Summary and recommendation
Spinnaker, the open source continuous delivery platform originally developed by Netflix, does not support SCIM provisioning in any configuration. As a self-hosted solution, Spinnaker relies entirely on local identity management rather than SaaS-style automated provisioning. While Spinnaker supports SAML 2.0, OAuth, and LDAP authentication through identity providers like Okta and Azure AD, user accounts must still be manually managed within the platform itself. Authorization can be handled through Okta groups or local roles.yml configuration, but the initial user provisioning and ongoing lifecycle management remains a manual process.
This creates a significant operational burden for DevOps and platform engineering teams managing Spinnaker deployments at scale. Without SCIM automation, IT administrators must manually create accounts for every developer and engineer who needs access to deployment pipelines—a time-intensive process that becomes increasingly problematic as engineering teams grow. The lack of automated deprovisioning also creates security risks when team members leave or change roles, as their Spinnaker access may remain active longer than intended.
The strategic alternative
Spinnaker has no native SCIM. That leaves a workflow gap in offboarding, access reviews, and license cleanup unless your team handles the app another way. Stitchflow builds and maintains the IT workflows your team still runs manually, across every app, including the ones without APIs.
Quick SCIM facts
| SCIM available? | No |
| SCIM tier required | N/A |
| SSO required first? | No |
| SSO available? | Yes |
| SSO protocol | SAML 2.0 / OAuth / LDAP |
| Documentation | Not available |
Supported identity providers
| IdP | SSO | SCIM | Notes |
|---|---|---|---|
| Okta | ✓ | ❌ | SAML SSO supported with manual configuration. No SCIM provisioning. Use Okta groups for authorization/RBAC. |
| Microsoft Entra ID | ✓ | ❌ | SAML/OAuth SSO can be configured. No SCIM provisioning for self-hosted platform. |
| Google Workspace | Via third-party | ❌ | No native support |
| OneLogin | Via third-party | ❌ | No native support |
The cost of not automating
Without SCIM (or an alternative like Stitchflow), your IT team manages Spinnaker accounts manually. Here's what that costs:
The Spinnaker pricing problem
Spinnaker gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.
Tier comparison
| Plan | Price | SSO | SCIM |
|---|---|---|---|
| Open Source | Free (self-hosted) | ||
| Enterprise (OpsMx/Armory) | Custom quote |
Pricing structure
| Plan | Price | SCIM |
|---|---|---|
| Open Source | Free (self-hosted) | ❌ Not available |
| Enterprise (OpsMx/Armory) | Custom quote | ❌ Not available |
What this means in practice
Without SCIM provisioning, IT admins must:
The self-hosted nature compounds these challenges. Unlike SaaS applications where vendors can add SCIM support, Spinnaker requires your team to build and maintain any automation.
Additional constraints
Summary of challenges
- Spinnaker does not provide native SCIM at any price tier
- Organizations must rely on third-party tools or manual provisioning
- Our research shows teams manually provisioning this app spend significant hidden costs annually
What Spinnaker actually offers for identity
SAML/OAuth SSO (Self-hosted configuration)
Spinnaker supports multiple authentication methods for self-hosted deployments:
| Protocol | Support |
|---|---|
| SAML 2.0 | ✓ Yes |
| OAuth | ✓ Yes |
| LDAP | ✓ Yes |
| X.509 | ✓ Yes |
| GitHub Teams | ✓ Yes |
| Azure Groups | ✓ Yes |
The reality: This is a self-hosted open source platform, not a SaaS application. You configure authentication directly in your Spinnaker instance using YAML files and environment variables.
Authorization via External Groups
Spinnaker can map IdP groups to application permissions:
Users authenticate via SAML/OAuth, but authorization happens through group membership evaluation at login time.
What's completely missing
| Feature | Available? |
|---|---|
| SCIM provisioning | ❌ No |
| JIT user creation | ❌ No |
| Automated deprovisioning | ❌ No |
| SaaS-style user management | ❌ No |
The fundamental issue: Spinnaker is open source continuous delivery software that you host yourself. There's no vendor-managed identity system because there's no vendor-managed service. You're responsible for all user lifecycle management through your own processes and tooling.
Enterprise support from OpsMx or Armory doesn't change this - they provide commercial support and additional features, but Spinnaker remains a self-hosted platform without centralized identity management.
What IT admins are saying
Spinnaker's open-source nature means IT teams face the full burden of identity management for their continuous delivery platform:
- No automated user provisioning - all account management is manual
- Self-hosted identity stores require ongoing maintenance and security updates
- RBAC relies on external group mappings that can drift out of sync
- No centralized audit trail for user access across the deployment pipeline
Spinnaker is open source - self-hosted with local identity management. Use Okta groups for RBAC.
Authorization via Okta groups or roles.yml
The recurring theme
While Spinnaker offers powerful continuous delivery capabilities, IT teams must build and maintain their own identity infrastructure. Every user change requires manual intervention, and there's no SaaS-style provisioning to automate the DevOps team's access lifecycle.
The decision
| Your Situation | Recommendation |
|---|---|
| Small DevOps team (<10 engineers) | Manual management with SSO authentication |
| Self-hosted with dedicated platform team | Manual management: you already handle infrastructure |
| Enterprise with 50+ developers | Use Stitchflow: automation essential for scale |
| Multi-environment deployments with role complexity | Use Stitchflow: automation strongly recommended |
| Compliance requirements needing audit trails | Use Stitchflow: automation essential for governance |
The bottom line
Spinnaker has no native SCIM. That means one more workflow gap in offboarding, access reviews, and license cleanup unless your team handles it another way.
Close the Spinnaker workflow gap
Spinnaker is one gap in a broader workflow. Stitchflow builds and maintains the offboarding, access review, or license workflow across every app in your environment.
Technical specifications
SCIM Version
Not specifiedSupported Operations
Not specifiedSupported Attributes
Plan requirement
Not specifiedPrerequisites
Not specifiedKey limitations
- Open source - self-hosted
- No SCIM provisioning
- Supports OAuth, SAML, LDAP, X.509
- Authorization via Okta groups or roles.yml
Documentation not available.
Close the workflow gap in
Spinnaker
Spinnaker has no native SCIM. That leaves one more workflow gap in offboarding, access reviews, and license cleanup unless your team handles it another way.
Start with the free gap diagnostic


