If your enterprise account is set up with Qflow’s white-label option, you can embed the Qflow dashboard inside an iframe in your own portal and sign your users into it without a password prompt. They see Qflow events, guest lists and statistics — fully branded as you, fully inside your product.Documentation Index
Fetch the complete documentation index at: https://docs.qflowhub.io/llms.txt
Use this file to discover all available pages before exploring further.
How it works
- You generate a short-lived SSO token server-side, encrypted with a shared secret only you and Qflow know.
- You embed an iframe pointing at
https://<your-enterprise>.qflowhub.io/sso?successUrl=...&token=<encrypted>. - Qflow decrypts the token, signs the named user in, and redirects to
successUrl(e.g. the events list, or a specific event).
Prerequisites
You’ll need three things, all provided by Qflow when your enterprise white-label is set up:| Item | What it is | Example |
|---|---|---|
| Enterprise PIN | Short identifier for your enterprise (also used in usernames) | 123 |
Enterprise key (KEY) | Shared secret used for AES encryption — server-side only, never exposed to browsers | hfdg8AZgkKCQcNCgwOBAYIBa |
| Enterprise prefix | Subdomain we host your branded portal on | your_enterprise.qflowhub.io |
The encryption recipe
The token is<userId>@<enterprisePin> encrypted with AES-256-CBC using your enterprise key, then Base64-encoded and URL-encoded.
token query parameter on the SSO URL.
Examples
Embedding
Place the resulting URL in an iframesrc:
successUrl — where to land
successUrl is the path inside the Qflow dashboard the user is redirected to after sign-in. Common targets:
successUrl | What it shows |
|---|---|
/events | The full events list for the user |
/events/edit/<eventId> | Edit page for a specific event |
/events/edit/<eventId>?act=guests | Guest list for a specific event |
/events/edit/<eventId>?act=stats | Statistics for a specific event |
successUrl to a path; don’t include the host. The browser combines it with the enterprise host automatically.
Security notes
- Always generate the token server-side. Never compute the encryption in the browser — the key would be exposed.
- Tokens are short-lived per the iframe load. Generate a fresh token each time the iframe is rendered; don’t reuse stale ones.
- Validate the
userIdbelongs to your enterprise before generating the token. Don’t blindly accept any GUID from your own UI without a server-side check, or a hostile client could probe other users’ accounts. - Revoke users in the Users API rather than relying on stopping token generation — a deactivated user signed in via SSO is still effectively signed in until they log out or the session expires.
