Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.flowla.com/llms.txt

Use this file to discover all available pages before exploring further.

Prerequisites

  • Admin access to your Okta account
  • Admin access to your Flowla workspace

Step 1 — Create an App Integration in Okta

Sign in to your Okta Admin Console, then navigate to Applications → Applications and click Create App Integration.
Okta Applications page with Create App Integration button highlighted

Step 2 — Select sign-in method and app type

Choose OIDC - OpenID Connect as the sign-in method and Web Application as the application type, then click Next.
New App Integration dialog with OIDC - OpenID Connect and Web Application selected

Step 3 — Configure the app integration

Fill in the following fields on the configuration page:
FieldValue
App integration nameAny name you wish (e.g. Flowla)
Client credentialsEnabled
Sign-in redirect URIhttps://app.flowla.com/sso
Sign-out redirect URIhttps://app.flowla.com/signin
AccessAllow everyone in your organization to access (recommended)
Immediate accessEnable immediate access (recommended)
App integration name and client credentials settings
Sign-in and sign-out redirect URI settings
Access settings with Allow everyone and Enable immediate access options
Enabling Allow everyone in your organization to access ensures all users can log in via SSO without needing individual app assignments in Okta.
Click Save to create the integration.

Step 4 — Copy your Client ID and Client Secret

After saving, open the General tab of your newly created app integration. Copy both the Client ID and Client Secret — you’ll need these when configuring Flowla.
General tab showing Client ID and Client Secret fields
Protect your Client Secret by keeping it confidential. Avoid sharing it in public repositories, forums, or unencrypted channels.

Step 5 — Find your Identity Provider URL

Your Identity Provider URL is the base URL of your Okta account — the part of the address bar that appears before /admin.
Browser address bar showing the Okta URL with the base domain highlighted before /admin
For example, if your Okta Admin Console URL is:
https://yourcompany.okta.com/admin/dashboard
Your Identity Provider URL is:
https://yourcompany.okta.com

Step 6 — Enable SSO in Flowla

In Flowla, go to Settings → Security & Permissions and click Enable SSO. Fill in the form with the values you copied from Okta:
Flowla SSO setup form with Identity Provider URL, Client ID, Client Secret, and Email Domain fields
1

Enter your Identity Provider URL

Paste the base URL of your Okta account (e.g. https://yourcompany.okta.com)
2

Enter your Client ID

Paste the Client ID from the Okta app’s General tab
3

Enter your Client Secret

Paste the Client Secret from the Okta app’s General tab
4

Set your email domain

Enter the email domain your organization uses (e.g. yourcompany.com). Users with this domain will be required to sign in via SSO.
5

Save and test

Click Save to activate SSO. Open a new browser session and verify you can sign in via Okta.
Once set up, users with your organization’s email domain will be automatically redirected to Okta when signing in to Flowla.

Troubleshooting

Make sure the email domain entered in Flowla exactly matches the domain of your users’ email addresses. Check for typos or extra spaces.
Verify that the Sign-in redirect URI in your Okta app is set exactly to https://app.flowla.com/sso with no trailing slash.
Okta Client Secrets are only shown once. If you’ve lost it, generate a new one from the General tab of your app integration in Okta, then update it in Flowla.
Check the Assignments tab of your Okta app integration. If access is not set to Everyone, individual users or groups may need to be explicitly assigned.