Enterprise teams can now use SSO with Fluint, plus automated user provisioning through SCIM. Connect your identity provider (Okta, Azure AD, or any SAML/OIDC provider) and let your team log in with their existing company credentials. SCIM ensures your Fluint workspace stays in sync with your identity provider automatically.
Highlights
Identity-first login.
Users enter their email and get routed automatically—straight to SSO if you've set it up, or to standard login if you haven't. No extra steps, no confusion.Self-service setup
. Admins can configure SSO directly in settings. Add your SAML or OIDC details, test the connection, and you're done.Direct login URLs.
Get a custom login URL for your org (like app.fluint.io/login/your-company) that you can share with your team or bookmark. Goes straight to your SSO provider.Identity Provider-initiated login.
Your team can click the Fluint tile in Okta or Azure and land right in the app.Automated user provisioning with SCIM
. Connect SCIM to automatically sync users from your identity provider. When you add or remove someone from your IdP, they're automatically added or removed from Fluint. Update a user's details in your IdP, and those changes flow through to Fluint automatically.Getting Started
Setting up SSO
You must be a Fluint Integrations admin to set up SSO for your org.
- Go to Settings → Authentication in your Fluint workspace
- Select SSO and choose SAML or OIDC
- Add your identity provider details
- Test the connection to make sure it works
- Enable SSO for your organization
- Share your custom login URL with your team
Setting up SCIM (Optional)
SCIM automates user management and works alongside SSO. You must be a Fluint Integrations admin to configure SCIM.
- Go to Settings → Authentication → SCIM
- Generate your SCIM credentials (base URL and bearer token)
- Add these credentials to your identity provider's SCIM configuration
- Test the connection
- Enable SCIM provisioning
Once enabled, your identity provider will automatically create, update, and remove Fluint users based on changes in your IdP.
