Summary and recommendation
Spinnaker, the open source continuous delivery platform originally developed by Netflix, does not support SCIM provisioning in any configuration. As a self-hosted solution, Spinnaker relies entirely on local identity management rather than SaaS-style automated provisioning. While Spinnaker supports SAML 2.0, OAuth, and LDAP authentication through identity providers like Okta and Azure AD, user accounts must still be manually managed within the platform itself. Authorization can be handled through Okta groups or local roles.yml configuration, but the initial user provisioning and ongoing lifecycle management remains a manual process.
This creates a significant operational burden for DevOps and platform engineering teams managing Spinnaker deployments at scale. Without SCIM automation, IT administrators must manually create accounts for every developer and engineer who needs access to deployment pipelines—a time-intensive process that becomes increasingly problematic as engineering teams grow. The lack of automated deprovisioning also creates security risks when team members leave or change roles, as their Spinnaker access may remain active longer than intended.
The strategic alternative
Spinnaker has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | No |
| SSO available? | Yes |
| SSO protocol | SAML 2.0 / OAuth / LDAP |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | ✓ | ❌ | SAML SSO supported with manual configuration. No SCIM provisioning. Use Okta groups for authorization/RBAC. |
| Microsoft Entra ID | ✓ | ❌ | SAML/OAuth SSO can be configured. No SCIM provisioning for self-hosted platform. |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages Spinnaker accounts manually. Here's what that costs:
The Spinnaker pricing problem
Spinnaker gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Open Source | Free (self-hosted) | ||
| Enterprise (OpsMx/Armory) | Custom quote |
Pricing structure
| Plan | Price | SCIM |
|---|---|---|
| Open Source | Free (self-hosted) | ❌ Not available |
| Enterprise (OpsMx/Armory) | Custom quote | ❌ Not available |
What this means in practice
Without SCIM provisioning, IT admins must:
The self-hosted nature compounds these challenges. Unlike SaaS applications where vendors can add SCIM support, Spinnaker requires your team to build and maintain any automation.
Additional constraints
Summary of challenges
- Spinnaker does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What Spinnaker actually offers for identity
SAML/OAuth SSO (Self-hosted configuration)
Spinnaker supports multiple authentication methods for self-hosted deployments:
| Protocol | Support |
|---|---|
| SAML 2.0 | ✓ Yes |
| OAuth | ✓ Yes |
| LDAP | ✓ Yes |
| X.509 | ✓ Yes |
| GitHub Teams | ✓ Yes |
| Azure Groups | ✓ Yes |
The reality: This is a self-hosted open source platform, not a SaaS application. You configure authentication directly in your Spinnaker instance using YAML files and environment variables.
Authorization via External Groups
Spinnaker can map IdP groups to application permissions:
Users authenticate via SAML/OAuth, but authorization happens through group membership evaluation at login time.
What's completely missing
| Feature | Available? |
|---|---|
| SCIM provisioning | ❌ No |
| JIT user creation | ❌ No |
| Automated deprovisioning | ❌ No |
| SaaS-style user management | ❌ No |
The fundamental issue: Spinnaker is open source continuous delivery software that you host yourself. There's no vendor-managed identity system because there's no vendor-managed service. You're responsible for all user lifecycle management through your own processes and tooling.
Enterprise support from OpsMx or Armory doesn't change this - they provide commercial support and additional features, but Spinnaker remains a self-hosted platform without centralized identity management.
What IT admins are saying
Spinnaker's open-source nature means IT teams face the full burden of identity management for their continuous delivery platform:
- No automated user provisioning - all account management is manual
- Self-hosted identity stores require ongoing maintenance and security updates
- RBAC relies on external group mappings that can drift out of sync
- No centralized audit trail for user access across the deployment pipeline
Spinnaker is open source - self-hosted with local identity management. Use Okta groups for RBAC.
Authorization via Okta groups or roles.yml
The recurring theme
While Spinnaker offers powerful continuous delivery capabilities, IT teams must build and maintain their own identity infrastructure. Every user change requires manual intervention, and there's no SaaS-style provisioning to automate the DevOps team's access lifecycle.
The decision
| Your Situation | Recommendation |
|---|---|
| Small DevOps team (<10 engineers) | Manual management with SSO authentication |
| Self-hosted with dedicated platform team | Manual management: you already handle infrastructure |
| Enterprise with 50+ developers | Use Stitchflow: automation essential for scale |
| Multi-environment deployments with role complexity | Use Stitchflow: automation strongly recommended |
| Compliance requirements needing audit trails | Use Stitchflow: automation essential for governance |
The bottom line
Spinnaker is a powerful open-source continuous delivery platform, but as a self-hosted solution, it has no SCIM provisioning capabilities—only SAML/OAuth SSO with manual user management. For enterprises running Spinnaker at scale who need automated provisioning and proper audit trails, Stitchflow bridges the gap between your IdP and your CD platform.
Make Spinnaker workflows AI-native
Spinnaker has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- Open source - self-hosted
- No SCIM provisioning
- Supports OAuth, SAML, LDAP, X.509
- Authorization via Okta groups or roles.yml
Documentation not available.
Unlock SCIM for
Spinnaker
Spinnaker has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.
See how it works


