Stitchflow
VictorOps logo

VictorOps SCIM guide

Connector Only

How to automate VictorOps user provisioning, and what it actually costs

Summary and recommendation

Splunk On-Call (formerly VictorOps) offers limited SCIM provisioning exclusively on Enterprise plans, but with significant restrictions that make it impractical for most IT teams. While the integration can create and deactivate users through Okta, it cannot update user profiles or attributes—meaning any changes to names, contact information, or roles in your IdP won't sync to On-Call. Worse, the SCIM setup requires opening a support ticket rather than self-service configuration, and deprovisioning permanently deletes critical incident response data including contact methods and escalation policy assignments.

This creates a dangerous gap for incident management teams. On-call rotations depend on accurate, up-to-date contact information and team assignments. When profile updates don't sync automatically, engineers may miss critical alerts due to outdated phone numbers or email addresses. The permanent data deletion during deprovisioning means you lose historical escalation patterns and must manually rebuild contact methods if someone rejoins the team—exactly the opposite of what you need during high-pressure incident scenarios.

The strategic alternative

VictorOps has no native SCIM. Automate offboarding, user access reviews, and license workflows across every app, including the ones without APIs. We maintain the integration layer underneath. You focus on judgment, not plumbing.

Quick SCIM facts

SCIM available?No
SCIM tier requiredN/A
SSO required first?Yes
SSO available?Yes
SSO protocolSAML 2.0
DocumentationOfficial docs

Supported identity providers

IdPSSOSCIMNotes
OktaNo SCIM available
Microsoft Entra IDNo SCIM available
Google WorkspaceVia third-partyNo native support
OneLoginVia third-partyNo native support

The cost of not automating

Without SCIM (or an alternative like Stitchflow), your IT team manages VictorOps accounts manually. Here's what that costs:

Source: Stitchflow aggregate data across apps with 2+ instances, normalized to 500 employees
Orphaned accounts (ex-employees with access)7
Unused licenses12
IT hours spent on manual management/year101 hours
Unused license cost/year$3,925
IT labor cost/year$6,088
Cost of compliance misses/year$1,741
Total annual financial impact$11,754

The VictorOps pricing problem

VictorOps gates SCIM provisioning behind premium plans, forcing significant cost increases for basic user management.

Tier comparison

PlanPriceSSOSCIM
Starter$5/user/month (add-on to Splunk Observability Cloud)
EnterpriseCustom quote (part of Splunk Observability Cloud)
⚠️ Limited

Pricing structure

PlanPriceSSOSCIM
Starter$5/user/month (add-on to Splunk Observability Cloud)
EnterpriseCustom quote (part of Splunk Observability Cloud)
⚠️ Limited

The real cost: Splunk Observability Cloud starts at $95/host/month for Standard tier, plus the On-Call add-on. For a 50-person DevOps team, you're looking at $4,750+ monthly base cost before getting any provisioning capabilities.

What this means in practice

Even with Enterprise pricing, Splunk On-Call's SCIM implementation is fundamentally broken for real-world use:

Profile updates don't work
Change someone's name or email in Okta? It won't sync to On-Call
Support ticket required
You can't set up SCIM yourself - it requires opening a ticket with Splunk support
Destructive deprovisioning
Removing users permanently deletes their contact methods and removes them from escalation policies
No recovery
Re-add a user and all their previous configuration is gone forever

For incident management tools, accurate user data is mission-critical. On-call rotations depend on current contact information and role assignments.

Additional constraints

No self-service setup
SCIM configuration requires Splunk support intervention
Okta-only focus
SCIM documentation primarily covers Okta, with limited support for other IdPs
Beta status
SCIM integration is still marked as "Beta" in Okta's app catalog
Group provisioning unavailable
Cannot sync teams or groups from your IdP
Profile sync failure
Must delete and recreate users to update basic attributes like names

Summary of challenges

  • VictorOps does not provide native SCIM at any price tier
  • Organizations must rely on third-party tools or manual provisioning
  • Our research shows teams manually provisioning this app spend significant hidden costs annually

What VictorOps actually offers for identity

SAML SSO (Enterprise tier)

Splunk On-Call supports SAML 2.0 integration with identity providers:

SettingDetails
ProtocolSAML 2.0
Supported IdPsOkta, Entra ID, OneLogin, custom SAML providers
ConfigurationManual setup via support team
ACS URLhttps://sso.victorops.com/sp/ACS.saml2
User requirementManual account creation required

SCIM Provisioning (Enterprise tier - Beta)

The SCIM integration is extremely limited and still in beta:

FeatureSupported?
Create users✓ Yes
Update user profiles❌ No
Deactivate users✓ Yes (with permanent data loss)
Group provisioning❌ No
Self-service setup❌ No (requires support ticket)

Critical limitations:

Profile updates in your IdP are not reflected in Splunk On-Call
Deprovisioning permanently deletes contact methods, push registrations, and removes users from escalation policies
Previously deprovisioned users lose all attributes if reassigned
Setup requires opening a support ticket no self-service configuration

What you're actually paying for

The Enterprise tier bundles SCIM with Splunk's full Observability Cloud platform ($95/host/month minimum), plus the On-Call add-on starting at $5/user/month.

Reality check: 90% of teams using VictorOps for incident management don't need the entire Splunk Observability suite. You're paying enterprise prices for a beta SCIM implementation that can't even update user profiles - a basic requirement for maintaining accurate on-call schedules.

What IT admins are saying

VictorOps's limited SCIM implementation creates ongoing maintenance headaches for IT teams managing incident response:

  • Profile updates in identity providers don't sync to VictorOps - requiring manual updates
  • Deprovisioning permanently deletes contact methods and removes users from on-call schedules
  • SCIM setup requires opening support tickets instead of self-service configuration
  • Previously deprovisioned users lose all attributes when reassigned

Cannot update user profiles via SCIM

Community feedback on Okta integration

Must delete and recreate user to update attributes

IT admin workaround discussion

SCIM setup requires support ticket - not self-service

VictorOps documentation limitation

The recurring theme

Even with SCIM enabled, IT teams must manually maintain user profiles and carefully manage deprovisioning to avoid breaking on-call rotations. The inability to update user attributes means constant manual intervention for something as simple as a phone number change.

The decision

Your SituationRecommendation
Small on-call team (<10 engineers)Manual management is workable for now
Using Okta with basic user sync needsTry native SCIM first, but prepare for limitations
Need profile updates to sync automaticallyUse Stitchflow: native SCIM can't update user attributes
Enterprise with strict deprovisioning requirementsUse Stitchflow: avoid data loss from permanent deletions
Complex on-call rotations requiring accurate contact infoUse Stitchflow: automation essential for incident response

The bottom line

Splunk On-Call's native SCIM is severely limited—it can't update user profiles and permanently deletes critical data during deprovisioning. For incident management teams that need reliable, up-to-date user information for on-call schedules, Stitchflow provides the automation capabilities that native SCIM simply can't deliver.

Make VictorOps workflows AI-native

VictorOps has no native SCIM. We build complete offboarding, user access reviews, and license workflows across every app, including the ones without APIs.

Covers apps without native SCIM, including the ones without APIs
Less than a week, start to finish (~2 hours of your time)
Built with your team; extend to anything else in the company
Book a Demo

Technical specifications

SCIM Version

Not specified

Supported Operations

Not specified

Supported Attributes

Not specified

Plan requirement

Not specified

Prerequisites

Not specified

Key limitations

  • SCIM setup requires support ticket - not self-service
  • Profile updates in Okta NOT reflected in Splunk On-Call
  • Deprovisioning permanently deletes contact methods and push registrations
  • Removes user from Escalation Policies and Scheduled Overrides
  • Reassigning previously deprovisioned user does not recover attributes

Configuration for Okta

Integration type

Okta Integration Network (OIN) app

Prerequisite

SSO must be configured before enabling SCIM.

Where to enable

Okta Admin Console → Applications → VictorOps → Sign On

Enterprise required for SCIM

Use Stitchflow for automated provisioning.

Unlock SCIM for
VictorOps

VictorOps has no native SCIM. We still automate end-to-end workflows across every app, including the ones without APIs.

See how it works
Admin Console
Directory
Applications
VictorOps logo
VictorOps
via Stitchflow

Last updated: 2026-01-11

* Pricing and features sourced from public documentation.

Keep exploring

Related apps

6sense logo

6sense

No SCIM

B2B Revenue Intelligence / ABM

ProvisioningNot Supported
Manual Cost$11,754/yr

6sense, the B2B revenue intelligence platform, has paused SCIM provisioning for new customers until Q4 2026. While existing customers with SCIM enabled can continue using it, new implementations are limited to JIT (Just-In-Time) provisioning through SAML SSO. This creates a significant gap for IT teams managing revenue intelligence access, as JIT only creates users on first login and provides minimal attribute mapping (email, first name, last name only). For an enterprise platform with typical pricing of $55,000-$130,000 annually, the absence of automated user lifecycle management is a substantial limitation. The lack of SCIM until Q4 2026 forces IT teams into manual provisioning workflows for a platform handling sensitive revenue data. While SAML SSO handles authentication, it doesn't address user lifecycle events like role changes, department transfers, or offboarding. This creates compliance risks in revenue teams where access to prospect data and sales intelligence must be tightly controlled. The nearly two-year wait for SCIM restoration means organizations implementing 6sense today face manual user management for the foreseeable future.

View full guide
Aha! logo

Aha!

No SCIM

Product Management / Roadmapping

ProvisioningNot Supported
Manual Cost$11,754/yr

Aha! Roadmaps, the product roadmapping platform, does not support SCIM provisioning on any plan. While Aha! offers SAML 2.0 SSO integration with identity providers like Okta, Entra ID, and OneLogin, this only handles authentication through JIT (Just-In-Time) provisioning. The critical limitation: JIT provisioning creates user accounts with no default role or access permissions, requiring administrators to manually configure access for each user after they first sign in. For product teams managing strategic roadmaps and stakeholder access, this creates significant operational overhead. Since product roadmaps contain sensitive strategic information and stakeholder access typically varies by product area, IT administrators must manually assign appropriate roles and workspace permissions after each user is provisioned. There's no automatic deprovisioning when users leave the organization, creating potential security gaps. This manual process becomes particularly problematic for larger product organizations where dozens of stakeholders across different business units need carefully managed access to specific roadmaps.

View full guide
Appcues logo

Appcues

No SCIM

Product Adoption / User Onboarding

ProvisioningNot Supported
Manual Cost$11,754/yr

Appcues, the product adoption platform used by product managers and growth teams, explicitly does not support SCIM provisioning on any plan—not even Enterprise. While Appcues offers SAML 2.0 SSO integration starting at the Enterprise tier with just-in-time (JIT) provisioning, this only creates users during first login and provides no automated deprovisioning capabilities. For product teams where access needs change frequently as people move between projects or leave the company, this creates a significant security gap. The lack of SCIM means IT teams must manually manage user lifecycle for Appcues accounts, even though the platform handles sensitive product analytics and user flow data. When employees leave or change roles, their Appcues access remains active until manually revoked—a compliance risk that's particularly problematic given Appcues' role in tracking user behavior and product metrics. With MAU-based pricing starting at $300/month and scaling significantly with usage, paying for orphaned accounts also creates unnecessary cost bloat.

View full guide