a single vendor.

The decision

Your SituationRecommendation
Small IT team (<20 users) using Service Desk onlyUse Okta's native SCIM connector if available
Multiple SolarWinds products with mixed provisioning needsUse Stitchflow: unified automation across all products
Enterprise with compliance requirementsUse Stitchflow: consistent audit trail and access controls
Azure AD shop needing automated provisioningUse Stitchflow: proper SCIM vs. Azure AD Connect workarounds
Multi-product SolarWinds deployment (NPM, SAM, Service Desk)Use Stitchflow: automation essential for complex environments

The bottom line

SolarWinds' provisioning story is fragmented—Service Desk has SCIM via Okta, other products rely on Azure AD Connect, and custom attributes require API calls or CSV imports. For organizations running multiple SolarWinds products or needing consistent provisioning across their IT management stack, Stitchflow eliminates the complexity with unified automation.

Make SolarWinds workflows AI-native

SolarWinds has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

SCIM support varies by productService Desk has SCIM via Okta connectorCustom attributes require API/CSVSSO and provisioning not tightly coupled

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • SCIM support varies by product
  • Service Desk has SCIM via Okta connector
  • Custom attributes require API/CSV
  • SSO and provisioning not tightly coupled

Documentation not available.

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → SolarWinds → Sign On

SolarWinds Service Desk supports SWA, SAML, and SCIM via Okta. Schema discovery and attribute writeback supported.

Use Stitchflow for automated provisioning.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → SolarWinds → Single sign-on

User provisioning via Azure AD Connect Cloud Sync (not standard SCIM endpoint).

Use Stitchflow for automated provisioning.

Unlock SCIM for
SolarWinds

SolarWinds has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
SolarWinds logo
SolarWinds
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
Aha! logo

Aha!

No SCIM

Product Management / Roadmapping

ProvisioningNot Supported
Manual Cost$11,754/yr

Aha! Roadmaps, the product roadmapping platform, does not support SCIM provisioning on any plan. While Aha! offers SAML 2.0 SSO integration with identity providers like Okta, Entra ID, and OneLogin, this only handles authentication through JIT (Just-In-Time) provisioning. The critical limitation: JIT provisioning creates user accounts with no default role or access permissions, requiring administrators to manually configure access for each user after they first sign in. For product teams managing strategic roadmaps and stakeholder access, this creates significant operational overhead. Since product roadmaps contain sensitive strategic information and stakeholder access typically varies by product area, IT administrators must manually assign appropriate roles and workspace permissions after each user is provisioned. There's no automatic deprovisioning when users leave the organization, creating potential security gaps. This manual process becomes particularly problematic for larger product organizations where dozens of stakeholders across different business units need carefully managed access to specific roadmaps.

View full guide
Appcues logo

Appcues

No SCIM

Product Adoption / User Onboarding

ProvisioningNot Supported
Manual Cost$11,754/yr

Appcues, the product adoption platform used by product managers and growth teams, explicitly does not support SCIM provisioning on any plan—not even Enterprise. While Appcues offers SAML 2.0 SSO integration starting at the Enterprise tier with just-in-time (JIT) provisioning, this only creates users during first login and provides no automated deprovisioning capabilities. For product teams where access needs change frequently as people move between projects or leave the company, this creates a significant security gap. The lack of SCIM means IT teams must manually manage user lifecycle for Appcues accounts, even though the platform handles sensitive product analytics and user flow data. When employees leave or change roles, their Appcues access remains active until manually revoked—a compliance risk that's particularly problematic given Appcues' role in tracking user behavior and product metrics. With MAU-based pricing starting at $300/month and scaling significantly with usage, paying for orphaned accounts also creates unnecessary cost bloat.

View full guide