Enterprise teams can now use SSO with Fluint, plus automated user provisioning through SCIM. Connect your identity provider (Okta, Azure AD, or any SAML/OIDC provider) and let your team log in with their existing company credentials. SCIM ensures your Fluint workspace stays in sync with your identity provider automatically.
Highlights
Identity-first login.
Users enter their email and get routed automatically—straight to SSO if you've set it up, or to standard login if you haven't. No extra steps, no confusion.
Self-service setup
. Admins can configure SSO directly in settings. Add your SAML or OIDC details, test the connection, and you're done.
Direct login URLs.
Get a custom login URL for your org (like app.fluint.io/login/your-company) that you can share with your team or bookmark. Goes straight to your SSO provider.
Identity Provider-initiated login.
Your team can click the Fluint tile in Okta or Azure and land right in the app.
Automated user provisioning with SCIM
. Connect SCIM to automatically sync users from your identity provider. When you add or remove someone from your IdP, they're automatically added or removed from Fluint. Update a user's details in your IdP, and those changes flow through to Fluint automatically.
Getting Started
Setting up SSO
You must be a Fluint Integrations admin to set up SSO for your org.
  1. Go to Settings → Authentication in your Fluint workspace
  2. Select SSO and choose SAML or OIDC
  3. Add your identity provider details
  4. Test the connection to make sure it works
  5. Enable SSO for your organization
  6. Share your custom login URL with your team
Setting up SCIM (Optional)
SCIM automates user management and works alongside SSO. You must be a Fluint Integrations admin to configure SCIM.
  1. Go to Settings → Authentication → SCIM
  2. Generate your SCIM credentials (base URL and bearer token)
  3. Add these credentials to your identity provider's SCIM configuration
  4. Test the connection
  5. Enable SCIM provisioning
Once enabled, your identity provider will automatically create, update, and remove Fluint users based on changes in your IdP.
image (3)