Stitchflow
Tableau logo

Tableau SCIM guide

Native SCIM

How to automate Tableau user provisioning, and what it actually costs

Native SCIM requires Tableau Cloud (any tier) plan

Summary and recommendation

Tableau supports SCIM 2.0 for automated user provisioning across all Tableau Cloud tiers, starting at $75/user/month for Creator licenses. However, SCIM requires SAML SSO to be configured first—you cannot enable SCIM provisioning without SSO. Once SCIM is active, any changes made directly in Tableau Cloud get overwritten by your identity provider, and you cannot disable SAML configuration while SCIM remains enabled.

This creates operational friction for IT teams managing mixed authentication scenarios or organizations that need flexibility in user management approaches. The SAML prerequisite means you're locked into a specific authentication flow, and the overwrite behavior can disrupt workflows when users or admins make direct changes in Tableau that then get reverted during the next sync cycle.

The strategic alternative

Stitchflow provides SCIM-level provisioning through resilient browser automation for Tableau Cloud without the SAML prerequisite or sync conflicts. Works with any Tableau Cloud tier and any identity provider (Okta, Entra, Google Workspace, OneLogin). Flat pricing under $5K/year with 24/7 human-in-the-loop support.

Quick SCIM facts

SCIM available?Yes
SCIM tier requiredFree
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0, OIDC (Salesforce)
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaOIN app with full provisioning
Microsoft Entra IDGallery app with SCIM
Google WorkspaceJIT onlySAML SSO with just-in-time provisioning
OneLoginSupported

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages Tableau accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The Tableau pricing problem

Tableau gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Plan Structure

PlanPriceSSOSCIM
Standard (Creator)$75/user/mo
Standard (Explorer)$42/user/mo
Standard (Viewer)$15/user/mo
Enterprise (Creator)$115/user/mo
Enterprise (Explorer)$70/user/mo
Enterprise (Viewer)$35/user/mo

Note: SCIM is available on all Tableau Cloud tiers, but SAML SSO configuration is a hard prerequisite for activation.

What this means in practice

The SAML dependency creates several operational challenges:

Forced SSO adoption
Organizations must implement SAML even if they prefer other authentication methods or want to phase rollouts differently.
Configuration lock-in
Once SCIM is active, SAML configuration cannot be disabled, creating permanent architectural coupling.
Sync conflicts
Changes made directly in Tableau Cloud are overwritten by IdP synchronization, eliminating hybrid management approaches.

Additional constraints

Sequential setup requirement
SAML must be fully configured and tested before SCIM provisioning can begin.
Administrative override limitations
Direct user management in Tableau becomes unreliable once SCIM sync is active.
Authentication coupling
SSO and provisioning strategies are permanently linked, reducing deployment flexibility.

Summary of challenges

  • Tableau supports SCIM but only at Free tier (custom pricing)
  • Google Workspace users get JIT provisioning only, not full SCIM
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What the upgrade actually includes

Tableau Cloud includes SCIM 2.0 provisioning across all pricing tiers, but it's not standalone—it requires SAML SSO configuration first and comes bundled with other enterprise identity features:

SCIM automated provisioning (user/group sync)
SAML single sign-on (mandatory prerequisite)
Site role assignment automation
Identity provider integration (Okta, Entra, OneLogin)
JIT (Just-in-Time) provisioning
Advanced authentication controls
User session management

The SAML SSO requirement creates vendor lock-in—you can't disable SAML while SCIM is active, and any changes made directly in Tableau Cloud get overwritten by your IdP sync. This rigid coupling means you're paying for authentication infrastructure you might not want.

Stitchflow Insight

For teams that just need automated user provisioning without the SSO dependency, you're locked into Tableau's specific identity architecture. We estimate ~60% of these bundled identity features are constraints rather than benefits for organizations with existing SSO solutions.

What IT admins are saying

Community sentiment on Tableau's SCIM implementation is mixed, with most concerns centering on the SAML prerequisite and sync conflicts. Common complaints:

  • Having to set up SAML SSO before SCIM can be enabled
  • Direct changes made in Tableau Cloud being overwritten by IdP sync
  • SAML configuration becoming locked once SCIM is active
  • Difficulty troubleshooting when provisioning changes conflict with manual user management

We had users complaining that their site roles kept getting reset after we enabled SCIM. Turns out our manual changes in Tableau were conflicting with what Okta was pushing.

Reddit r/tableau

The SAML requirement isn't a deal-breaker, but it does add complexity to the initial setup. Would be nice if SCIM could work standalone.

Tableau Community Forums

The recurring theme

While Tableau's SCIM works well once properly configured, the SAML prerequisite and potential for sync conflicts create implementation headaches that require careful planning and ongoing management.

The decision

Your SituationRecommendation
Need SCIM but don't want SAML SSOUse Stitchflow: bypass Tableau's SAML prerequisite
Already have SAML configuredUse native SCIM: it's included in all Tableau Cloud tiers
Have mixed user sources (some non-SSO)Use Stitchflow: avoid conflicts with direct Tableau changes
Need to maintain SAML flexibilityUse Stitchflow: SAML can't be disabled while native SCIM is active
Small BI team with stable usersManual may work: but consider growth and compliance needs

The bottom line

While Tableau Cloud includes SCIM 2.0 across all tiers, the mandatory SAML prerequisite and rigid coupling creates operational constraints many IT teams want to avoid. Stitchflow provides SCIM automation without forcing your SSO architecture decisions.

Automate Tableau without the tier upgrade

Stitchflow delivers SCIM-level provisioning through resilient browser automation, backed by 24/7 human in the loop for Tableau at <$5K/year, flat, regardless of team size.

Works alongside or instead of native SCIM
Syncs with your existing IdP (Okta, Entra ID, Google Workspace)
Automates onboarding and offboarding
SOC 2 Type II certified
24/7 human-in-the-loop monitoring
Book a Demo

Technical specifications

SCIM Version

2.0

Supported Operations

Create, Update, Deactivate, Groups

Supported Attributes

Not specified

Plan requirement

Free

Prerequisites

SSO must be configured first

Key limitations

  • SAML SSO must be configured before SCIM
  • Changes made in Tableau Cloud directly may be overwritten by IdP
  • SAML configuration cannot be disabled while SCIM is active

Configuration for Okta

Integration type

Okta Integration Network (OIN) app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → Tableau → Provisioning

Required credentials

SCIM endpoint URL and bearer token (generated in app admin console).

Configuration steps

Enable Create Users, Update User Attributes, and Deactivate Users.

Provisioning trigger

Okta provisions based on app assignments (users or groups).

Free required for SCIM

Native SCIM is available on Free. Use Stitchflow if you need provisioning without the tier upgrade.

Configuration for Entra ID

Integration type

Microsoft Entra Gallery app with SCIM provisioning

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Entra admin center → Enterprise applications → Tableau → Provisioning

Required credentials

Tenant URL (SCIM endpoint) and Secret token (bearer token from app admin console).

Configuration steps

Set Provisioning Mode = Automatic, configure SCIM connection.

Provisioning trigger

Entra provisions based on user/group assignments to the enterprise app.

Sync behavior

Entra provisioning runs on a scheduled cycle (typically every 40 minutes).

Free required for SCIM

Native SCIM is available on Free. Use Stitchflow if you need provisioning without the tier upgrade.

Unlock SCIM for
Tableau

Tableau gates automation behind Tableau Cloud (any tier) plan. Stitchflow delivers the same SCIM outcomes for a flat fee.

See how it works
Admin Console
Directory
Applications
Tableau logo
Tableau
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

Redash logo

Redash

No SCIM

Business Intelligence / Data Visualization

ProvisioningNot Supported
Manual Cost$11,754/yr

Redash, the open-source data visualization platform, does not support SCIM provisioning. Since Databricks discontinued the cloud service in November 2021, Redash is now only available as a self-hosted solution with SAML 2.0 SSO and JIT (Just-In-Time) provisioning. Users are automatically created on their first SAML login, with group membership controlled through the RedashGroups SAML attribute. While this works for small teams, it creates significant operational overhead for larger organizations that need predictable user lifecycle management. The JIT-only approach means IT teams have no visibility into who will have access until users actually log in, making it impossible to audit access rights or ensure proper deprovisioning when employees leave. For organizations using Redash for sensitive business intelligence and data visualization, this creates compliance gaps and security risks. Self-hosting requirements add additional complexity, as teams must manage both the application infrastructure and user provisioning workflows manually.

View full guide
Amplitude logo

Amplitude

SCIM Tax

Product Analytics

SCIM StatusIncluded
Manual Cost$11,754/yr

Amplitude supports SCIM provisioning, but only on Growth plans (starting around $36K/year) or Enterprise plans with custom pricing. While Amplitude's SCIM implementation covers the core functionality—creating, updating, and deactivating users—it requires SCIM to be specifically enabled for your organization, and regenerating the SCIM key immediately invalidates existing integrations without warning. For product teams on Plus plans ($49/month), upgrading to Growth just to unlock SCIM means jumping from under $600/year to $36,000+/year—a 60x increase. That's often more than the entire analytics budget for smaller product teams. The gap becomes particularly problematic for cross-functional product teams where analysts, PMs, and engineers need varying levels of access to user behavior data, but manual provisioning creates security risks around sensitive analytics permissions.

View full guide
Apache Superset logo

Apache Superset

No SCIM

Business Intelligence / Data Visualization

ProvisioningNot Supported
Manual Cost$11,754/yr

Apache Superset, the open-source business intelligence platform, provides no native SCIM provisioning capabilities. While Superset supports various authentication methods including OAuth2, OIDC, and LDAP, SAML SSO requires custom development through a CustomSsoSecurityManager class implementation. Even with SSO configured, user provisioning must be handled manually or through Superset's beta User API, which isn't enabled by default and requires additional configuration in superset_config.py. This creates a significant operational burden for IT teams managing data analysts, engineers, and business users who need access to dashboards and datasets. The lack of automated provisioning means manual account creation for every new hire, plus ongoing management of complex dashboard permissions and row-level security settings. For organizations running self-hosted Superset instances, this translates to custom development work just to achieve basic enterprise SSO integration, let alone automated user lifecycle management.

View full guide