Single Sign-On (SSO) & SCIM Provisioning
Overview
Fluint supports enterprise identity management through SSO and SCIM, allowing your organization to centralize authentication and automate user provisioning.
Supported protocols:
Protocol | Purpose |
SAML 2.0 | Federated authentication via your identity provider |
OpenID Connect (OIDC) | OAuth 2.0-based authentication via your identity provider |
SCIM 2.0 | Automated user provisioning and deprovisioning from your identity provider |
Supported identity providers:
Okta (SAML, OIDC, SCIM)
Microsoft Entra ID / Azure AD (SAML, OIDC, SCIM)
Google Workspace (SAML, OIDC)
OneLogin (SAML, OIDC, SCIM)
JumpCloud (SAML, OIDC, SCIM)
CyberArk (SAML, SCIM)
Duo, ClassLink, Keycloak, miniOrange, PingFederate, Rippling, Salesforce, Shibboleth (SAML only)
Any SAML 2.0 or OIDC-compliant provider via "Other Identity Provider"
Requirements: You must have the Integrations Admin role in Fluint to configure SSO and SCIM. Integrations admins retain break-glass access via email/OAuth login even when SSO is enforced organization-wide.
Setting Up SSO
Navigate to Settings > Authentication in Fluint.
Step 1: Create a connection
Select your protocol: SAML or OIDC
Select your identity provider from the dropdown
Optionally provide a display name (defaults to "{Provider} SSO")
Click Create
After creation, Fluint generates Service Provider details you'll need to configure in your IdP.
Step 2: Copy Service Provider details into your IdP
For SAML connections, Fluint provides:
ACS URL (Assertion Consumer Service URL) — the endpoint your IdP posts SAML assertions to
Audience URI / Entity ID — the expected audience value in the SAML response
For OIDC connections, Fluint provides:
Redirect URI — the OAuth callback URL your IdP redirects to after authentication
Use the copy button next to each value to copy it to your clipboard, then paste it into your IdP's application configuration.
Step 3: Configure IdP details in Fluint
SAML configuration
Field | Required | Description |
IdP SSO URL | Yes | The Single Sign-On endpoint from your IdP (e.g., |
IdP Entity ID | Yes | The unique identifier / issuer URI for your IdP |
X.509 Certificate | Yes | The PEM-format signing certificate from your IdP (must include |
Attribute Mapping | Yes | Maps your IdP's SAML attribute names to the fields Fluint expects (see below) |
Attribute Mapping (required for SAML)
Fluint uses Stytch for authentication, which requires three specific attributes in every SAML assertion. You must configure attribute statements in your IdP that send these values, then tell Fluint the attribute name your IdP uses for each:
Fluint field | Description | What to enter |
| User's email address | The Name of the SAML attribute statement that contains the user's email |
| User's first name | The Name of the SAML attribute statement that contains the user's first name |
| User's last name | The Name of the SAML attribute statement that contains the user's last name |
Default attribute names by IdP:
Identity Provider | first_name | last_name | |
Okta |
|
|
|
Microsoft Entra ID | |||
Google Workspace |
|
|
|
OneLogin |
|
|
|
JumpCloud |
|
|
|
Fluint pre-fills these defaults when you select a known IdP. Verify the values match your IdP's actual attribute statement names — they are case-sensitive and must match exactly.
OIDC configuration
Field | Required | Description |
Issuer URL | Yes | Your IdP's issuer URL (used to auto-discover OIDC endpoints via |
Client ID | Yes | The OAuth 2.0 client identifier from your IdP |
Client Secret | Yes (first time) | The OAuth 2.0 client secret. Required on initial setup; leave blank when updating to keep the existing secret. |
After saving, Fluint auto-discovers and displays the Authorization, Token, UserInfo, and JWKS endpoints from your issuer.
Step 4: Share the organization login URL
Once configured, share your organization's dedicated login URL with your team:
This URL is displayed in the SSO settings page and can be copied to your clipboard. Users who visit this URL will be directed to authenticate via your IdP.
Example: Setting Up SAML SSO with Okta
In Okta
Go to Applications > Create App Integration
Select SAML 2.0, click Next
Name the app (e.g., "Fluint") and click Next
In the SAML Settings section, enter:
Single sign-on URL: Paste the ACS URL from Fluint
Audience URI (SP Entity ID): Paste the Audience URI / Entity ID from Fluint
Under Attribute Statements, add three entries:
Name:
email— Value:user.emailName:
firstName— Value:user.firstNameName:
lastName— Value:user.lastName
Click Next, then Finish
Go to the Sign On tab of your new application and copy:
Sign on URL (this is your IdP SSO URL)
Issuer (this is your IdP Entity ID)
Download the X.509 Certificate
Assign users/groups to the application under the Assignments tab
In Fluint
Navigate to Settings > Authentication
Create a new SAML connection, select Okta as the IdP
Copy the ACS URL and Audience URI into Okta (step 4 above)
Paste the values from Okta into the Fluint configuration form:
IdP SSO URL: The Sign on URL from Okta
IdP Entity ID: The Issuer from Okta
X.509 Certificate: Paste the full PEM certificate
Verify the attribute mapping defaults are correct (
email,firstName,lastName)Click Save
Connection Test & Setup Doctor
Fluint includes a built-in diagnostic tool for SAML connections called the Connection Health panel. It appears automatically once your connection has been saved.
Configuration checklist
The setup doctor runs automated checks against your configuration:
IdP SSO URL — is it configured?
IdP Entity ID — is it configured?
X.509 Certificate — has one been uploaded?
Attribute Mapping — are
email,first_name, andlast_nameall mapped?
Each check shows a pass/fail/warning icon. Click Show details to see the exact values configured for each field.
When all checks pass, the status shows "Ready to test".
Running a connection test
Click Test Connection in the Connection Health panel (enabled only when all config checks pass)
A popup window opens and redirects you to your IdP's login page
Authenticate with your IdP credentials
The popup closes and the result is displayed inline
If the test succeeds, you'll see a success confirmation. Your SSO connection is ready.
If the test fails, Fluint parses the error and provides a targeted diagnosis:
Error | Meaning | How to fix |
Connection Not Fully Configured | Required fields are missing | Fill in all required fields in the IdP Configuration section |
Email Attribute Missing | IdP isn't sending the email attribute in the SAML response | Add/fix the |
Invalid SAML Response | Signature verification failed or response malformed | Check that the X.509 certificate matches your IdP's current signing cert, and that ACS URL / Audience URI match |
Audience Mismatch | The Audience URI in your IdP doesn't match Fluint's expected value | Copy the Audience URI from the Service Provider Details section and update your IdP |
ACS URL Mismatch | The ACS URL (Reply URL) in your IdP doesn't match | Copy the ACS URL from the Service Provider Details section and update your IdP |
SCIM Provisioning
SCIM allows your identity provider to automatically create and deactivate user accounts in Fluint.
Setting up SCIM
Navigate to Settings > User Provisioning in Fluint
Select your identity provider (Okta, Microsoft Entra ID, JumpCloud, OneLogin, CyberArk, or Generic)
Optionally name the connection
Click Enable SCIM
Fluint generates two values you'll need:
SCIM Base URL — the endpoint your IdP will send provisioning requests to
Bearer Token — the authentication token for your IdP to use
Important: The bearer token is only displayed once at creation time. Copy it immediately and store it securely. If you lose it, you'll need to rotate the token (see below).
Configuring your IdP
Enter the SCIM Base URL and Bearer Token into your identity provider's SCIM/provisioning configuration. Refer to your IdP's documentation for the exact steps.
Token rotation
For security, you should periodically rotate your SCIM bearer token. Fluint supports zero-downtime rotation:
Click Rotate Token on the SCIM Connection card
A new token is generated — both the old and new tokens are valid at this point
Copy the new token and update it in your identity provider
Verify provisioning still works with the new token
Click Complete Rotation to invalidate the old token
If something goes wrong, click Cancel Rotation to discard the new token and keep the old one active.
Disabling SCIM
Click Disable SCIM on the SCIM Connection card. This revokes the bearer token and stops your IdP from provisioning or deprovisioning users. Existing users are not affected.


