Administration

Single Sign-On (SSO)

Connect your identity provider for centralized authentication

Single Sign-On lets members log in with their company credentials instead of a separate Flint password. Configure SSO in Settings Single Sign-On.

Flint uses WorkOS for SSO, which means we support every identity provider that WorkOS supports.

Supported Providers

We support all major identity providers through WorkOS:

Enterprise SAML Providers: Okta, Azure AD, Google Workspace, OneLogin, JumpCloud, Duo, PingOne, PingFederate, ADFS, Auth0, CyberArk, Salesforce, Oracle, VMware, Rippling, and many more.

OIDC/OAuth Providers: Generic OIDC, Generic SAML, Google, Microsoft, GitHub, Apple, and others.

If your identity provider supports SAML 2.0 or OIDC, it will work with Flint.

Setting Up SSO

Verify Your Domain

Go to Settings Single Sign-On Setup SSO.

First, verify ownership of your email domain:

  1. Enter your domain (e.g., yourcompany.com)
  2. Add the provided DNS TXT record to your domain
  3. Click Verify

Domain verification ensures only legitimate domain owners can configure SSO.

Configure Your Identity Provider

After domain verification, you'll be redirected to the WorkOS Admin Portal to configure your identity provider.

  1. Select your identity provider from the list
  2. Follow the provider-specific instructions
  3. WorkOS guides you through creating the application in your IdP
  4. Copy the required values between your IdP and WorkOS

The WorkOS portal provides step-by-step instructions for each provider.

Enable SSO

Once configuration is complete, return to Flint and enable SSO. Members can now log in with company credentials.

SSO Login Flow

  1. User clicks Sign in with SSO on the login page
  2. User enters their work email
  3. Flint looks up the organization by email domain
  4. User is redirected to their identity provider
  5. After authenticating, user is redirected back to Flint
  6. Flint creates a session and logs them in

SSO Enforcement

After enabling SSO, choose an enforcement level:

ModeBehavior
OptionalMembers can use SSO or password
RequiredMembers must use SSO (password login disabled)

Default Roles

Assign default roles to new SSO users:

  1. In SSO settings, configure Default Roles
  2. Select one or more roles
  3. New users logging in via SSO for the first time receive these roles automatically

This eliminates manual role assignment for SSO users.

Directory Sync (SCIM)

Automatically sync users from your identity provider:

  1. In SSO settings, click Configure Directory Sync
  2. You'll be redirected to the WorkOS Admin Portal
  3. Follow the SCIM setup instructions for your IdP

With Directory Sync enabled:

  • New users in your IdP are automatically created in Flint
  • Updated user info syncs automatically
  • Deprovisioned users lose access immediately

Managing SSO

Once configured, the SSO settings page shows:

  • Connection Status — Active, Inactive, or Validating
  • Identity Provider — Which IdP is connected
  • Enable/Disable Toggle — Turn SSO on or off
  • Enforce SSO Toggle — Require SSO for all users
  • Default Roles — Roles for new SSO users
  • Directory Sync — SCIM configuration status

Reconfiguring SSO

To change your IdP configuration:

  1. Click Manage Connection
  2. You'll be redirected to the WorkOS Admin Portal
  3. Make your changes and save

Disconnecting SSO

To remove SSO entirely:

  1. Disable SSO enforcement first (if enabled)
  2. Click Disconnect SSO
  3. Confirm the action

Users will need to set passwords to continue accessing their accounts.

Troubleshooting

IssueCauseSolution
"SSO login failed"Misconfigured connectionCheck IdP configuration in WorkOS portal
User not provisionedNo default roles setConfigure default roles in SSO settings
Domain not verifiedDNS record missingVerify TXT record is properly added
Can't log in after disconnectNo password setUse password reset flow

On this page